• Category: Background

    A suitable domain is the basis for a promising business idea. But a good domain name cannot be found overnight. There are a few things consider before registering a domain. For example - who your desired customers are and whether the domain harmonizes with trademark law. So that you can finally get started online, we have summarized step by step in this blog post how to find a good domain name for your website.


  • Category: Background, Products

    Backup data online in the cloud or locally on a hard drive? In online business in particular, sensitive customer data and internal website data are juggled on a daily basis. A regular local backup should be a prerequisite. But what use is a local backup if this can also be damaged by a short circuit? The 3-2-1 method in combination with a cloud backup could be the solution!


  • Today is World Backup Day. A day to remind you to make a copy of important data and back it up with various backup types. The aim of a backup is known. But a simple copy is not enough to restore server data in the event of phishing, power failure or hardware failure: A good backup strategy is required. In this blog post you will learn which backup types you can use to secure your data and what a grandfather has to do with your backup strategy.


  • Category: Background

    Media literacy and data protection in children play important roles in learning how to safely use digital media in everyday life. Especially nowadays, there is no getting around digital media for children. Rather, in times of home schooling and childcare, digital media have become opportunities and open up new possibilities. However, there is often little time between home office and home schooling or childcare to deal fully with media literacy and data protection for children. In the current blog post we would like to offer parents, teachers or school officials a source of inspiration and go into more detail on how they can improve data protection for children through media literacy. This blog post was written with the pedagogical support of a pedagogue (24) from Leipzig and therefore deals with pedagogical / psychological aspects as well as data protection and technical conditions.


  • Category: Background

    Malware in phishing emails is a major concern of many businesses and individuals. No wonder, because in the digital age there is always the risk of malware being accidentally downloaded via email. One popular strategy cyber criminals use to hide malware in email is through ruthless phishing methods. But how can you identify phishing emails as such? With preventive measures, the risks and consequences of infection with malware through phishing emails can be minimized considerably. In the current blog post, we examined what is behind the malware and how you can protect your IT from phishing attacks with the smallest of measures.


  • Category: Background

    Perspectives of the programmer

    From Antikythera to Artificial Intelligence - is this the end or the beginning of IT jobs in the future? We are right in the middle of it all, in the fast digital age. Programming goes back a long way and programmers are still more in demand than ever. But will that change in the age of artificial intelligence and automation? This is not so strange at all, because just as the occupation of assembly line workers changed through innovation in the industrial age, so may the meaning of the programming profession in the future. Will intelligent systems soon be doing the work of programmers? And does it even make sense to become a programmer? We will address these questions, travel to the origins of IT jobs and programming, and dare to look to the future.