Data Protection

What is Big Data?

What is Big Data?

When we shop online, book vacations, and search for gift ideas, we hardly give a second thought to the fact that each search entry leaves behind a trail of our identity. Busy web bots are never far behind and sweep up this information. The result of all of this is Big Data: massive volumes of data that are analyzed and used for a variety of reasons. But is there reason to be wary of leaving behind...

Social plugins and privacy

Social plugins and privacy

For website operators looking to increase their outreach, the advantages of social media buttons are obvious; content can be spread and followers can be generated with just one click of the ‘Tweet’ button, the ‘Like on Facebook’ social plugin, or the ‘Follow on Instagram’ link. These helpful extensions are great tools for expanding an internet presence, but critics warn that these plugins don’t go...

Online identity theft protection

Online identity theft protection

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just mere phantasies of screenwriters; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of...

How to recognize and remove malware

How to recognize and remove malware

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types of malicious software that exist, and how to combat and safely remove them.

E-Mail encryption with PGP

E-Mail encryption with PGP

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber criminals get their hands on your content by encrypting your e-mails.

Data mining: analysis methods for big data

Data mining: analysis methods for big data

The total amount of data generated worldwide increases by 40% every year. Many companies seek to make use of the constantly increasing mountain of data in order to increase their e-commerce business. But making use of such Big Data alone doesn’t add any value — enter data mining. Below you can find a discussion of the various analysis approaches involved in data mining, to give you an idea of how...

Linking restrictions due to ECJ judgement

Linking restrictions due to ECJ judgement

There are boundaries when it comes to linking. These boundaries have now been officially confirmed by the European Court of Justice (ECJ) in its judgement on the September 8th, 2016. Website operators that place hyperlinks with commercial intent are obliged to check the legality of the online content that is being linked to. According to the ECJ, private internet users aren’t expected to check,...

Tips for better website security

Tips for better website security

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions...

What is a proxy server?

What is a proxy server?

A proxy server is a network component that provides an interface between a private network and the internet. A proxy makes it possible to have an influence on the data traffic, to cache packet data, and to conceal the identity of the communication partners by using different IP addresses.

Image copyright online

Image copyright online

Just because a photograph or artwork is available to view on the internet, doesn’t mean that you can use it for your own purposes. The creator’s consent and payment for royalties are often required. The rules don’t solely apply to sharing images that don’t belong to you; even if you use your own, you have to stick to certain guidelines.