{"id":12086,"date":"2021-07-29T12:27:33","date_gmt":"2021-07-29T10:27:33","guid":{"rendered":"https:\/\/www.accessmanager.net\/?p=12086"},"modified":"2023-03-14T13:51:58","modified_gmt":"2023-03-14T12:51:58","slug":"usability-vs-data-protection","status":"publish","type":"post","link":"https:\/\/www.accessmanager.net\/en\/2021\/07\/29\/usability-vs-data-protection\/","title":{"rendered":"Usability vs. data protection"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kkwbho9e-3af65c93281d68970561625acf076875\">\n.avia-section.av-kkwbho9e-3af65c93281d68970561625acf076875{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2021\/07\/shutterstock_302508602-scaled.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-kkwbho9e-3af65c93281d68970561625acf076875 .av-section-color-overlay{\nopacity:0.3;\nbackground-color:#000000;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-kkwbho9e-3af65c93281d68970561625acf076875 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_px='500'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' style='height:500px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-12086'><div class='entry-content-wrapper clearfix'>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='av_section_2'  class='avia-section av-bjkpou-4d21ae85a694f724a081997bbbff889f main_color avia-section-default avia-no-border-styling  avia-builder-el-1  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-12086'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9r4r66-90380a229f4631b5c0d2990376471ae0\">\n.flex_column.av-9r4r66-90380a229f4631b5c0d2990376471ae0{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-9r4r66-90380a229f4631b5c0d2990376471ae0 av_four_fifth  avia-builder-el-2  el_before_av_four_fifth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-krorkjhe-74d75435870d7f77a7d0bd69bc2633ec\">\n#top .av-special-heading.av-krorkjhe-74d75435870d7f77a7d0bd69bc2633ec{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-krorkjhe-74d75435870d7f77a7d0bd69bc2633ec .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-krorkjhe-74d75435870d7f77a7d0bd69bc2633ec .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-krorkjhe-74d75435870d7f77a7d0bd69bc2633ec av-special-heading-h1 blockquote modern-quote  avia-builder-el-3  avia-builder-el-no-sibling '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Usability vs. data protection: Does authorisation management always have to be so complicated?<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_four_fifth  avia-builder-el-4  el_after_av_four_fifth  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><p><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Mobile working and the increasing networking of company data make the issue of data protection increasingly important. At the same time, known hacker attacks and data breaches are increasing the pressure on companies. The precautions to protect sensitive customer data are becoming ever stricter and more complicated. The more elaborate the measures, the more difficult it is for employees to comply with them.<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Systems should therefore fulfil a dual function: The simpler and easier it is to implement, the more likely it is to protect against data leaks and attackers. Most of the time, the issue of data protection remains the sole concern of IT administration, although everyone should be concerned about it and must handle data conscientiously while working.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6ypsa6-106889d4698954843566e738f5556a64\">\n.avia-section.av-6ypsa6-106889d4698954843566e738f5556a64{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2021\/04\/shutterstock_746652751-scaled.jpg);\nbackground-position:0% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-6ypsa6-106889d4698954843566e738f5556a64 .av-section-color-overlay{\nopacity:0.8;\nbackground-color:#3f3f3f;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-6ypsa6-106889d4698954843566e738f5556a64 alternate_color avia-section-default avia-no-border-styling  avia-builder-el-7  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-12086'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-8  el_before_av_three_fourth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h5>But which data must be protected?<\/h5>\n<p>Every company has a lot of data: Customer data, stored work processes, employee lists and company secrets. Some of this data needs more protection, some less. Therefore, you should aim for prioritisation. Which data is in daily use and which should be easily available to everyone?<\/p>\n<p>Classifications make it possible to categorise data into different risk levels. Company secrets and personal data, for example, need to be protected much more than the brand of office furniture ordered or the slides of the last online meeting.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-10  el_after_av_three_fourth  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The<strong> need-to-know principle<\/strong> is suitable. In principle, you should check who needs access to all data. Is the knowledge that can be gained from the data really important for the work of the employees? The need-to-know principle is suitable for this, according to which only those employees who really need access rights are granted access.<\/p>\n<p>In the case of highly sensitive data, you should also check whether there is a protection instruction.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div><div id='av_section_4'  class='avia-section av-3meicu-d8495e3eb4ff49e05084cd0b2b2ee015 main_color avia-section-default avia-no-border-styling  avia-builder-el-12  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-12086'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_four_fifth  avia-builder-el-13  el_before_av_four_fifth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In order to protect data, this restriction of usage rights is unavoidable and is therefore implemented in almost all organisations. However, it is precisely this circumstance that often complicates the work processes of employees: If permissions are missing, the first step is to go through the IT department. They, in turn, must first determine who is responsible for the data in the departments. At the same time, there is a lack of transparency as to who is authorised where.