{"id":11972,"date":"2021-07-27T16:38:55","date_gmt":"2021-07-27T14:38:55","guid":{"rendered":"https:\/\/www.accessmanager.net\/?p=11972"},"modified":"2023-03-14T13:52:19","modified_gmt":"2023-03-14T12:52:19","slug":"it-security-act-2-0","status":"publish","type":"post","link":"https:\/\/www.accessmanager.net\/en\/2021\/07\/27\/it-security-act-2-0\/","title":{"rendered":"IT Security Act 2.0"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kkwbho9e-6fb1d616ffce96b97d0fd019adc03f60\">\n.avia-section.av-kkwbho9e-6fb1d616ffce96b97d0fd019adc03f60{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2021\/07\/shutterstock_393482614-scaled.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-kkwbho9e-6fb1d616ffce96b97d0fd019adc03f60 .av-section-color-overlay{\nopacity:0.3;\nbackground-color:#000000;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-kkwbho9e-6fb1d616ffce96b97d0fd019adc03f60 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_px='500'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' style='height:500px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11972'><div class='entry-content-wrapper clearfix'>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='av_section_2'  class='avia-section av-bjkpou-4d21ae85a694f724a081997bbbff889f main_color avia-section-default avia-no-border-styling  avia-builder-el-1  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11972'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9r4r66-90380a229f4631b5c0d2990376471ae0\">\n.flex_column.av-9r4r66-90380a229f4631b5c0d2990376471ae0{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-9r4r66-90380a229f4631b5c0d2990376471ae0 av_four_fifth  avia-builder-el-2  el_before_av_four_fifth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-krm5lenm-1197da052d2dc7823c55d0a94c3f43c9\">\n#top .av-special-heading.av-krm5lenm-1197da052d2dc7823c55d0a94c3f43c9{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-krm5lenm-1197da052d2dc7823c55d0a94c3f43c9 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-krm5lenm-1197da052d2dc7823c55d0a94c3f43c9 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-krm5lenm-1197da052d2dc7823c55d0a94c3f43c9 av-special-heading-h1 blockquote modern-quote  avia-builder-el-3  avia-builder-el-no-sibling '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >IT Security Act 2.0<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_four_fifth  avia-builder-el-4  el_after_av_four_fifth  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><p><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Much criticism and new requirements have come with the IT Security Act 2.0 since it came into force in May.<\/p>\n<p>The aim of the renewed law is to increase security for IT systems and to strengthen the position of the Federal Office for Information Security (BSI).<\/p>\n<p>Companies with a special public interest (e.g. with great economic importance) are now subject to the same obligations as operators of critical infrastructures. Who exactly will have to fulfil the requirements for CRITIS in the future (threshold values) is still being defined by the responsible authorities:<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The obligations include, among other things, the reporting of security breaches and compliance with minimum protection standards for IT systems. These are self-reported by companies as part of a self-declaration on certifications, security audits and measures.<\/p>\n<p>Take early action to protect your IT systems. Automated and secure self-service solutions for the access and identity journey of your employees and customers support you in firmly anchoring IT security in your company.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6ypsa6-1e72a73d1bdd600929103076790d9434\">\n.avia-section.av-6ypsa6-1e72a73d1bdd600929103076790d9434{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/06\/shutterstock_1100114120.jpg);\nbackground-position:0% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-6ypsa6-1e72a73d1bdd600929103076790d9434 .av-section-color-overlay{\nopacity:0.8;\nbackground-color:#3f3f3f;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-6ypsa6-1e72a73d1bdd600929103076790d9434 alternate_color avia-section-default avia-no-border-styling  avia-builder-el-7  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11972'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-8  el_before_av_three_fourth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>As experts for management software with two specialised solutions for IT security, we support you in this. With BAYOOSOFT Access Manager, you can use our in-house tool for automated authorisation management for file servers, SharePoint, Active Directory and third-party systems.<\/p>\n<p>While you sustainably reduce operational efforts, e.g. in IT administration, you increase information security through monitoring, auditing and transparent reporting for the data managers in your departments.