Security

3-2-1 backup rule

3-2-1 backup rule: maximum security for your data

In our digital age data is more important than ever before. This also means that the risks of partial or complete data loss are high. Luckily, there are plenty of options to back up your data. The 3-2-1 backup rule is one such formula. Find out what it means and how private individuals and companies can make the best use of the 3-2-1 backup.

Client to Authenticator Protocol (CTAP)

CTAP: A protocol for more security & convenience on the web

Try and imagine a world where you don’t have to memorise passwords: Thanks to FIDO2, this could soon become a reality. Authentication in online shops or for online banking can be done through a fingerprint or hardware token. The latter can communicate with laptops of PCs through a USB, NFC or Bluetooth. To enable conversations between two devices, FIDO2 uses the Client to Authenticator Protocol...

DRaaS

Disaster Recovery as a Service (DRaaS): the more advanced backup

Throughout the course of digitisation, employees and employers became aware of the importance of backups. The 3-2-1 rule was considered the golden rule - where two redundant copies of each file are kept. As technology continues to evolve, cloud-based solutions are becoming more popular. Thus, Disaster Recovery as a Service has established itself as an important cloud service.

Cloud disaster recovery

Cloud Disaster Recovery: well-prepared for worst case scenario

One of the biggest tasks for IT managers is to ensure the long-term security of data, software, and hardware. Where issues arise, a rapid recovery is essential. Cloud Disaster Recovery (Cloud DR) is a concept that is ideally suited for these purposes. But what exactly distinguishes cloud protection and how does it differ from conventional backup solutions?

Data sovereignty

Data sovereignty: an explanation

What happens to digital data after a company stores contacts, emails, and files in the cloud? Businesses that work with third-party providers need to know who retains data sovereignty over business and customer data when it is stored on external servers. Read on to find out how data sovereignty is legally regulated.

What is a backup?

What is a backup and how does it effectively protect your data?

Technical issues, hacker attacks, and malware can lead to costly and serious data loss at any time. To minimise the risks, it is recommended that you perform regular comprehensive backups. It is important to have a suitable backup strategy that properly meets your specific requirements.

Move Google Authenticator to a new phone

Transfer Google Authenticator to a new phone – easy as 1-2-3

Secured your Google account with the Google Authenticator app and now want to switch phones? No problem. You can simply move the app or account link. Read on to find out how to transfer Google Authenticator to your new phone and what you need to consider when moving to a new number or keeping your existing one.

Set up Google Authenticator

Set up Google Authenticator

Whether emails or online banking, two-factor authentication has become a security standard when accessing user accounts online. Entering a password alone is no longer sufficient to log in. To secure your Google account, the Internet giant provides its own Google Authenticator app, which generates a unique code every time you log in. Read on to find out how to set it up.

Encryption methods: An overview

Encryption methods: An overview

E-mail, instant messaging, or voice-over IP: If you want to communicate over the internet, you should make sure that the data transfer process can be trusted. The same goes for the World Wide Web. With online banking and digital shopping, money transactions are increasingly being carried out online. Popular encryption methods like DES, AES, or RSA should guarantee the security of passwords, credit...


Own your online success
IONOS takes care of your online challenges
Create your website with the perfect domain and the UK's fastest hosting!