How to comply with anti-virus programs state of the art for GDPR
Article 32 of the General Data Protection Regulation (DSGVO) states that companies must protect their data in accordance with the “state of the art”. Anti-virus programs can also help. The term “state of the art” already plays a role in § 8a of the Act to Increase the Security of Information Technology Systems (IT Security Act) from 2015. It is formulated here that critical infrastructures (CRITICAL) must be secured accordingly. One step further goes to Art. 32 of the GDPR. Here, the state of the art is the benchmark for IT security, when it comes to protection of personal data goes .
Even IT experts are not always in complete agreement on how to interpret this formula. What is clear, however, is that there are always security holes in German companies and the associated loss of data. These can be punished with immense punishments since May 2018.
How to comply with anti-virus programs state of the art for GDPR
Article 32 of the General Data Protection Regulation (DSGVO) states that companies must protect their data in accordance with the “state of the art”. Anti-virus programs can also help. The term “state of the art” already plays a role in § 8a of the Act to Increase the Security of Information Technology Systems (IT Security Act) from 2015. It is formulated here that critical infrastructures (CRITICAL) must be secured accordingly. One step further goes to Art. 32 of the GDPR. Here, the state of the art is the benchmark for IT security, when it comes to protection of personal data goes .
Even IT experts are not always in complete agreement on how to interpret this formula. What is clear, however, is that there are always security holes in German companies and the associated loss of data. These can be punished with immense punishments since May 2018.
1. That means state of the art
1. That means state of the art
If you want to get to the bottom of the GDPR formula “state of the art”, take a close look at the general architecture of security solutions. The first IT laws contained the term “antivirus”, the corresponding software had to be installed on all endpoints.
Affected companies had no problems making this clear move. But clear spelling out in the field of IT security is not always an advantage. This is how appropriate security solutions are also disclosed to potential cyber criminals, who usually do not find it particularly difficult to find entry points despite antivirus protection.
The first antivirus programs, based on pattern-based updates were quickly outwitted by hackers. Conversely, this means that reliability and security of IT protection depend not only on the technology itself, but also on the degree of distribution.
The last 30 years have shown that every two to three years a new technology has reached the market for endpoint security. This always had a greater impact than all of its predecessors. So if the legislature had to rewrite the IT security laws about every three years, it would make precise technologies a must.
If you want to get to the bottom of the GDPR formula “state of the art”, take a close look at the general architecture of security solutions. The first IT laws contained the term “antivirus”, the corresponding software had to be installed on all endpoints.
Affected companies had no problems making this clear move. But clear spelling out in the field of IT security is not always an advantage. This is how appropriate security solutions are also disclosed to potential cyber criminals, who usually do not find it particularly difficult to find entry points despite antivirus protection.
The first antivirus programs, based on pattern-based updates were quickly outwitted by hackers. Conversely, this means that reliability and security of IT protection depend not only on the technology itself, but also on the degree of distribution.
The last 30 years have shown that every two to three years a new technology has reached the market for endpoint security. This always had a greater impact than all of its predecessors. So if the legislature had to rewrite the IT security laws about every three years, it would make precise technologies a must.
2. Every company has its own state of the art
2. Every company has its own state of the art
Also, you can not make a general statement about what helps a business or not. Every group, every institution or company has its own risk and requirement profile with regard to IT security. Security technologies that effectively protect a large-scale enterprise can already fail the budget for a medium-sized enterprise.
An exactly prescribed security architecture may be too complex for one company, while it may not even be sufficient for the big corporation. Therefore, it makes sense that the term “state of the art” has been used in the formulation of the GDPR.
Existentially important is also the reflection that you deal with the topic of security continuously. It would be fatal to simply buy the first product.
The different interpretation of the “state of the art” raises the awareness that the security of your IT technology is not a status quo that you simply obtain in this way and that is then no longer subject to change. On the contrary: IT protection is a constant process, for which a meaningful strategy is required to always effectively protect your sensitive data.
Also, you can not make a general statement about what helps a business or not. Every group, every institution or company has its own risk and requirement profile with regard to IT security. Security technologies that effectively protect a large-scale enterprise can already fail the budget for a medium-sized enterprise.
An exactly prescribed security architecture may be too complex for one company, while it may not even be sufficient for the big corporation. Therefore, it makes sense that the term “state of the art” has been used in the formulation of the GDPR.
Existentially important is also the reflection that you deal with the topic of security continuously. It would be fatal to simply buy the first product.
