Security

Image: How to set up the Outlook spam filter and customise itRawpixel.comShutterstock

How to set up the Outlook spam filter and customise it

The Outlook spam filter moves unwanted and potentially malicious spam emails to the Junk folder. Even promotional emails that don’t meet typical spam criteria can be kept out of your inbox with the right settings. If legitimate messages are mistakenly flagged, the Outlook Junk…

Read more
Image: How to change your Outlook password step by step

How to change your Outlook password step by step

Outlook makes it easy to manage email accounts from various providers within a single interface. All it needs are the correct mail server settings and your login credentials. If you change your password, you simply need to update it in the client’s settings. But how exactly do…

Read more
Image: What is a reverse proxy? Core components in security architecturewatcharashutterstock

What is a reverse proxy? Core components in security architecture

Servers offering online services and requiring a continuous internet connection are prime targets for cybercriminals. These can be better protected by using a network component positioned in front—the reverse proxy. It collects incoming requests, adding an extra layer of…

Read more
Image: What is an SQL injection?STILLFXshutterstock

What is an SQL injection?

It seems like almost every day a new software vulnerability is uncovered or an existing one is patched. One attack method that has long exploited such weaknesses is the SQL injection. But what exactly are these malicious database exploits, how do they work, and—most…

Read more
Image: Which is the best backup software? A comparisonSimon Brattshutterstock

Which is the best backup software? A comparison

Data loss can have serious consequences. Backup programs offer the ability to regularly back up important data and restore it in case of an emergency. Reliable backup software ensures that data is protected and can be accessed at any time. Which is the best backup software for…

Read more
Image: How can you increase password security?Rawpixel.comshutterstock

How can you increase password security?

Password security is often an underestimated measure in the fight against cybercrime. By choosing strong passwords, using password managers, regularly checking for leaks, and responding appropriately to breaches, you can protect your digital identity. Here, we’ll show you what to…

Read more
Image: How to secure a serverDrHitchShutterstock

How to secure a server

If you operate or rent your own server, it is your responsibility to protect it against outages and unauthorised access. The foundation for this can already be laid when the server is being configured. Proper settings, especially for encrypted remote connections via SSH, can work…

Read more
Image: Which is the best anti-virus software? A comparison

Which is the best anti-virus software? A comparison

Antivirus software has sadly become indispensable as new types of threats against your system continue to emerge. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats,…

Read more
Image: What are cyberattacks and how to prevent themBits And Splitsshutterstock

What are cyberattacks and how to prevent them

Cyberattacks pose a threat to individuals, businesses, and government agencies alike. Criminals are constantly coming up with new techniques to cause as much damage as possible. Their motives vary widely—from pure greed to the pursuit of political goals. But how can you protect…

Read more
Image: How to get your domain back after losing domain controliunewindShutterstock

How to get your domain back after losing domain control

When a website suddenly stops responding and you realise you’ve lost domain control, you’re faced with a critical situation. Is it just a technical bug or have cyber criminals possibly hijacked the website? It is important to quickly determine the cause. In this article, we show…

Read more