
Intercepted emails in times of big data – the underestimated threat
Time to read:
2 min
Nearly daily news of cyber attacks on companies reaches us. Hackers obtain access to internal networks. What about sensitive data that is transferred via [...] Read more

Which role does email encryption play in the EU GDPR?
Time to read:
2 min
The European General Data Protection Regulation (EU GDPR) demands the encryption of emails. What technology to use best? Read more

Corporations require a different approach to IT security than private users
Time to read:
2 min
In reaction to the cyber-attack on politicians and celebrities at the turn of the year, everyone is recommending email encryption direct in your email [...] Read more

How can companies protect themselves and their employees against hacking?
Time to read:
3 min
After private data belonging to politicians and public figures was published online in December 2018, we did not have to wait long for new security [...] Read more

What corporations need to learn from the cyber-attack on politicians and celebrities
Time to read:
3 min
Since the 2018/19 cyber-attack on public figures, IT security is once again a hot topic in Germany. A 20-year-old man posted the personal contact details [...] Read more

Are my TLS-encrypted emails EU GDPR compliant?
Time to read:
3 min
Spontaneously encrypting with TLS only works to a certain degree. There is a high risk of not encrypting, even though you believe your email is TLS-encrypted. Read more

What does Efail mean for companies?
Time to read:
3 min
After the first wave of misinformation, it should have meanwhile spread that the email encryption has not been cracked by the security gap Efail. Read more

Encrypted emails safeguard lawyers’ confidentiality obligation
Time to read:
3 min
Lawyers are subject to special secrecy obligations. The law firm WSL Patentanwälte protects its client data with a central email encryption solution. Read more

What the EU Trade Secret Directive means for your IT security
Time to read:
2 min
Business secrets are the foundation of the success of many companies. What does the EU know-how protection directive mean in this context? Read more

To make long-term savings through electronic invoicing means preventing manipulation
Time to read:
2 min
Since 2011, invoices may also be sent electronically. This offers great potential for savings, but also new dangers such as man-in-the-middle attacks. Read more