loader image

News Trends

The archive of the e3 blog.

Read various contributions from the e3 employees on a wide range of topics relating to e3 AG and IT Security.

Data Residency V – Encryption in a Multi-Cloud

Data Residency V – Encryption in a Multi-Cloud

If you use multiple cloud services connected in one sequence of a business process, we speak of multi-cloud usage. There are good chances that the same data and cloud services will be used in several of your company’s business processes. Congratulations – you’ve internalized the cloud. And our condolences – you have reached the highest level of complexity for data protection.

read more
The biggest business risks under control

The biggest business risks under control

Cyber attacks, business interruptions, loss of reputation – consistent IT security measures help to combat the greatest risks for Swiss companies. The solutions of the e3 offer comprehensive protection from a single source.
The exponential increase in the number of cyber attacks is giving Swiss companies sleepless nights , as confirmed by the Allianz Risk Barometer 2022. In its annual survey, the insurer asks companies around the world where they suspect the greatest business risks.

read more
I know what you’re listening to

I know what you’re listening to

It’s that time of year again – and I’m not talking about the omnipresent «Jingle Bells» tunes, the ugly Christmas sweaters or the useless junk that magically turns into the perfect present – or so we are told.

No, it’s the time of year when Spotify presents us our personal «Wrapped year-in-review». Recorded down to the minute of listening, listed in categories, ranking our personal favourites. And holding a mirror up to us: tell me what music you listen to, and I’ll tell you who you are.

read more
Data Residency IV – How does encryption work?

Data Residency IV – How does encryption work?

In the fourth part of our series on data residency, we discuss the different encryption techniques and highlight their pros and cons. Messages and information have been encrypted since ancient times. However, modern times set new requirements. For maximum protection, the encryption must take place as close as possible to the user: Encryption must be user-friendly, operate transparently and ensure a high level of operational reliability.

read more
Data Residency III – Data Encryption: Why It Matters

Data Residency III – Data Encryption: Why It Matters

There are only limited ways to protect data appropriately. Actually, there are only two basic principles that ensure the necessary data protection: you lock up the data and/or you encrypt it. However, we are convinced that only strong, fully-restricted encryption provides the necessary data protection and enables compliance that allows us to sleep peacefully in order to securely exchange data with each other as individuals, companies or public institutions.

read more
Data Residency II – When local data storage is no longer automatically secure

Data Residency II – When local data storage is no longer automatically secure

Data residency: An important and not to be ignored topic – also referred to as “data localization” or “data sovereignty”. If a company that works with sensitive data takes data security seriously, then it is important to carefully examine the data residency laws and their consequences for data security. These rules enforce data storage location requirements – across different jurisdictions and geographical areas – in order to protect them against unauthorized access. But is this protection really sufficient?

read more

Would you like to know more?

If you would like to learn more about one of our Trend Headlines or if you have any other questions, please contact us! We look forward to hearing from you!

5 + 15 =