Devices and systems

Devices and systems

Please choose a topic: password protection, secure hardware and software, child protection or digital legacy.

Password protection

zwei-faktoren-authentifizierung-en

Use two-factor authentication to add an extra layer of security to your accounts

A strong password is an important means of protecting your privacy on the Internet. Two-factor authentication takes data security a step further.

Passwortmanager

What you should know about password managers

Keep your login data safe and secure.  How to stay on top of all passwords with a password manager. 

Gesichtserkennung-EN

Fingerprints and face recognition instead of passwords?

Is biometric data secure? How our skin protects our smartphone – and where it needs additional protection.

Secure hardware and software

Mac-absichern-en

How to correctly secure your Mac

Computer malware is mostly written for Windows. However, you should not take the security of your Mac lightly.

Datenschutz-unter-Windows-en

More privacy and security in Windows

Turn on Windows functions for more protection and a healthy measure of privacy when working at your PC.

Tablets optimal und sicher nutzen-en

Get the best out of your tablet – securely

The on-trend look and many entertainment functions of a tablet often keep us from remembering that they, too, are computers that are subject to attacks and therefore need protecting.

33-neu

Tips for more Android security

Screen locks, system updates, and backups – a few basic rules will help you to protect your mobile phone.

A man working on a tablet computer.

Opening ports on the router

Keep your digital skin’s defenses strong and protect your router from external cyberattacks.

A padlock protects the Wi-Fi network

Strong Wi-Fi security with WPA3 encryption

A secure Wi-Fi network is crucial to protecting your personal information and devices against unauthorized access. Prevent dangerous attacks on your home network with WPA3, the secure encryption method.

Software-Download

Keep your eyes open

Pay attention to what data you are loading onto your devices, because computer viruses can sneak into programs or games when you download them.

36neu

Protection for VoIP calling

Voice over IP systems could also be described as computers with special purposes, and they need to be protected from attackers.

Illustration Smart Home

Smart Home? Rest assured!

A smart home can make life within your own four walls safer and better. How to make your smart devices immune to attacks.

21-neu

Tune your Smartphone with caution

For security reasons, manufacturers seal off the core of their operating systems. Be careful when tweaking your smart phone.

Prevent data loss.

Computer data security begins with a good backup

A good backup forms the basis of a secure system. How to create a digital clone of your precious data.

Erste Hilfe bei Computernotfällen.

Why you need a rescue CD to save your data

If the computer no longer starts up in the usual manner, there may be many causes. An emergency CD gives you a chance to recover your precious data. 

33-nochneuer-browser

Seven security tips for any browser

The browser is one of the most important programs you have on your computer. Improve online security in a few simple steps.

Illustration Cloud

Sync your data securely via the cloud

Cloud services are convenient because they allow you to store data on multiple devices in sync. With encryption and a trusted provider, your data remains safe in the cloud.

Child protection

mehr-Schutz-für-Kinder-en

More protection for children

Digital media exert a tremendous fascination on children and young people. Protect your offspring from dangers by setting up parental controls and teaching media literacy.

Digital legacy

How to Plan Your Digital Legacy

How to Plan Your Digital Legacy

How can you decide what will happen to your data well in advance, so that digital memories will not fall into the wrong hands?

FAQShare

Cookies and similar technologies

We use cookies and similar technologies on our website to save, read out and process information on your device. In doing so, we enhance your experience, analyze site traffic, and show you content and ads that interest you. User profiles are created across websites and devices for this purpose. Our partners use these technologies as well.


By selecting “Only Required”, you only accept cookies that make our website function properly. “Accept All” means that you allow access to information on your device and the use of all cookies for analytics and marketing purposes by Deutsche Telekom AG and our partners. Your data might then be transferred to countries outside the European Union where we cannot ensure the same level of data protection as in the EU (see Art. 49 (1) a GDPR). Under “Settings”, you can specify everything in detail and change your consent at any time.


Find more information in the Privacy Policy and Partner List.