Create a hack-proof web page
Create a hack-proof web page Making your own website hack-proof is a sensible step in the context of data protection, but also to protect your
Create a hack-proof web page Making your own website hack-proof is a sensible step in the context of data protection, but also to protect your
Cybersecurity on holiday Holiday time. Finally, relaxation. Away from work. Just shut it down. Enjoy nature. Lying on the beach in the sun. Get to
Qualifications of data protection officers A data protection officer ensures that a company complies with the data protection guidelines. This includes data protection in digital
Handling hacked emails The e-mail is indispensable as a communication medium. Accordingly, the email is also popular as an attack target of hackers. It also
Fraudulent websites and fake shops That hackers try everything to get to people’s data is nothing new. You have to be on guard when emails
How to prevent spam How to prevent spamWe are all very familiar with spam. We encounter it on the internet, on our smartphone or on
Two-factor authentication statistics Two-factor authentication has been around for a few years now. However, it took a little while for it to catch on. For
Security Awareness in German Companies There are still many people and companies whose security awareness leaves a lot to be desired. Especially when people think
The importance of protection When people talk about data security, the term “protection” rarely comes up. Yet it goes even further than security. Without protection,
Google Authenticator is not free of criticism and omissions. For example, the demand for a function that allows secret seeds to be synchronized for other
Dangerous Authenticator Apps Two-factor authentication is one of the most secure ways to protect one’s accounts from unauthorized access. Hackers and data spies are excluded
Two-factor authentication via SMS Perhaps you have already noticed: Since March 2023, Twitter has made its two-factor authentication available to users only against payment. Of
Privacy in the gym The members of a fitness center trust in the safety concept of the operators. Beginners are introduced to training by the
It is always possible that a security hole opens up somewhere. There is a data breach. Or malware finds its way into the system. The
Here on this blog, we regularly use terms like authentication, authentication, or authorization. These terms are all related, but have certain differences. These differences can
The Internet is full of links. There is no web page that does not have at least one link. Every link leads users to another
Hard disk encryption can protect data on laptops or PCs from hacker attacks. However, there are different types of hard disk encryption. Find out what
DDoS stands for Distributed Denial-of-Service. Distributed denial of service. This is a distributed network attack that exploits capacity limitations. Multiple requests to a resource overload
A data protection breach in the company may have serious consequences. Of course, the goal is to avoid major and minor data breaches. But if
Malware is the generic term that summarizes all types of malicious software. This includes numerous different forms of attackers that can infect a computer system.
Employee data protection plays a major role in companies. At the latest since the General Data Protection Regulation (GDPR), but also already through the Federal
Ransomware is a special form of malware. At least in terms of the target of attackers. This is because the explicit aim is to extort
The General Data Protection Regulation (GDPR) counts health information as information that is particularly worthy of protection. Accordingly, data protection in the doctor’s office is
Online shopping is here to stay. Most purchases are made on the Internet these days. Accordingly, attention must be paid to the security of data.
The Trojan gets its name from the fact that this form of malware disguises itself as a harmless software. From this software, the Trojan then
Password security and where it ends Password security. A topic that concerns us almost every day. After all, all our accounts are protected by passwords.
Cybercrime or Internet crime refers to criminal activities that target computers, computer networks or networked devices. So basically all illegal activities that relate to digital
Passwordless security is still a relatively unknown procedure for many. One of the reasons for this is that it is always drilled into your head
The home office is becoming more and more popular. The times when people only worked at the workplace in the company are long gone. However,
Buy now Back to the overview ! What is a data backup? A data backup can be used to create a backup copy of data.
Buy now Back to the overview ! What is cybercrime? Cybercrime are criminal offenses that lead to conventional criminal offenses through the use of information
Request now Back to the overview ! Where are security procedures such as multi-factor authentication used? In the world of the Internet, there are now
Buy now Back to the overview ! What is end-to-end encryption? End-to-end encryption. End-to-end encryption means that all transmitted data is encrypted via transmission
Buy now Back to the overview ! What does FIDO mean? Fido stands for Fast Identity Online, i.e. a fast identity for digital connections. This
Buy now Back to the overview ! What is biometric authentication? Biometric authentication can provide more security. Instead of the traditional login with user
Buy now Back to the overview ! What is the difference between authentication, authentication or authorization? All three terms are frequently used in connection with
Why two-factor authentication also makes sense for companies User accounts and passwords have had their day when it comes to protecting sensitive data. In payment
How two-factor authentication protects cloud and SaaS services Many companies use cloud and SaaS services to process personal data or sensitive information such as payment
How TOTP one-time passwords secure sensitive corporate data Time-based one-time passwords (TOTP for short) add another component to log-in via user name and password and
How KeePass works as a back-up for a TOTP authenticator A TOTP authenticator that scans QR codes makes the switch to secure 2FA log-ins and