Communicating and surfing

Communicating and surfing

Please choose a topic: mails, surfing, social media and more.

Mails

sicher-mit-Mails-umgehen-en

How to handle email securely

If an infected email is simply deleted, nothing can happen. More caution will keep you immune to Trojans and viruses.

Mailverschlüsselung-en

How to encrypt emails

Email is part of everyday life, whether for work or personal purposes. Protect your electronic mail effectively.

Surfing

Prevent data loss.

How to tell if you are browsing with a secure connection

Whether you are banking or shopping online, bear these tips in mind so that confidential information stays confidential.

More cyber security – step by step.

Protect your privacy online

Tracking systems log your every step on the internet. There is a risk of becoming too transparent as a user. 

Social media

Sicherer kommunizieren mit WhatsApp-en

Communicate more securely with WhatsApp and others

Messaging services have almost completely overtaken texting. A few ground rules for security while communicating with a messenger.

More topics

36neu

Protection for VoIP calling

Voice over IP systems could also be described as computers with special purposes, and they need to be protected from attackers.

Besser mit Desktop-Sharing und Videokonferenzen arbeiten-en

Do better work with desktop sharing and videoconferencing

Desktop sharing lets you save lots of time on business communication, especially when the parties are in different locations.

mehr-Schutz-für-Kinder-en

More protection for children

Computers and the internet are endlessly fascinating for kids and teenagers.  How to find a healthy dose of screen time.

Cybermobbing-Beleidigung-en

Fight cyberbullying and insults

No one is without their rights on the internet. This article tells you what cyberbullying is, what you can do about it, and how you can best prevent it.

Illustration: App-Berechtigung

Strip those snoopy apps of their rights

Not every app needs access to photos or contacts. How to ensure minimal access to your personal data.

How to Plan Your Digital Legacy

How to Plan Your Digital Legacy

How can you decide what will happen to your data well in advance, so that digital memories will not fall into the wrong hands?

FAQ Share
Two clicks for more data privacy: click here to activate the button and send your recommendation. Data will be transfered as soon as the activation occurs.