Data Pro­tec­tion

Image: How to remove personal information from GooglezimmytwsShut­ter­stock

How to remove personal in­form­a­tion from Google

The internet never forgets – is it always true? In some cases, search engines are obliged to grant users per­mis­sion to delete de­fam­at­ory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to…

Read more
Image: Getting a privacy policy for your websitewk1003mikeShut­ter­stock

Getting a privacy policy for your website

An important part of a website that many operators un­der­es­tim­ate is the privacy policy. This notifies site visitors of the in­form­a­tion they are dis­clos­ing about them­selves and what their data will be used for. But what kind of in­form­a­tion should this de­clar­a­tion contain, what has…

Read more
Image: Image Copyright OnlineREDPIXEL.PLShut­ter­stock

Image Copyright Online

Just because a pho­to­graph or artwork is available to view on the internet, doesn’t mean that you can use it for your own purposes. The creator’s consent and payment for royalties are often required. The rules don’t solely apply to sharing images that don’t belong to you; even if…

Read more
Image: How to use PGP encryption for emailBachoShut­ter­stock

How to use PGP en­cryp­tion for email

Online privacy is a sensitive issue that affects everyone from security experts to casual internet users. Whether you’re posting on social networks, carrying out banking trans­ac­tions or buying from an online store, your data may not be suf­fi­ciently protected. The same applies to…

Read more
Image: What is a proxy server?Imagentleshut­ter­stock

What is a proxy server?

A proxy server acts as an in­ter­me­di­ary between your device and the internet, con­ceal­ing your IP address and fa­cil­it­at­ing access to certain content. But what types of proxy servers are there, and how do they benefit load balancing and security? In our article, you’ll learn how…

Read more
Image: What are cyberattacks and how to prevent themBits And Splitsshut­ter­stock

What are cy­ber­at­tacks and how to prevent them

Cy­ber­at­tacks pose a threat to in­di­vidu­als, busi­nesses, and gov­ern­ment agencies alike. Criminals are con­stantly coming up with new tech­niques to cause as much damage as possible. Their motives vary widely—from pure greed to the pursuit of political goals. But how can you protect…

Read more
Image: What must be included in a website Impressum in 2025?fo­to­gestoe­berShut­ter­stock

What must be included in a website Impressum in 2025?

Before launching a website, operators targeting the DACH region should have a legal notice in place—commonly known as an ‘Impressum’. Most websites also require provider iden­ti­fic­a­tion. Depending on the industry and the website’s content, ad­di­tion­al dis­clos­ures may be required.…

Read more
Image: How do EU cookie laws affect your business?AlexeysunShut­ter­stock

How do EU cookie laws affect your business?

Cookies can be useful, but these small files often raise serious privacy concerns. To protect user privacy, the EU Cookie Law requires that tracking tech­no­lo­gies may only be used after obtaining explicit user consent. This opt-in process has been mandatory for several years. This…

Read more
Image: What are the main email marketing trends?en­ter­linedesignShut­ter­stock

What are the main email marketing trends?

To ensure that your news­let­ter campaigns continue to be effective in the future, you shouldn't miss out on these email marketing trends. There are even more auto­ma­tion pos­sib­il­it­ies, new design options and stricter data pro­tec­tion. In our article on this year's news­let­ter email…

Read more
Image: How can you increase password security?Rawpixel.comshut­ter­stock

How can you increase password security?

Password security is often an un­der­es­tim­ated measure in the fight against cy­ber­crime. By choosing strong passwords, using password managers, regularly checking for leaks, and re­spond­ing ap­pro­pri­ately to breaches, you can protect your digital identity. Here, we’ll show you what to…

Read more