current page:Devices and systems
Please choose a topic: password protection, secure hardware and software, child protection or digital legacy.
How to find a strong and secure password
A simple system lets you create individual passwords for every situation.
Use two-factor authentication to add an extra layer of security to your accounts
A strong password is an important means of protecting your privacy on the Internet. Two-factor authentication takes data security a step further.
How to proceed
What you should know about password managers
Keep your login data safe and secure. How to stay on top of all passwords with a password manager.
How to find the right system
Fingerprints and face recognition instead of passwords?
Is biometric data secure? How our skin protects our smartphone – and where it needs additional protection.
Important to know
How to correctly secure your Mac
Computer malware is mostly written for Windows. However, you should not take the security of your Mac lightly.
Tips and instructions
More privacy and security in Windows
Turn on Windows functions for more protection and a healthy measure of privacy when working at your PC.
How to protect your system
Get the best out of your tablet – securely
The on-trend look and many entertainment functions of a tablet often keep us from remembering that they, too, are computers that are subject to attacks and therefore need protecting.
More security for Android devices and iPads
How to protect your mobile
Four important tips to protect your mobile.
Tips for more Android security
Screen locks, system updates, and backups – a few basic rules will help you to protect your mobile phone.
Pay attention to this
Do you need a virus scanner for your Android smartphone?
Threats to Android systems are making the headlines with increasing frequency. How to keep viruses and Trojans off your smartphone.
Health check for the smartphone
How to make your router safe
Six important tips to protect your router.
Opening ports on the router
Keep your digital skin’s defenses strong and protect your router from external cyberattacks.
What you need to know
How to set up a secure Wi-Fi network
Cybercriminals exploit wireless networks with inadequate connections to search computers or smart TVs. Protect your home network from attackers.
Step by step instructions
Keep your eyes open
Pay attention to what data you are loading onto your devices, because computer viruses can sneak into programs or games when you download them.
Tips for mor security
Protection for VoIP calling
Voice over IP systems could also be described as computers with special purposes, and they need to be protected from attackers.
How to exclude hackers from listening
Smart Home? Rest assured!
A smart home can make life within your own four walls safer and better. How to make your smart devices immune to attacks.
Tune your Smartphone with caution
For security reasons, manufacturers seal off the core of their operating systems. Be careful when tweaking your smart phone.
Knowing the risks
Computer data security begins with a good backup
A good backup forms the basis of a secure system. How to create a digital clone of your precious data.
How to back up
Why you need a rescue CD to save your data
If the computer no longer starts up in the usual manner, there may be many causes. An emergency CD gives you a chance to recover your precious data.
First aid for computer emergencies
Seven security tips for any browser
The browser is one of the most important programs you have on your computer. Improve online security in a few simple steps.
Sync your data securely via the cloud
Cloud services are convenient because they allow you to store data on multiple devices in sync. With encryption and a trusted provider, your data remains safe in the cloud.
Secure data in the cloud
Starting at the beginning: how you leave your devices sparkling clean
Erase your data easily.
More protection for children
Digital media exert a tremendous fascination on children and young people. Protect your offspring from dangers by setting up parental controls and teaching media literacy.
Tips and Instructions
How to Plan Your Digital Legacy
How can you decide what will happen to your data well in advance, so that digital memories will not fall into the wrong hands?
Please activate “Services from other Companies” in your settings.
The service isnt available at the moment. If you use an ad blocker, please deactivate it, to be able to use this functionality.