Data Protection

Alternatives to Google

Do you still use Google? Or do you prefer to search anonymously? In light of the data protection scandals in recent years, more and more users are turning their back on the leading search engine provider and opting for anonymous search engines. These alternatives to Google, which protect the privacy of the user, are growing more important by the day. So, website operators should keep their options open in the world of search engines. [...]  

Tips for better website security

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions can you be sure that your data stays out of the hands of criminals. [...]  

Image copyright online

Just because a photograph or artwork is available to view on the internet, doesn’t mean that you can use it for your own purposes. The creator’s consent and payment for royalties are often required. The rules don’t solely apply to sharing images that don’t belong to you; even if you use your own, you have to stick to certain guidelines. [...]  

What do EU cookie laws mean for you?

Online cookies used to track behavior online are commonplace in the modern internet world, serving many functions, from storing login information to telling websites which pages you visit. In 2011, EU member states implemented their respective cookie policies, dictated by amendments made in 2009 to the EU directive for privacy and data protection online. But what do these rules mean for UK businesses? And do they affect US website operators? [...]  

The best Google Analytics alternatives

Website tracking is very important in online marketing to be able to see how users are interacting on your site. The first choice is normally the tracking tool offered by the search engine, Google. But for data protection reasons, more and more users are looking for alternatives to Google Analytics. There’s a great selection of web analytics tools – we will examine applications with similar features to those offered by Google Analytics. [...]  

Finding a website host: how to search successfully

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays? [...]  

What is the EU-US Privacy-Shield?

What is the Privacy Shield? The Safe Harbor Agreement’s successor raises questions for many stakeholders in the EU. Even if clear rules for data storage have been assured, there are still countless exceptions. However, the provisions for data storage are particularly important for online companies. This text provides an overview of the EU-US Privacy Shield agreement, which aims to establish legal frameworks for data transfer between the EU and U.S. [...]  

E-mail account hacked: what now?

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to e-mail accounts, and what you can do to regain control of your account if the worst does happen. [...]  

Scamming: How to protect yourself against online fraud

The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money transfers. How does the scam work, and how can you protect yourself? [...]  

E-Mail encryption with PGP

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails. [...]