We are starting 2024 full of enthusiasm with our New Year’s resolutions. Alongside financial and sporting goals, one of the most common resolutions is certainly to take more time to… Read More »Digitalisation, AI, Open Source, Data Protection & Co. – 6 Book Tips for the New Year
In our everyday lives, the terms “data protection”, “data security” and “privacy” are often used in the same sentence and sometimes even as synonyms for each other. Although these terms… Read More »Data Protection, Data Security and Privacy
For several years now, the consensus in IT security has been that the simple login procedure with name and password alone is neither up-to-date nor secure enough for an increasingly… Read More »More Security through Multi-Factor Authentication
The General Data Protection Regulation (GDPR) has been in force in the European Union, Iceland, Lichtenstein and Norway for more than 4 years. Since then, this regulation has set a… Read More »European Courts increasingly insist on Compliance with the GDPR
Google Analytics is the most widely used tracking tool worldwide, accounting for an estimated 50-80% of all websites. From the perspective of data protection and privacy, however, its use has… Read More »7 Reasons why You Should Use ViOffice Analytics instead of Google Analytics
“Almost everyone in the world will be identifiable” – This quote comes from an investor meeting of the US company Clearview AI, which specializes in face recognition using artificial intelligence… Read More »Face Recognition and its Impact on Privacy
Free, Open Source Software is often times labeled as “unfit for critical infrastructure” by those not working in the field or by stakeholders of proprietary software companies. Contrary, Open Source advocates would reply with the exact opposite, so which one is true?
Privacy is generally perceived as a problem on individual level, although it has an important, often neglected social component. We highlight the central issues and how they can be solved.
E-mail is one of the oldest, most widely used and widespread messaging and web protocols on the internet. But how can communication via e-mail be securely and reliably encrypted?