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-10  el_after_av_three_fourth  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><article  class='iconbox iconbox_left av-krbwtrxu-33f473e7bf5c308064db59ef4180d9ac  avia-builder-el-11  avia-builder-el-no-sibling '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Good to know\"><div class=\"iconbox_icon heading-color\" aria-hidden='true' data-av_icon='\ue81f' data-av_iconfont='entypo-fontello'><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >Good to know<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>Do you know the BSI&#8217;s &#8220;Best Practice&#8221; recommendations for critical infrastructures? We have summarised what you need to know about authorisation management for CRITIS in a <a href=\"https:\/\/www.accessmanager.net\/en\/2021\/04\/30\/authorisation-management-for-critis\/\" target=\"_blank\" rel=\"noopener\">blog<\/a>.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div><div id='av_section_4'  class='avia-section av-3meicu-d8495e3eb4ff49e05084cd0b2b2ee015 main_color avia-section-default avia-no-border-styling  avia-builder-el-12  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11972'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_four_fifth  avia-builder-el-13  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Are your emails securely encrypted? Internal and external communication is a second, central aspect of IT security issues. With the <a href=\"https:\/\/www.giepa.de\/products\/gpg4o\/mail-encryption-with-gpg4o\/?lang=en\" target=\"_blank\" rel=\"noopener\">gpg4o<\/a>\u00ae end-to-end encryption system, you use an established add-in for email encryption in Microsoft Outlook 2013\/2016\/2019\u00ae that can be seamlessly integrated into the user interface.<\/p>\n<p>From here, messages and their attachments can be securely encrypted and decrypted, signed and checked. The clever tool is easy to install and simple to use.<\/p>\n<p>There are many possibilities for more IT security. We will be happy to <a href=\"https:\/\/www.bayoosoft.com\/en\/product-presentation-inquiry\/\" target=\"_blank\" rel=\"noopener\">advise you<\/a> on the right solutions for you.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kkwbkig3-cfc564fcbaa7c3ad755e08f3343dab6b\">\n.avia-section.av-kkwbkig3-cfc564fcbaa7c3ad755e08f3343dab6b{\nmargin-top:5px;\nmargin-bottom:0px;\n}\n.avia-section.av-kkwbkig3-cfc564fcbaa7c3ad755e08f3343dab6b .av-section-color-overlay{\nopacity:0.8;\nbackground-color:#5b5b5b;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-kkwbkig3-cfc564fcbaa7c3ad755e08f3343dab6b alternate_color avia-section-default avia-no-border-styling  avia-builder-el-15  el_after_av_section  el_before_av_textblock  avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  ><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11972'><div class='entry-content-wrapper clearfix'>\n<div  class='av_promobox av-kp6yhpxv-bf420dae7673944e334455df5e2beb8d avia-button-yes  avia-builder-el-16  avia-builder-el-no-sibling '><div class='avia-promocontent'><p>Would you like to get to know the BAYOOSOFT Access Manager directly? Sign up for a 30-day TRIAL.<\/p>\n<\/div><div  class='avia-button-wrap av-kp6yhpxv-63efe3c106422296efa3663747efeed2-wrap avia-button-right '><a href='https:\/\/www.accessmanager.net\/en\/services\/trial-anfrage\/'  class='avia-button av-kp6yhpxv-63efe3c106422296efa3663747efeed2 av-link-btn avia-icon_select-no avia-size-large avia-position-right avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Test it now\"><span class='avia_iconbox_title' >Test it now<\/span><\/a><\/div><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div><div id='after_section_5'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11972'><div class='entry-content-wrapper clearfix'><section  class='av_textblock_section av-bgub4-b8c427daace05508439539568632f875 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><\/div><\/section><\/p>\n<section  class='av_textblock_section av-j07lms-5c0f695333d63d2a33655a8118871d50 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":42,"featured_media":11928,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-11972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial-en"],"_links":{"self":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/11972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/comments?post=11972"}],"version-history":[{"count":6,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/11972\/revisions"}],"predecessor-version":[{"id":15696,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/11972\/revisions\/15696"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media\/11928"}],"wp:attachment":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media?parent=11972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/categories?post=11972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/tags?post=11972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}