Data Protection

What is the EU-US Privacy-Shield?

What is the EU-US Privacy-Shield?

What is the Privacy Shield? The Safe Harbor Agreement’s successor raises questions for many stakeholders in the EU. Even if clear rules for data storage have been assured, there are still countless exceptions. However, the provisions for data storage are particularly important for online companies. This text provides an overview of the EU-US Privacy Shield agreement, which aims to establish legal...

S/MIME: the standard method for e-mail encryption

S/MIME: the standard method for e-mail encryption

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...

The best Google Analytics alternatives

The best Google Analytics alternatives

Website tracking is very important in online marketing to be able to see how users are interacting on your site. The first choice is normally the tracking tool offered by the search engine, Google. But for data protection reasons, more and more users are looking for alternatives to Google Analytics. There’s a great selection of web analytics tools – we will examine applications with similar...

Finding a website host: how to search successfully

Finding a website host: how to search successfully

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

E-mail account hacked: what now?

E-mail account hacked: what now?

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to...

Scamming: How to protect yourself against online fraud

Scamming: How to protect yourself against online fraud

The internet is not new territory for scammers: Scamming encompasses all tricks that criminals use online in chats, via mail, or over social networks, to get unsuspecting people to give them their money. The criminals play their victims through deceitful methods on almost every platform across the internet: They build up a relationship, and eventually, lead their victims to make advance money...

PrestaShop – the modular system for e-commerce

PrestaShop – the modular system for e-commerce

The search for the perfect software to meet your requirements of design and functionality for e-commerce can be a long and tedious affair. Some platforms just don’t quite give you the design you’re after, while others might look great but lack important shop functions like flexible payment methods, legal certainty, or optimization for mobile devices. PrestaShop was developed especially for...

Display advertising vs. real-time advertising (RTA)

Display advertising vs. real-time advertising (RTA)

Banner ads and other forms of display marketing have been proven to be effective marketing strategies for products and services online. The new practice in this field is real-time advertising (RTA) and its real-time bidding (RTB) approach. This new strategy carries out an automated bidding war in milliseconds to decide which ad will be displayed. But how does it differ from traditional display...

What is a network attached storage (NAS)?

What is a network attached storage (NAS)?

Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...

10 tips for legal certainty for your online store

10 tips for legal certainty for your online store

In recent years, many online shops found themselves receiving warnings due to not properly adhering to website legalities. Given the growing number of online businesses, it’s not surprising that companies are now springing up, which specialize in identifying legal violations and then fine the operator. If you want to start up your own online store, you need to make it and the products on offer...