Security

Image: What is an SQL injection?STILLFXshutterstock

What is an SQL injection?

It seems like almost every day a new software vulnerability is uncovered or an existing one is patched. One attack method that has long exploited such weaknesses is the SQL injection. But what exactly are these malicious database exploits, how do they work, and—most…

Read more
Image: Which is the best backup software? A comparisonSimon Brattshutterstock

Which is the best backup software? A comparison

Data loss can have serious consequences. Backup programs offer the ability to regularly back up important data and restore it in case of an emergency. Reliable backup software ensures that data is protected and can be accessed at any time. Which is the best backup software for…

Read more
Image: How can you increase password security?Rawpixel.comshutterstock

How can you increase password security?

Password security is often an underestimated measure in the fight against cybercrime. By choosing strong passwords, using password managers, regularly checking for leaks, and responding appropriately to breaches, you can protect your digital identity. Here, we’ll show you what to…

Read more
Image: How to secure a serverDrHitchShutterstock

How to secure a server

If you operate or rent your own server, it is your responsibility to protect it against outages and unauthorised access. The foundation for this can already be laid when the server is being configured. Proper settings, especially for encrypted remote connections via SSH, can work…

Read more
Image: Which is the best anti-virus software? A comparison

Which is the best anti-virus software? A comparison

Antivirus software has sadly become indispensable as new types of threats against your system continue to emerge. Viruses, worms, Trojan horses, and many other types of malware threaten to infect your system and could cause significant damage. To counteract these threats,…

Read more
Image: What are cyberattacks and how to prevent themBits And Splitsshutterstock

What are cyberattacks and how to prevent them

Cyberattacks pose a threat to individuals, businesses, and government agencies alike. Criminals are constantly coming up with new techniques to cause as much damage as possible. Their motives vary widely—from pure greed to the pursuit of political goals. But how can you protect…

Read more
Image: How to get your domain back after losing domain controliunewindShutterstock

How to get your domain back after losing domain control

When a website suddenly stops responding and you realise you’ve lost domain control, you’re faced with a critical situation. Is it just a technical bug or have cyber criminals possibly hijacked the website? It is important to quickly determine the cause. In this article, we show…

Read more
Image: How to create a photo backup

How to create a photo backup

There are many ways to back up photos. Which solutions are best for backing up your own pictures? Ever-improving image qualities lead to larger image files, and that’s why cloud-based photo backups are coming more and more into focus. How safe is it to store your photos there and…

Read more
Image: What is SIEM (Security Information & Event Management)?

What is SIEM (Security Information & Event Management)?

With timely warnings, cyber threats can be reliably identified and averted. The question is where to get the data from and how to draw the right conclusions. This is where SIEM, short for Security Information & Event Management, comes into play. Any suspicious incidents and…

Read more
Image: What is XDR (Extended Detection and Response)?

What is XDR (Extended Detection and Response)?

Modern IT architectures consist of multiple end devices, applications, clouds and networks. This results in hybrid cyber threats that cannot be reliably fended off with traditional antivirus solutions. XDR (Extended Detection and Response) offers a holistic SaaS security concept…

Read more