Data Protection

General Data Protection Regulation: New rules for businesses

General Data Protection Regulation: New rules for businesses

On 25 May 2018 a new European law on data protection came into place. However, many companies and website operators are still unprepared for the new General Data Protection Regulation (GDPR) despite it being relevant to their day-to-day business. On top of this, high fines will be imposed for those violating the regulations. Here we summarize everything worth knowing on the new EU GDPR for...

Data protection in e-commerce

Data protection in e-commerce

Data protection and security in the area of e-commerce can be particularly tricky. Users are constantly leaving behind traces online - regardless of whether they are making online orders or simply surfing the web. Consumer data can be of great interest to businesses. It gives them the opportunity to advertise and make offers to potential customers. But which data are you actually allowed to...

E-mail marketing trends

E-mail marketing trends

To ensure that your newsletter campaigns continue to be effective in the future, you shouldn’t miss these e-mail marketing trends in 2018: more automation possibilities, new design options, stricter data protection, and things that are made possible thanks to artificial intelligence. In our article on this year’s newsletter trends, we explain what you should look for in your future strategies and...

Replacing an SSL Certificate affected by Browser Distrust

Replacing an SSL Certificate affected by Browser Distrust

Due to browser community distrust in Symantec, Google Chrome and Mozilla Firefox have decided to distrust websites with SSL certificates issued by Symantec before December 1st, 2017. This article outlines the steps and important key dates that website operators need to be aware of in order to sucessfully renew or replace their SSL certificates before their website is branded with a warning...

Using SSH keys for your network connection

Using SSH keys for your network connection

Operating and managing a remote server located in a data center is often carried out by using a secure network connection provided by the SSH protocol. The necessary registration on the server is preceded by an authentication process. Usually this occurs in the form of the username and password. Alternative methods such as the public key authentication used by SSH, do have their advantages. But...

Password managers: an overview of today’s best tools

Password managers: an overview of today’s best tools

Would you give your bank account pin number to a stranger? Certainly not. However, this is essentially just what you are doing if you don’t secure your online banking log-in with a password that can’t be figured out by hackers in a matter of seconds. In order to be able to create and manage all of your passwords in a completely secure way, it is worth making use of a password manager.

Protect sensitive data with a strong password

Protect sensitive data with a strong password

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.

Gain users’ confidence with a privacy policy

Gain users’ confidence with a privacy policy

Website owners often underestimate the importance of privacy policies, but they are essential for clarifying what kind of user data the website collects, and what happens with it. But is a privacy policy essential for your website, and if so, what details should it include?

A case for thinking global: Germany’s Impressum laws

A case for thinking global: Germany’s Impressum laws

In today’s globalized world, strong bull markets on the home front simply aren’t enough if you wish to turn your company into a true Unicorn. Branching out into the world is a task that requires understanding and respect for different cultures and their laws. Failing to take such nuances into account may not only turn potential clients and customers off, it can also be the source of other, more...

Server Name Indication

Server Name Indication

What is server name identification, really? Encryption technologies play a big role when it comes to surfing on the net. Credit card data and other personal information must not fall into the hands of criminals. For now, TLS is one of the protocols used for this purpose. But it has a disadvantage: it only functions when each IP address only hosts one domain. If multiple virtual services are...