Safeserver

 IT administration and security services. We offer planning and maintenance of networks, web hosting, deployment, infrastructure. In short: IT consulting and solutions for distributed teams, including GDPR and security policies.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

Ever wondered if the person with the business card is really who they say they are? Lead acquisition made easy and in compliance with data protection laws.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

How can you protect yourself against Trojans in application e-mails? By accepting the documents exclusively via the website.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

What to do if you have caught ransomware, your hard disk data has been encrypted and a ransom is demanded for its release?
Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

Mail sensitive data is only GDPR-compliant with SSL encryption or via password-protected PDF. Nextcloud is a convenient alternative.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

The Google package G Suite for Education can be used by educational institutions free of charge. This may be cheap, but it is tricky in terms of data protection.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

What simple technical and organisational measure can be taken on the computer to prevent access to personal data by third parties?

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

With simple opt-in, you can register with any address, including third-party information. Data protection requires a second confirmation.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

Outsourcing leads to the transfer of personal data to third parties. A contract between the client and the external service provider must safeguard this.

Author
Profile picture for user DeepL
Profile picture for user manfred.woeller

Manfred Wöller

Despite many reports of hacked credentials, most users protect their accounts only half-heartedly. How does password security work?