IT Security - Jan 28, 2022
Data protection and information security: two sides of the same coin?

by Frank Peter

Data protection affects us all - privately and professionally. What data do we want to share? How, where and by whom is it processed? These are questions that concern everyone. Companies must ensure that they protect our data. I explain in the following blog what role legal requirements play in this and how companies should organise themselves when dealing with data protection and information security.

Written by

Frank Peter
Head of Data Protection and Data Security

E-Mail: frank.peter@bechtle.com

This page is not currently available in the selcted language.

"Europäische Unternehmen müssen beim Datenschutz in den Wettbewerbsmodus schalten."

It can see, hear and walks on uneven ground quickly and independently, avoiding obstacles. ANYmal is a four-legged inspection robot-the creation of the high-tech company ANYbotics based in Zurich-used predominantly in large industry. To get its robot up and running, the young company turned to SOLIDWORKS' broad portfolio of application solutions.

Full Story

Share this page

This post was published on Jan 28, 2022.
17Jan
Stay protected against ransomware, malware and spam: Managed e-mail security from the cloud.
Reports about cyber attacks on companies or authorities are in the news regularly these days. Blackmail trojans, spyware and other malware find their way onto computers and into networks again and again-and the consequences are often catastrophic. One click is enough and financial damage, data leaks and paralysed IT infrastructures become inevitable. In addition, the reputation of the company concerned suffers in the long term.
Read
13Dec
Critical vulnerability in Log4j - What you should do now.
A vulnerability dubbed CVE-2021-44228 and affecting Apache Log4j 2 versions 2.0 through 2.14.1 was announced on GitHub on 9 December 2021, and was rated with the highest severity score of 10. The BSI (Federal Cyber Security Authority) has declared IT Threat Level Red. Log4j 2 is an open source Java logging library that is widely used in a number of software applications and services around the world.
Read
23Nov
Microsoft Ignite 2021 - Part I: Security.
At the beginning of November, it was that time again: Microsoft Ignite. In case you aren't familiar with the format, Ignite is an annual technology convention where the vendor present new products and existing products' new features. This year, Microsoft presented more than 90 new services and updates including for its Azure cloud platform, enterprise software Dynamics 365, collaboration solution Microsoft Teams, and productivity suite Microsoft 365.
Read
19Nov
Information Security Management Systems - A key topic.
Information security and IT security - They're essentially the same thing, right? Think again. Although both terms are often used interchangeably, there is a wealth of difference between them. IT security describes primarily the handling of technical systems, i.e. hardware and software. Information security on the other hand denotes the entire company including staff, processes and even the building's architecture, which demonstrates quite clearly that information security is a key topic and it affects every single employee. An Information Security Management System (ISMS) can help to keep an overview of these complicated factors and their interplay.
Read
09Nov
Sustainability starts with design - How HP develops resource-saving products.
Businessmen have always said that purchasing is the key to profits, but this idea falls short in today's world as surveys are increasingly showing that companies and consumers are less likely to to be motivated to make a purchase just because the price is low. Instead, sustainability is growing in importance, with consumers wanting to know how a product was manufactured, how transparent the supply chain is, what working conditions are like at production facilities, and how CO2-neutral the production process is. Modern companies think ahead, always have an eye on the big picture and face up to their sustainability responsibilities.
Read
21Oct
Prime your network for the future with SASE and SD-WAN.
The demands placed on data centres are on the rise, as are threats to corporate security. Companies need a software-based and secure wide-area network-and hence a radical rethink of their network concepts, with SASE and SD-WAN at the core.
Read
More posts

Attachments

  • Original Link
  • Original Document
  • Permalink

Disclaimer

Bechtle AG published this content on 28 January 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 28 January 2022 08:05:02 UTC.