Data Protection

Protect WordPress with Google Authenticator
Protect your WordPress user account with Google Authenticator
  • Blogs

With Google Authenticator, you can combine classic username and password login to your WordPress site with an additional security code. Find out how to increase the security of your website in this handy article.

Protect your WordPress user account with Google Authenticator
Tips for legal certainty for your online store
How to make your online store legally watertight
  • Online sales

In recent years, many online stores found themselves receiving warnings due to not properly adhering to website legalities. Given the growing number of online businesses, it’s not surprising that companies are now springing up, which specialize in identifying legal violations and then fining the operator. Therefore, it’s all the more important to understand the legal basics of your web store to...

How to make your online store legally watertight
Image copyright online
The most important facts on image copyright online
  • Digital law

Just because a photograph or artwork is available to view on the internet, doesn’t mean that you can use it for your own purposes. The creator’s consent and payment for royalties are often required. The rules don’t solely apply to sharing images that don’t belong to you; even if you use your own, you have to stick to certain guidelines.

The most important facts on image copyright online
What is the EU-US Privacy-Shield?
Privacy Shield – controversial data transfer agreement between the EU and the US
  • Digital law

For some years, the Privacy Shield has regulated the transfer of personal data from the EU to the US. But in July 2020, the Court of Justice for the European Union (CJEU) invalidated the Privacy Shield. For many companies, the end of the privacy agreement came as a complete surprise. What were the contents of the EU-US Privacy Shield, what made it fail, and what do SMEs have to take into account...

Privacy Shield – controversial data transfer agreement between the EU and the US
Finding a website host: how to search successfully
Host: how to find out which provider is most suitable for your project
  • Technical matters

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

Host: how to find out which provider is most suitable for your project
Data mining: analysis methods for big data
Data mining: analysis methods for big data
  • Web analytics

The total amount of data generated worldwide increases by 40% every year. Many companies seek to make use of the constantly increasing mountain of data in order to increase their e-commerce business. But making use of such Big Data alone doesn’t add any value — enter data mining. Below you can find a discussion of the various analysis approaches involved in data mining, to give you an idea of how...

Data mining: analysis methods for big data
Tips for better website security
Website security: how to protect your web presence
  • Website creation

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions...

Website security: how to protect your web presence
Terminal Servers – the Secret Behind Remote Hosts
Terminal servers: definition, basics, and advantages
  • Know-how

In the days of mainframe computers and the first smaller networks, terminals were a crucial building block for sharing hardware and software resources. It is no coincidence that terminal servers – the central administrative entity of such networks – are in demand decades later, now that applications are to be made available to multiple users.

Terminal servers: definition, basics, and advantages
The best Google Analytics alternatives
The best Google Analytics alternatives
  • Web analytics

Website tracking is very important in online marketing to be able to see how users are interacting on your site. The first choice is normally the tracking tool offered by the search engine, Google. But for data protection reasons, more and more users are looking for alternatives to Google Analytics. We will examine applications with similar features to those offered by Google Analytics.

The best Google Analytics alternatives
What is a network attached storage (NAS)?
Network attached storage (NAS): the basics of network storage
  • Know-how

Growing sums of data require cost-effective, high-performance storage solutions. One option for fulfilling this requirement is a network attached storage. In business contexts, this model has already established itself as a viable alternative to file servers, hard drives, and the cloud. Private users have also caught on and use NAS systems at home. But what is a NAS? Read on, and we’ll show you...

Network attached storage (NAS): the basics of network storage