• Category: Background

    You are looking for a suitable hosting offer for your company. During your search you have certainly come across vServer (Virtual Server) or VPS (Virtual Private Server). Perhaps you have also come across the term VDS (Virtual Dedicated Server). What exactly is the difference between these types of server and what criteria should you look for when choosing one? With this guide, we would like to point out the aspects that are really important.


  • Category: Background, Tips & tutorials

    Regardless of whether it is a free SSL certificate in the open source version or a chargeable SSL encryption - the purpose is the same: All confidential information on a website is encrypted and summarized in the form of a certificate. If so, couldn't everyone get a free SSL certificate? It's not that easy. Some security aspects play a decisive role when choosing a certificate. The current blog post deals with the question in which cases an SSL certificate as a free variant makes sense and in which cases it can bring advantages to fall back on a paid solution.


  • Category: Background

    A suitable domain is the basis for a promising business idea. But a good domain name cannot be found overnight. There are a few things consider before registering a domain. For example - who your desired customers are and whether the domain harmonizes with trademark law. So that you can finally get started online, we have summarized step by step in this blog post how to find a good domain name for your website.


  • Category: Background, Products

    Backup data online in the cloud or locally on a hard drive? In online business in particular, sensitive customer data and internal website data are juggled on a daily basis. A regular local backup should be a prerequisite. But what use is a local backup if this can also be damaged by a short circuit? The 3-2-1 method in combination with a cloud backup could be the solution!


  • Category: Background

    Media literacy and data protection in children play important roles in learning how to safely use digital media in everyday life. Especially nowadays, there is no getting around digital media for children. Rather, in times of home schooling and childcare, digital media have become opportunities and open up new possibilities. However, there is often little time between home office and home schooling or childcare to deal fully with media literacy and data protection for children. In the current blog post we would like to offer parents, teachers or school officials a source of inspiration and go into more detail on how they can improve data protection for children through media literacy. This blog post was written with the pedagogical support of a pedagogue (24) from Leipzig and therefore deals with pedagogical / psychological aspects as well as data protection and technical conditions.


  • Category: Background

    Malware in phishing emails is a major concern of many businesses and individuals. No wonder, because in the digital age there is always the risk of malware being accidentally downloaded via email. One popular strategy cyber criminals use to hide malware in email is through ruthless phishing methods. But how can you identify phishing emails as such? With preventive measures, the risks and consequences of infection with malware through phishing emails can be minimized considerably. In the current blog post, we examined what is behind the malware and how you can protect your IT from phishing attacks with the smallest of measures.