<\/p>\n<p>As a result, authorisations are quickly assigned on a scattergun principle, data is copied into public areas or the revocation of rights that are no longer needed is often neglected. Recertifications recommended by auditors, in which data managers have to check the rights situation at regular intervals, often mean frustration due to additional work and paper mountains full of complex matrices.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_four_fifth  avia-builder-el-15  el_after_av_four_fifth  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><blockquote>\n<p>Data protection is necessary. However, for success it is even more important to find a middle ground that considers usability and data protection equally and evaluates each process according to risk class and importance.<\/p>\n<\/blockquote>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6ypsa6-3abbc403324d278d942af899a6c4e2b8\">\n.avia-section.av-6ypsa6-3abbc403324d278d942af899a6c4e2b8{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2021\/07\/shutterstock_393482614-scaled.jpg);\nbackground-position:0% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-6ypsa6-3abbc403324d278d942af899a6c4e2b8 .av-section-color-overlay{\nopacity:0.8;\nbackground-color:#3f3f3f;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-6ypsa6-3abbc403324d278d942af899a6c4e2b8 alternate_color avia-section-default avia-no-border-styling  avia-builder-el-17  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-12086'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-18  el_before_av_three_fourth  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h5>How can the complexity be mastered?<\/h5>\n<p>Those who assign authorisations according to the need-to-know principle run a significantly lower data protection risk. It is advisable to proceed as transparently and intuitively as possible: With an approach of self-service and automated implementation, these processes can be placed in the hands of the users and take place without IT administration. If permissions are missing, they can be applied for in an easy-to-understand manner and without technical details from those responsible for the data. After approval, the changes are automatically implemented in the target system.<\/p>\n<p>Data- and user-centred evaluations enable a transparent presentation for technical laypersons. The use of time limits and the regular review of authorisations prevents an uncontrolled spread of authorisations and helps you to comply with all legal requirements.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bcmscg-b7af1a97b142497931a61a322e892d04\">\n.flex_column.av-bcmscg-b7af1a97b142497931a61a322e892d04{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bcmscg-b7af1a97b142497931a61a322e892d04 av_three_fourth  avia-builder-el-20  el_after_av_three_fourth  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kkwbj1na-aaae942871a562d489d49038a1da7612 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Each access authorisation also statistically increases the risk of a successful cyber attack from outside, which can be reduced by controlling the number of authorisations. Automating authorisation management creates security and minimises the risk of a data leak. At the same time, usability is increased so that employees are involved in the process transparently and intuitively.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div><div id='av_section_6'  class='avia-section av-jijr5i-6773ea4820c759e043e22c1487a3c605 main_color avia-section-default avia-no-border-styling  avia-builder-el-22  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-12086'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-rk2ulc-5a65cfb7a2fad58e2cb7672839719c9e\">\n.flex_column.av-rk2ulc-5a65cfb7a2fad58e2cb7672839719c9e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-rk2ulc-5a65cfb7a2fad58e2cb7672839719c9e av_three_fourth  avia-builder-el-23  el_before_av_promobox  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><article  class='iconbox iconbox_left av-kror8g6m-e52765851cbbbc6e066c4c2c9a53092f  avia-builder-el-24  avia-builder-el-no-sibling '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Good to know\"><div class=\"iconbox_icon heading-color\" aria-hidden='true' data-av_icon='\ue81f' data-av_iconfont='entypo-fontello'><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >Good to know<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>As the automated and secure self-service solution for authorisation and identity management, the BAYOOSOFT Access Manager relies on the three building blocks of self-service, automation and monitoring and thus allows usability in these processes to be significantly increased.<\/p>\n<p><a href=\"https:\/\/www.accessmanager.net\/en\/solution\/#compliance\" target=\"_blank\" rel=\"noopener\"><strong>Learn more about the BAYOOSOFT Access Manager<\/strong><\/a><\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><div  class='av_promobox av-kp6yhpxv-bf420dae7673944e334455df5e2beb8d avia-button-yes  avia-builder-el-25  el_after_av_three_fourth  avia-builder-el-last '><div class='avia-promocontent'><p>Would you like to get to know the BAYOOSOFT Access Manager directly? Sign up for a 30-day TRIAL.<\/p>\n<\/div><div  class='avia-button-wrap av-kp6yhpxv-63efe3c106422296efa3663747efeed2-wrap avia-button-right '><a href='https:\/\/www.accessmanager.net\/en\/services\/trial-anfrage\/'  class='avia-button av-kp6yhpxv-63efe3c106422296efa3663747efeed2 av-link-btn avia-icon_select-no avia-size-large avia-position-right avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Test it now\"><span class='avia_iconbox_title' >Test it now<\/span><\/a><\/div><\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":42,"featured_media":12036,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-12086","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial-en"],"_links":{"self":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/12086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/comments?post=12086"}],"version-history":[{"count":5,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/12086\/revisions"}],"predecessor-version":[{"id":15699,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/12086\/revisions\/15699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media\/12036"}],"wp:attachment":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media?parent=12086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/categories?post=12086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/tags?post=12086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}