2FA – Two-Step Authentication (MFA)

2FA – Two-Step Authentication (MFA)

Two-factor authentication is a mechanism that allows users to verify an attempt to authenticate. The user must provide a one-time code to confirm authentication that is sent to their device. This code is sent, for example, via text message or generated by a code via...
AIP – Microsoft Azure Information Protection

AIP – Microsoft Azure Information Protection

Microsoft Azure Information Protection (or AIP) is a cloud-based solution with which organizations can classify documents and emails and optionally protect them by using labels. Labels can be applied automatically based on rules and conditions. But they can also be...
Encryption

Encryption

EncryptionEncryption is the process by which data is made illegible and unusable for unauthorized viewers. In order to use or read encrypted data, you must decrypted will. A secret key is required for this. There are two types of top-level encryption: symmetrical and...

REFERRER-POLICY

When a user visits a website, a “Referrer” header is immediately inserted, telling the server where the visitor is from. This header is used for analytical functions. As you can see, this poses a data protection problem. This can be prevented by adding a...

X-XSS PROTECTION

X-XSS, also known as cross-site scripting, is a security header that protects websites from cross-site scripting. By default, this security header is built into and activated in modern web browsers. When you implement it, your browser will be forced to load it. This...