Encryption

Image: How to encrypt and sign your emails with S/MIME

How to encrypt and sign your emails with S/MIME

Sending an email without extra security is akin to sending a postcard: If everything goes as expected, the message arrives intact and unread by anyone else. But if the postcard or email is intercepted during transit, the content can be read or altered freely. Discover how the…

Read more
Image: How to use two-factor authentication to protect your accountjijomathaidesignersshutterstock

How to use two-factor authentication to protect your account

With two-factor authentication, accounts can be effectively protected against hacking or phishing attacks. Since more than just a password is needed for login, internet criminals can’t do much with intercepted login details. In our guide, we explain how two-factor authentication…

Read more
Image: What is utf-8 and why is it important for global digital communication?ASAG StudioShutterstock

What is utf-8 and why is it important for global digital communication?

UTF-8 is a character encoding under Unicode that aims to encompass all modern languages for data processing. What exactly does ‘UTF-8’ mean? And what is special about UTF-8 in the Unicode character set? Here you’ll learn about the structure of the coding and which bytes are…

Read more
Image: Which is the best anti-virus software? A comparison

Which is the best anti-virus software? A comparison

Antivirus software has sadly become indispensable as new types of threats against your system continue to emerge. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats,…

Read more
Image: What are cyberattacks and how to prevent themBits And Splitsshutterstock

What are cyberattacks and how to prevent them

Cyberattacks pose a threat to individuals, businesses, and government agencies alike. Criminals are constantly coming up with new techniques to cause as much damage as possible. Their motives vary widely—from pure greed to the pursuit of political goals. But how can you protect…

Read more
Image: What is port scanning?SP-PhotoShutterstock

What is port scanning?

It’s easy to lose track of all the different programs that are responsible for inbound and outbound data traffic. Networks hosting a large number of computer systems that are constantly communicating with online services often require technical backup. High-performance tools…

Read more
Image: What is a penetration test (pen test)?agsandrewshutterstock

What is a penetration test (pen test)?

The more complex a network is, the more vulnerable it is to attacks. In times when customers and partners have access to internal network structures via the internet, and can control various applications via web interfaces, IT employees are encountering more and more problems.…

Read more
Image: WLAN security: the best protection for your networkwk1003mikeShutterstock

WLAN security: the best protection for your network

When you’re travelling with portable devices, you’ll find public WLAN everywhere, giving you access to the world wide web. Even in residential and work spaces, practical wireless networking is widespread. It’s easy to forget that there’s a risk involved when transferring data…

Read more
Image: How to protect your email address on your website from spam

How to protect your email address on your website from spam

Spam robots, so-called harvesters, consistently search the internet for e-mail addresses that can be used for unlawful advertising, phishing e-mails, and spreading viruses, worms, and Trojans. You’re recommended to have your contact details on your website, but how do you stop…

Read more
Image: How to recognise and remove malwareBEST-BACKGROUNDSshutterstock

How to recognise and remove malware

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types…

Read more