Security

The best online backup services

Comparing the best online backup services

Many people use several devices and have data stored on them. What should you do if your data carrier fails or the data gets lost? Backing up data is extremely important and an online backup makes perfect sense. By doing this, you don’t risk losing your important files due to a system crash or criminal activitiy. What is the best option? Here is a comparison of online backup service providers.

SAML

SAML: the XML framework for SSO at a glance

Simplifying log-in processes makes websites more user friendly, and also helps to increase the security of user data. One of the most popular solutions for implementing authentication processes is SAML (security assertion mark-up language). Through a variety of components such as special protocols and message formats, this XML-based framework helps to implement internal and cross-company log-on...

Honeypots: IT security through decoy programs

What is a honeypot?

Businesses use IDSs (intrusion detection systems) and firewalls in order to keep attackers away from sensitive IT systems. These safeguards can be enhanced through so-called honeypots, which bait hackers to isolated network areas where more information on their attack patterns can be collected. Find out more here on how honeypots work and with which programs honeypots can be implemented for both...

What is cybersecurity? The current dangers

Cybersecurity – digitally protected on the go

More and more dangers are creeping into the digital world. So it is no surprise that the issue of cybersecurity is gaining more and more weight and is taking a leading role in the fight against cybercrime. But how can you protect yourself from dangers on the network? And what is the current state in the UK? We provide you with an overview of this.

1Password Alternatives

1Password alternatives: the best password managers

Password managers are extremely practical tools to help remember the passwords for the many online accounts you may have. They usually work via browser extensions or desktop apps, and are available across most operating systems. Among the many password managers, 1Password has established itself as a solid tool for many users. However, 1Password is relatively expensive and there are doubts about...

Using SSH keys for your network connection

How to use SSH keys for your network connection

Operating and managing a remote server located in a data centre is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

Web analytics and data privacy

Web analytics: data privacy when creating a profile

Tracking tools can provide website operators with a useful indication on how to adapt an online project to suit a target group. These tools focus on user profiles, which reveal how users find the website, and which content provokes interactions. This information is based on user data, which can be subject to stringent data protection guidelines in some countries within the European Union. Find out...

SMTP-Auth

What is SMTP authentication? Secure e-mail against spam

Is your mail server configured with SMTP AUTH? If not, you should do so as soon as possible. Professional spammers are happy to see every open relay that they can use for the distribution of their junk mail. Such spam is not only hassle for the receiver, but also unnecessarily increases your server traffic and damages your online reputation. This security gap can be closed with the simple ESMTP...

Email encryption with SSL

Sending encrypted emails over SSL or TLS

Are your emails encrypted when you send and receive them? If not, there’s no time like the present! Encrypting your email is the only way to ensure it arrives safely at its destination. Otherwise sensitive data such as passwords, bank details or addresses, could be available for anyone to read. The simplest solution is the SSL transfer protocol.

How to protect your website from malware

Malware on the server: consequences and countermeasures

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.