Image Background Fine for lack of a processing contract by Manfred Wöller Outsourcing leads to the transfer of personal data to third parties. A contract between the client and the external service provider must safeguard this.
Image Background Data theft and password jam von Manfred Wöller Despite many reports of hacked credentials, most users protect their accounts only half-heartedly. How does password security work?
Image Background Fines for data protection violations by Manfred Wöller Sloppy password management encourages hacker attacks and can be punishable by law. A data protection impact assessment mitigates the risks.
Image Background Liability of the internal data protection officer by Manfred Wöller Management teams should be regularly informed by their GDPR officers about the current status, otherwise there is a risk of problems.
Image Background Certificate-based SSH by Peter Manthey Secure (socket) shell enables encoded connections within the network. Cryptography secures authentication and authorisation.
Image Background Using GnuPG correctly by Ben Rösler Encryption with GnuPG (GNU Privacy Guard) and PGP (Pretty Good Privacy) is only secure if the tools are configured and used correctly.