Loading
BAYOOSOFT
  • Management Solutions
    • IT-Security
      • Access Manager
      • gpg4o
    • MedTech
      • Reinventing Technical Documentation
      • Risk Manager
      • MEDiLEX
    • Telesolutions
      • HospiX
  • About us
    • BAYOOSOFT
      • Software Made in Germany
      • The Co-thinker Team
      • Contact Us
    • News & Events
      • News
      • Events
    • BAYOONET Group
      • BAYOOTEC
      • BAYOOMED
  • Jobs & Career
  • Shop
  • Search
  • Menu

Secure communication: How companies protect their data from attacks

The protection of business interests is one of the highest goods for companies. It is important to prevent data from being unlawfully stolen from the company – be it through hacker attacks or espionage. In addition to internal requirements to protect information, customers, suppliers and partners of a company also have a legitimate interest in protecting their data.

In addition, companies must comply with legal obligations, such as the requirements of the General Data Protection Regulation, the IT Security Act, the Federal Data Protection Act or the Act on the Protection of Business Secrets.

The IT Security Act 2.0

What has changed with the updated version in the past year? What obligations apply to companies with a special public interest and operators of critical infrastructures (CRITIS)?

You can read more about this in our blog post.

Ultimately, however, you should weigh up the risks for your specific case on your own responsibility. In addition to a possible liability risk, a hacker attack can also result in an economic risk. The damage to your image that can result from data loss should not be underestimated.

Important to know

Data must be encrypted at all storage locations. This includes servers, workstations (desktop and laptop) and other mobile devices. This also applies to external areas, i.e. branch offices, data centres and field service devices.

Safeguarding business interests through (email) encryption

Hans-J. Giegerich, Managing Director at GP InfoCon, spoke about this topic at “Digital instead of analogue”, BAYOOSOFT’s series of events:

Companies are also victims of cyber attacks on a regular basis. In this lecture, you will learn how you can protect your business interests in the best possible way, not only with the help of email encryption, but also with the help of the Internet.

[presentation in german language]

Watch the video

How can you adequately protect your data in corporate communications?

Encrypt your data to protect it during communication, both internally and externally. There are two ways to do this. You can encrypt data during transport or the content itself.

  • Encrypt the transport

    Security during the transport of data is supported by TLS (Transport Layer Security). One disadvantage, however, is that the data usually only remains encrypted during transport, i.e. between the transmission from mail server to mail server.

  • Encrypt the content

    If you communicate data via e-mail, it is precisely this that should be protected. This way, the data remains encrypted between the exchange from user to user – i.e. during the entire process instead of only during transport.

On the end device itself, information is encrypted and is only decrypted at the destination user.

One option for email encryption via Outlook is the software solution gpg4o.

How does secure email encryption work with gpg4o?

gpg4o uses an asymmetric encryption method for email encryption. This system uses key pairs consisting of a private, i.e. secret, key and a public key. The recipient’s public key is used to encrypt the e-mail.

This can then only be decrypted again with the private key of the recipient. You can find more information on this in the explanatory videos and the IT glossary.

Sounds exciting to you? Feel free to contact us with any further questions.

We will be happy to inform you about your options for secure corporate communication.

Contact us
Sounds interesting? Share our post
  • Share on Facebook
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail

Latest News

  • BAYOOSOFT @ MEDICA 202231. October 2022 - 19:09
  • Ein:e Ärtz:in sitzt vor einem Tablet und hat ein Stethoskop um den HalsClinical evaluation according to MDR5. October 2022 - 14:31
  • Header Bild, Bildschirm mit Schloss-SymbolEmail encryption – Which method is the most secure?13. May 2022 - 14:23
Contacts at BAYOOSOFT 

Svenja Winkler
CEO
[email protected]

 

 

Franziska Weiß
Head of Sales
[email protected]

Darmstadt
Lise-Meitner-Straße 10
64293 Darmstadt

Munich
Aidenbachstraße 54
81379 München

Berlin 
Mariendorfer Damm 1-3
12099 Berlin

Contact: [email protected]
Jobs: [email protected]
Press: [email protected]

Phone: +49 (0) 6151 – 86 18 – 0
Fax: +49 (0) 6151 – 86 18 – 150

Contact support
  • Privacy Policy
  • Legal
Merry Christmas 2021 How is the classification of medical devices according to MDR carried out?
Scroll to top