DKIM (DomainKeys)
What is a DKIM record and how to create a DKIM record?
  • E-Mail security

Fake emails pose a major threat to recipients. At the same time, it’s becoming increasingly difficult to verify the authenticity of emails and sender addresses. One effective method of verifying the sending mail server and checking the authenticity of emails is called DKIM (DomainKeys Identified Mail). What is DKIM and how do you set it up?

What is a DKIM record and how to create a DKIM record?
How to recognize spam e-mails and prevent them
How to recognize spam e-mails and how to prevent them
  • E-Mail security

Billions of spam e-mails are sent daily. These annoying messages cost time and get on your nerves, especially when malware finds its way onto your computer or private data falls into the wrong hands. Just a few small tricks and a bit of caution when dealing with e-mails can remedy the situation.

How to recognize spam e-mails and how to prevent them
Gmail spam filter
Gmail spam filter - How to set it up and customize it
  • E-Mail security

Gmail’s spam filtering functions completely independently and achieves great results. However, the defense works even better if you configure the Gmail spam filter settings and optimize them over time. In this text, we will explain what options you have with the spam filter and what you should bear in mind when using it.

Gmail spam filter - How to set it up and customize it
Outlook spam filter
Outlook spam filter: How to set up, customize and check the junk filter
  • E-Mail security

The Outlook spam filter automatically moves unwanted and potentially fraudulent emails to the junk folder. Even junk mail that doesn’t meet the typical spam criteria can be kept out of your Outlook inbox with the right settings. In case of errors, the Outlook junk filter can be easily adjusted manually.

Outlook spam filter: How to set up, customize and check the junk filter
Two factor authentication: Protection for your accounts
Two-factor authentication: How to protect your accounts with 2FA
  • E-Mail security

Poorly secured accounts on the web have repeatedly led thousands of people to become victims of hacking or phishing attacks and lose control of their accounts. With a two factor authentication, accounts can effectively be protected against such cases. Because more than just a password is required for log-in, internet criminals can’t do much with the spied credentials. Here, we explain how two...

Two-factor authentication: How to protect your accounts with 2FA
Changing an Outlook Password
How to change password in Outlook for mail accounts, data files, and in the web app
  • E-Mail security

Microsoft Outlook is one of the most popular client solutions for retrieving and managing e-mails. Using the software, multiple e-mail accounts can be easily combined and controlled through one interface. For this purpose, Outlook only needs information about the corresponding mail server and the respective log-in data. If you change these, you only have to adjust them in the client settings. But...

How to change password in Outlook for mail accounts, data files, and in the web app
S/MIME: the standard method for e-mail encryption
S/MIME: How to encrypt and sign your emails?
  • E-Mail security

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...

S/MIME: How to encrypt and sign your emails?
1Password Alternatives
1Password alternatives: The best 5 password managers
  • E-Mail security

Password managers are extremely practical tools to help remember the passwords for the many online accounts you may have. They usually work via browser extensions or desktop apps, and are available across most operating systems. Among the many password managers, 1Password has established itself as a solid tool for many users. However, 1Password is relatively expensive and there are doubts about...

1Password alternatives: The best 5 password managers
E-mail account hacked: what now?
What to do if your e-mail is hacked? How to find out
  • E-Mail security

E-Mail accounts are one of our most important communication tools: we use them to register for online portals, for private and business exchanges, and as an organizer and digital address book. It is therefore all the more important to make sure your account is well-protected. But what if your e-mail account does get hacked? Our guide explains what methods internet criminals use to gain access to...

What to do if your e-mail is hacked? How to find out
What is an SPF record?
What is an SPF record and how to use it
  • E-Mail security

How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?

What is an SPF record and how to use it