Black  Friday and Cyber  ​​Monday – these promotional days are particularly attractive for online shoppers because many retailers offer big discounts again.

The Federal Office for Information Security provides tips on how to survive Black Friday and Cyber ​​Monday safely.

Despite all the pre-Christmas love of great bargain hunting, the security of user data should not be forgotten. Otherwise, credit card data is stolen all too quickly, stored payment information is misused or important log-in data is stolen via phishing .

The Federal Office for Information Security ( BSI ) has registered a current spam related to the campaign days and therefore points out the importance of two-factor authentication, which can offer consumers additional protection.

“Even when shopping online, we need to be confident that our account details and other personal information are secure. Two-factor authentication significantly increases the security of customer data, both when registering and when paying via online banking, online payment service or credit card. Whenever sensitive data is involved, online service providers are called upon to offer user-friendly and secure procedures. Consumers should equally insist on using such a procedure. As the national cyber security authority, the BSI digital consumer protection seriously and ensures more cyber security in digitalization, FIDO tokens .

said BSI President Arne Schönbohm.

Two-factor authentication significantly improves the security of log-in procedures. In addition to the combination of user name and password, at least one other factor is used that clearly determines online retailers, banks or social media

These procedures supplement the knowledge factor (password) with the possession factors ( e.g. chip card, TAN generator or certificate) or biometrics ( e.g. fingerprint, iris scan or facial recognition). We explain how this works, what procedures there are and when they can be used sensibly on our consumer portal www.bsi-fuer-buerger.de as well as in the podcast and in our video series “ IT security explained in a understandable way” .

Spam and phishing can generally be recognized very reliably, even by computer laypeople. We explain how this works here . never respond to questionable emails


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )