Strategy

Email encryption – this is how it works!

Unfortunately, encryption of emails is used far too little, although it has long been known that emails can be intercepted by third parties on their way to their recipients. The reason why asymmetric encryption is so little used for emails may be that setting up such procedures is usually complicated … continue reading

What is a firewall?

The term firewall appears very often in the context of corporate IT security. But what exactly is a firewall and what are the different types? So that you too can use this IT security tool correctly, we explain everything about the firewall in this article. What is a firewall? In … continue reading