Data Protection

What are the best WeTransfer alternatives? 6 solutions comparedpixelparticleshutterstock

What are the best WeTransfer alternatives? 6 solutions compared

Those who have previously worked with WeTransfer, will be all too familiar with its basic principle: users can share large files without logging in or installing software. All you need to enter is the recipient’s email address. This was revolutionary when the platform first…

Read more
How to create a strong password

How to create a strong password

It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for…

Read more
What is the best password manager?wk1003mikeShutterstock

What is the best password manager?

Would you give your account number to a stranger? Most probably not. But millions of internet users may as well be giving away their personal data (and money!) when using passwords that hackers can crack in a matter of seconds. Password managers provide methods for creating and…

Read more
How to turn off push notifications

How to turn off push notifications

Push notifications provide you with up-to-the minute information like messages and news updates. But if you have notifications activated for too many apps, you can quickly lose track of what’s going on. Luckily, it takes just a few clicks to deactivate unnecessary notifications.…

Read more
How to turn on push notifications

How to turn on push notifications

Push notifications are a great way to stay up to date on app and website news. Enabling push notifications is a breeze if you know how to do it. Learn how to turn on push notifications on your browser and your apps in just a few clicks, and how to customize and manage your…

Read more
How to recognize and remove malware

How to recognize and remove malware

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types…

Read more
What to do if your email is hacked? Steps to follow asap

What to do if your email is hacked? Steps to follow asap

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But…

Read more
How to remove personal information from Google

How to remove personal information from Google

The internet never forgets – is it always true? In some cases, search engines are obliged to grant users permission to delete defamatory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to…

Read more
How to use PGP encryption for email

How to use PGP encryption for email

Online privacy is a sensitive issue that affects experts and amateurs alike. Whether you’re posting on social networks, carrying out banking transactions, or buying from an online store, your data is not always sufficiently protected. The same applies to e-mails. Don’t let cyber…

Read more
9 email marketing trends for 2024

9 email marketing trends for 2024

To ensure that your newsletter campaigns continue to be effective in the future, you shouldn’t miss out on these email marketing trends in 2024. There are even more automation possibilities, new design options and stricter data protection. In our article on this…

Read more
We use cookies on our website to provide you with the best possible user experience. By continuing to use our website or services, you agree to their use. More Information.
Page top