Devices and systems

Devices and systems

Please choose a topic: password protection, secure hardware and software, child protection or digital legacy.

Password protection

zwei-faktoren-authentifizierung-en

Use two-factor authentication to add an extra layer of security to your accounts

A strong password is an important means of protecting your privacy on the Internet. Two-factor authentication takes data security a step further.

Software-Download-neu

What you should know about password managers

Keep your login data safe and secure.  How to stay on top of all passwords with a password manager. 

Gesichtserkennung-EN

Fingerprints and face recognition instead of passwords?

Is biometric data secure? How our skin protects our smartphone – and where it needs additional protection.

Secure hardware and software

Mac-absichern-en

How to correctly secure your Mac

Computer malware is mostly written for Windows. However, you should not take the security of your Mac lightly.

Datenschutz-unter-Windows-en

More privacy and security in Windows

Turn on Windows functions for more protection and a healthy measure of privacy when working at your PC.

Tablets optimal und sicher nutzen-en

Get the best out of your tablet – securely

The on-trend look and many entertainment functions of a tablet often keep us from remembering that they, too, are computers that are subject to attacks and therefore need protecting.

33-neu

Tips for more Android security

Screen locks, system updates, and backups – a few basic rules will help you to protect your mobile phone.

Illustration image: Install Wi-Fi network securely.

Opening ports on the router

Keep your digital skin’s defenses strong and protect your router from external cyberattacks.

Illustration: Sicheres WLAN einrichten

How to set up a secure Wi-Fi network

Cybercriminals exploit wireless networks with inadequate connections to search computers or smart TVs. Protect your home network from attackers.

Software-Download-nochneuer

Keep your eyes open

Pay attention to what data you are loading onto your devices, because computer viruses can sneak into programs or games when you download them.

36neu

Protection for VoIP calling

Voice over IP systems could also be described as computers with special purposes, and they need to be protected from attackers.

Illustration Smart Home

Smart Home? Rest assured!

A smart home can make life within your own four walls safer and better. How to make your smart devices immune to attacks.

21-neu

Tune your Smartphone with caution

For security reasons, manufacturers seal off the core of their operating systems. Be careful when tweaking your smart phone.

Prevent data loss.

Computer data security begins with a good backup

A good backup forms the basis of a secure system. How to create a digital clone of your precious data.

Erste Hilfe bei Computernotfällen.

Why you need a rescue CD to save your data

If the computer no longer starts up in the usual manner, there may be many causes. An emergency CD gives you a chance to recover your precious data. 

33-nochneuer-browser

Seven security tips for any browser

The browser is one of the most important programs you have on your computer. Improve online security in a few simple steps.

Illustration Cloud

Sync your data securely through the cloud

It is easy and convenient to sync your data with the cloud. Encryption keeps your data safe, even online.

Child protection

mehr-Schutz-für-Kinder-en

More protection for children

Computers and the internet are endlessly fascinating for kids and teenagers.  How to find a healthy dose of screen time.

Digital legacy

How to Plan Your Digital Legacy

How to Plan Your Digital Legacy

How can you decide what will happen to your data well in advance, so that digital memories will not fall into the wrong hands?

FAQ Share
Two clicks for more data privacy: click here to activate the button and send your recommendation. Data will be transfered as soon as the activation occurs.