
Corporations require a different approach to IT security than private users
Time to read:
2 min
In reaction to the cyber-attack on politicians and celebrities at the turn of the year, everyone is recommending email encryption direct in your email [...] Read more

How can companies protect themselves and their employees against hacking?
Time to read:
3 min
After private data belonging to politicians and public figures was published online in December 2018, we did not have to wait long for new security [...] Read more

What corporations need to learn from the cyber-attack on politicians and celebrities
Time to read:
3 min
Since the 2018/19 cyber-attack on public figures, IT security is once again a hot topic in Germany. A 20-year-old man posted the personal contact details [...] Read more

Are my TLS-encrypted emails EU GDPR compliant?
Time to read:
3 min
Spontaneously encrypting with TLS only works to a certain degree. There is a high risk of not encrypting, even though you believe your email is TLS-encrypted. Read more

What does Efail mean for companies?
Time to read:
3 min
After the first wave of misinformation, it should have meanwhile spread that the email encryption has not been cracked by the security gap Efail. Read more

What is the difference between certificate signatures and email signatures?
Time to read:
2 min
Signatures play a very important role in cryptography. Do you know the difference between the signature of a certificate and the signature of an email? Read more

Encrypted emails safeguard lawyers’ confidentiality obligation
Time to read:
3 min
Lawyers are subject to special secrecy obligations. The law firm WSL Patentanwälte protects its client data with a central email encryption solution. Read more

What the EU Trade Secret Directive means for your IT security
Time to read:
2 min
Business secrets are the foundation of the success of many companies. What does the EU know-how protection directive mean in this context? Read more

To make long-term savings through electronic invoicing means preventing manipulation
Time to read:
2 min
Since 2011, invoices may also be sent electronically. This offers great potential for savings, but also new dangers such as man-in-the-middle attacks. Read more

Email encryption for recipients without certificates
Time to read:
4 min
Not every email address can find a valid certificate. But not all alternative delivery methods are recommended. Read more