The big rulings are still missing from the European General Data Protection Regulation. There were many reports, but only 75 fines were imposed across Europe. The frequently threatened highest penalty of 4 percent of global annual turnover was never applied. Does this mean that most companies did their homework and were able to minimise or completely avoid data breaches? Not at all. Many requirements are still not being implemented by numerous companies in various member states – and when they do implement these, it’s often a half-hearted effort. According to the regulation, however, personal data needs to be protected and managed better than before. Companies therefore still have a lot of work ahead of them to avoid coming into conflict with European law. Companies should primarily focus on implementing the following recommendations:

 

  • Technical and organisational measures must be implemented under consideration of the data protection and IT security risks. This is the only way to credibly verify that personal data is being processed in compliance with the GDPR.
     
  • Systems with personal data must be protected accordingly with regard to data protection and the current state of technologies.
     
  • Declarations of consent must be collected and managed centrally and upstream.
     
  • Companies that process personal data must protect these against unauthorised access.

 

Suitable investments in strong IT security solutions which support compliance with the European regulation are urgently required. Verifying and authorising identities centrally is thus the best way forward, even if these are managed in a decentralised manner. Guidelines can thus be enforced centrally and records can be managed more easily for audits. This also applies to access to personal data and access to web services which are protected via a central platform with strong upstream authentication. All access guidelines can thus be managed and enforced centrally and protected in line with the GDPR.

Learn more about IT security solutions from Airlock.

Airlock Secure Access Hub

By Thomas Kohl, Senior Business Development Germany at Airlock, a security innovation from Ergon Informatik AG

Blognews directly to your inbox

The Airlock Newsletter informs you continuously about new blog articles.

Subscribe blognews

More interesting articles

2FA

The advantages of an intelligent, upstream security solution

SAH

Cloud Security Study

Banking

5 security challenges in an open banking ecosystem

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge