The internet never forgets – is it always true? In some cases, search engines are obliged to grant users permission to delete defamatory search results. If Google displays personal data that is outdated or of no interest to the public, users can request the search engine to delete links to that data from the results pages permanently. But what exactly is the ‘Right to be Forgotten’ act, and when...Deleting personal data with Google
Information is often cached so that visited website can be loaded quickly and videos and gifs can be viewed offline. However, if the cache contains a large, or very large amount of data, it can cause problems and adversely affect computer performance. Therefore, it makes sense to delete the cache from time to time.Clearing the cache: deleting the browser’s cache
With Linux, access rights for directories and files are often set through the terminal where file owners can be defined and groups can be assigned. With the ‘chmod’ command, user classes can be assigned certain file rights. Access rights in the Unix file system can be changed in two different ways: symbolic or numeric. Find out more about both notation types here.What is chmod?
To ensure that your newsletter campaigns continue to be effective in the future, you shouldn’t miss out on these email marketing trends in 2022: more automation possibilities, new design options, stricter data protection, and things that are made possible thanks to artificial intelligence. In our article on this year’s newsletter trends, we explain what you should look for in your future...Email marketing trends 2022: 10 ideas for the new year
Cookies can be helpful business tools, but they often toe the data protection line dangerously. As a result of this tendency towards uncertainty, the EU has introduced a new cookie law to protect its users. This new policy will affect any US company that does online business with EU customers. What do website operators need to pay attention to when it comes to this new cookie law?EU cookie laws and how they affect your business
Since May 25, 2018, a European law on data protection has been in place. However, despite it being relevant to day-to-day business, many companies and website operators are still unattuned to the General Data Protection Regulation (GDPR). On top of this, high fines are imposed on those violating the regulations. Here we summarize everything worth knowing on the EU GDPR for entrepreneurs and online...The EU General Data Protection Regulation (GDPR): summary, innovations and checklist
Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just mere phantasies of screenwriters; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of...Online identity theft protection
What are session cookies and what’s their purpose when surfing the internet? Compared to regular persistent cookies, session cookies are temporarily stored on a device. That means once you close down your browser, they are automatically deleted. Since these cookies are essential in order to browse websites, they are permitted under the GDPR.What are session cookies?
Learn how to effectively protect the administration area of your WordPress blog from hackers and brute force attacks with .htaccess directory protection.How to protect WordPress login with .htaccess
It only takes a few seconds for a hacker to gain access to your private data without you having any idea. More often than not, a password is the only means of protection when logging into online services; and if it is too obvious, it will not prove too much of a challenge for criminals to crack. There are numerous options to increase password security.Optimal password protection: how to choose a strong password