Image: How to encypt your emails with SSL/TLSTierneyMJShut­ter­stock

How to encypt your emails with SSL/TLS

Are the emails that you send and receive encrypted? If not, it’s about time you started. Only by en­crypt­ing the trans­mis­sion and content of emails can you ensure that your data is secure while being sent. Otherwise, unau­tho­rized persons can read your email traffic easily and…

Read more
Image: How to use PGP encryption for emailBachoShut­ter­stock

How to use PGP en­cryp­tion for email

Online privacy is a sensitive issue that affects everyone from security experts to casual internet users. Whether you’re posting on social networks, carrying out banking trans­ac­tions or buying from an online store, your data may not be suf­fi­cient­ly protected. The same applies to…

Read more
Image: What are spam messages and how can you avoid them?al­phaspir­it.itShut­ter­stock

What are spam messages and how can you avoid them?

Every day, countless spam emails reach inboxes worldwide. While many are ir­ri­tat­ing, others can be dangerous, carrying phishing links, malware, or fraud­u­lent offers. Rec­og­niz­ing the telltale signs of spam not only saves time but also protects your data and devices. With a few…

Read more
Image: How to use two-factor authentication to protect your accountji­jo­math­aidesign­ersshut­ter­stock

How to use two-factor au­then­ti­ca­tion to protect your account

With two-factor au­then­ti­ca­tion, accounts can be ef­fec­tive­ly protected against hacking or phishing attacks. Since more than just a password is needed for login, internet criminals can’t do much with in­ter­cept­ed login details. In our guide, we explain how two-factor au­then­ti­ca­tion…

Read more
Image: How to encrypt and sign your emails with S/MIMEVictor MoussaShut­ter­stock

How to encrypt and sign your emails with S/MIME

Sending an email without extra security is akin to sending a postcard: If every­thing goes as expected, the message arrives intact and unread by anyone else. But if the postcard or email is in­ter­cept­ed during transit, the content can be read or altered freely. Discover how the…

Read more
Image: How to change your Outlook password step by stepRawpixel.comShut­ter­stock

How to change your Outlook password step by step

Outlook makes it easy to manage email accounts from various providers within a single interface. All it needs are the correct mail server settings and your login cre­den­tials. If you change your password, you simply need to update it in the client’s settings. But how exactly do…

Read more
Image: What is spear phishing and how does it work?Digital_ArtShut­ter­stock

What is spear phishing and how does it work?

Online attacks are a daily oc­cur­rence, and most can be blocked with little effort. Spear phishing, however, is far more dangerous: carefully polished, highly con­vinc­ing, and com­plete­ly free of the usual red flags that make other scams easier to spot. These fraud­u­lent messages are…

Read more
Image: What is greylisting in email and how does it work?wetzkaz.comShut­ter­stock

What is greylist­ing in email and how does it work?

Greylist­ing is a proven and highly effective method to sig­nif­i­cant­ly reduce the worldwide sending of spam emails. Because it operates quietly in the back­ground, most users never even notice that their inbox is being actively protected. Discover how the process works tech­ni­cal­ly,…

Read more
Image: How to set up the Outlook spam filter and customize itRawpixel.comShut­ter­stock

How to set up the Outlook spam filter and customize it

The Outlook spam filter moves unwanted and po­ten­tial­ly malicious spam emails to the Junk folder. Even pro­mo­tion­al emails that don’t meet typical spam criteria can be kept out of your inbox with the right settings. If le­git­i­mate messages are mis­tak­en­ly flagged, the Outlook Junk…

Read more
Image: What is an email whitelist and how does whitelisting work?Andrey_PopovShut­ter­stock

What is an email whitelist and how does whitelist­ing work?

What is a whitelist and how can whitelist­ing be used for seamless email com­mu­ni­ca­tion? A whitelist uses specif­i­cal­ly added entries to exclude unwanted or harmful data from traffic. How do you set up such a passlist? Options exist with your own internet provider, through external…

Read more