Data protection and information security: two sides of the same coin?

Computer security – January 28, 2022

Data protection and information security: two sides of the same coin?

Data protection affects us all – privately and professionally. What data do we want to share? How, where and by whom is it processed? These are questions that concern everyone. Companies need to make sure they protect our data. I explain in the following blog what role legal requirements play in this and how companies should organize themselves when dealing with data protection and information security.

Data Protection and Data Security Officer

Email: [email protected]

This page is currently not available in the selected language.

“Europäische Unternehmen müssen beim Datenschutz in den Wettbewerbsmodus schalten.”

He can see, hear and walk quickly and independently over rough terrain, avoiding obstacles. ANYmal is a four-legged inspection robot – the brainchild of the Zurich-based high-tech company ANYbotics – used primarily in large industry. To operate its robot, the young company turned to the large portfolio of SOLIDWORKS application solutions.

Full story

This article was published on January 28, 2022.


Protect against ransomware, malware and spam: cloud-managed email security.

Reports about cyberattacks on companies or authorities regularly make the headlines these days. Blackmail Trojans, spyware and other malicious software find their way into computers and networks all the time, and the consequences are often catastrophic. One click is enough and financial damage, data leaks and crippled IT infrastructure become inevitable. In addition, the reputation of the company concerned suffers in the long term.


Critical Vulnerability in Log4j – What you need to do now.

A vulnerability dubbed CVE-2021-44228 affecting Apache Log4j 2 versions 2.0 through 2.14.1 was announced on GitHub on December 9, 2021 and received the highest severity score of 10. BSI (Federal Cyber ​​​​Security Authority) has declared IT Threat Level Red. Log4j 2 is an open-source Java logging library widely used in a number of software applications and services around the world.


Microsoft Ignite 2021 – Part I: Security.

At the beginning of November, it was again this time: Microsoft Ignite. If you’re unfamiliar with the format, Ignite is an annual technology convention where the vendor showcases new products and new features of existing products. This year, Microsoft introduced more than 90 new services and updates, including for its Azure cloud platform, Dynamics 365 enterprise software, Microsoft Teams collaboration solution and Microsoft 365 productivity suite.


Information Security Management Systems – A Key Topic.

Information Security and Computer Security – They’re essentially the same thing, aren’t they? Think again. Although the two terms are often used interchangeably, there is a big difference between them. Computer security mainly describes the management of technical systems, i.e. hardware and software. Information security, on the other hand, refers to the entire enterprise, including personnel, processes and even the architecture of the building, which demonstrates quite clearly that information security is a subject key and affects every employee. An Information Security Management System (ISMS) can help keep an overview of these complex factors and how they interact.


Sustainability starts with design – How HP develops resource-efficient products.

Business people have always said buying is the key to profit, but that idea falls short in today’s world as surveys increasingly show that businesses and consumers are less likely to buy. be motivated to buy just because the price is low. Instead, sustainability is gaining prominence, with consumers wanting to know how a product was made, how transparent the supply chain is, what the working conditions are like in production facilities, and how well the process production is CO2 neutral. Modern companies anticipate, always keep an eye on the big picture and assume their responsibilities in terms of sustainable development.


Prepare your network for the future with SASE and SD-WAN.

The demands on data centers are increasing, as are threats to business security. Businesses need a software-based and secure wide area network, and so they need to radically rethink their networking concepts, with SASE and SD-WAN at the core.

More posts


Bechtle AG published this content on January 28, 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unmodified, on January 28, 2022 08:05:02 UTC.

Public now 2022

All news about BECHTLE AG

Analyst Recommendations for BECHTLE AG
Sales 2021 6,338M
7,069 million
7,069 million
Net income 2021 232M
Net debt 2021 164M
PER 2021 ratio 27.8x
2021 performance 1.40%
Capitalization 6,464 million
7,208 million
EV / Sales 2021 1.05x
EV / Sales 2022 0.93x
# of employees 12,744

Duration :

Period :

Bechtle AG Technical Analysis Chart |  MarketScreener

Trends in technical analysis BECHTLE AG

Short term Middle term Long term
Tendencies Bearish Bearish Neutral

Evolution of the income statement

To sell

To buy

Medium consensus SURPASS
Number of analysts ten
Last closing price


Average target price


Average Spread / Target 27.9%

Comments are closed.