The archive of the e3 blog.
Read various contributions from the e3 employees on a wide range of topics relating to e3 AG and IT Security.
If you use multiple cloud services connected in one sequence of a business process, we speak of multi-cloud usage. There are good chances that the same data and cloud services will be used in several of your company’s business processes. Congratulations – you’ve internalized the cloud. And our condolences – you have reached the highest level of complexity for data protection.
Cyber attacks, business interruptions, loss of reputation – consistent IT security measures help to combat the greatest risks for Swiss companies. The solutions of the e3 offer comprehensive protection from a single source.
The exponential increase in the number of cyber attacks is giving Swiss companies sleepless nights , as confirmed by the Allianz Risk Barometer 2022. In its annual survey, the insurer asks companies around the world where they suspect the greatest business risks.
It’s that time of year again – and I’m not talking about the omnipresent «Jingle Bells» tunes, the ugly Christmas sweaters or the useless junk that magically turns into the perfect present – or so we are told.
No, it’s the time of year when Spotify presents us our personal «Wrapped year-in-review». Recorded down to the minute of listening, listed in categories, ranking our personal favourites. And holding a mirror up to us: tell me what music you listen to, and I’ll tell you who you are.
In the fourth part of our series on data residency, we discuss the different encryption techniques and highlight their pros and cons. Messages and information have been encrypted since ancient times. However, modern times set new requirements. For maximum protection, the encryption must take place as close as possible to the user: Encryption must be user-friendly, operate transparently and ensure a high level of operational reliability.
There are only limited ways to protect data appropriately. Actually, there are only two basic principles that ensure the necessary data protection: you lock up the data and/or you encrypt it. However, we are convinced that only strong, fully-restricted encryption provides the necessary data protection and enables compliance that allows us to sleep peacefully in order to securely exchange data with each other as individuals, companies or public institutions.
Data residency: An important and not to be ignored topic – also referred to as “data localization” or “data sovereignty”. If a company that works with sensitive data takes data security seriously, then it is important to carefully examine the data residency laws and their consequences for data security. These rules enforce data storage location requirements – across different jurisdictions and geographical areas – in order to protect them against unauthorized access. But is this protection really sufficient?
If your data is distributed internationally or even globally across several locations, a targeted analysis of the applicable laws and regulations with regard to these locations is mandatory. Then you are also in the middle of a new challenge: Data Residency.
Digitalization opens up completely new opportunities for the federal government, the cantons and the communities to provide their services in a customer-oriented manner and to optimize cooperation between the authorities and the business community. Here you can find out how e3 AG is helping to shape digitalization in public administration in a goal-oriented manner.
Data Leak Prevention systems provide good functionality to reduce the unintended outflow of data via
prevent e-mail. But how should internal emails be verified?
Would you like to know more?
If you would like to learn more about one of our Trend Headlines or if you have any other questions, please contact us! We look forward to hearing from you!