The different interpretation of the “state of the art” raises the awareness that the security of your IT technology is not a status quo that you simply obtain in this way and that is then no longer subject to change. On the contrary: IT protection is a constant process, for which a meaningful strategy is required to always effectively protect your sensitive data.
3. Achieve state of the art
3. Achieve state of the art
With the anti-virus software from the extensive range of Licensing, you can achieve the state of the art that is optimal for you. After all, Lizenzking is Germany’s first address for software licenses. Business customers as well as private users get inexpensive programs for immediate download on Licenseking.de and receive a first class service. Licensing does not only offer helpful software from the areas of security & tuning, office & tax as well as multimedia & graphics, but also a large selection of Microsoft licenses.
For example, with “Kaspersky Small Office Security”. This security program is ideal for small businesses that have between five and 25 computers, mobile devices and some servers. “Kaspersky Small Office Security” is managed on a cloud-based console, which is very user-friendly.
You do not need any previous IT knowledge for this software, an out-of-the-box solution.
You can use the powerful security tools efficiently right from the start and keep an eye on the security of your connected devices. Protect your computers, file servers and other devices with „Kaspersky Small Office Security“ from a single console in order to achieve your individual state of the art.
With the anti-virus software from the extensive range of Licensing, you can achieve the state of the art that is optimal for you. After all, Lizenzking is Germany’s first address for software licenses. Business customers as well as private users get inexpensive programs for immediate download on Licenseking.de and receive a first class service. Licensing does not only offer helpful software from the areas of security & tuning, office & tax as well as multimedia & graphics, but also a large selection of Microsoft licenses.
For example, with “Kaspersky Small Office Security”. This security program is ideal for small businesses that have between five and 25 computers, mobile devices and some servers. “Kaspersky Small Office Security” is managed on a cloud-based console, which is very user-friendly.
You do not need any previous IT knowledge for this software, an out-of-the-box solution.
You can use the powerful security tools efficiently right from the start and keep an eye on the security of your connected devices. Protect your computers, file servers and other devices with „Kaspersky Small Office Security“ from a single console in order to achieve your individual state of the art.
About the Author:
About the Author:
Popular Posts:
Warum dein Excel-Kurs Zeitverschwendung ist – was du wirklich lernen solltest!
Hand aufs Herz: Wann hast du zuletzt eine komplexe Excel-Formel ohne Googeln getippt? Eben. KI schreibt heute den Code für dich. Erfahre, warum klassische Excel-Trainings veraltet sind und welche 3 modernen Skills deinen Marktwert im Büro jetzt massiv steigern.
Cybersicherheit: Die 3 größten Fehler, die 90% aller Mitarbeiter machen
Hacker brauchen keine Codes, sie brauchen nur einen unaufmerksamen Mitarbeiter. Von Passwort-Recycling bis zum gefährlichen Klick: Wir zeigen die drei häufigsten Fehler im Büroalltag und geben praktische Tipps, wie Sie zur menschlichen Firewall werden.
So sieht das wirklich perfekte Homeoffice-Setup für 2026 aus
Ihr Homeoffice ist veraltet? Steigern Sie 2026 Produktivität & Gesundheit. Unser Guide zeigt das perfekte Setup: von ergonomischen Stühlen und 4K-Webcams bis zu Mesh-WLAN und Kabelmanagement. So investieren Sie in Ihre Karriere.
Internet, Telefon & TV: Die besten Komplettpakete
Internet, TV & Telefon aus einer Hand? Wir vergleichen die Komplettpakete von Telekom, Vodafone, O2 & 1&1. Wer punktet bei Speed, TV-Komfort (MagentaTV vs. GigaTV) und Preis? So finden Sie das beste Triple-Play-Angebot für Ihre Adresse.
5 Anzeichen, dass dein Chef dich im Homeoffice digital überwacht
Nur weil du im Homeoffice bist, heißt das nicht, dass dir niemand zusieht. "Bossware" ist auf dem Vormarsch. Wir zeigen 5 subtile Anzeichen für digitale Überwachung – von "Teams-Status"-Kult bis zu verdächtigen IT-Tools. So erkennst du die Warnsignale und schützt deine Karriere.
Schluss mit dem Tool-Chaos: 5 Apps, die Euer Office wirklich produktiver machen
Schluss mit digitaler Reibung: Diese 5 Apps machen Ihr Büro wirklich produktiver. Entdecken Sie, wie Asana, Loom, Notion, Zapier und Slack die Effizienz steigern, Meetings reduzieren und Ihr Team smarter vernetzen – wenn man sie richtig einsetzt.
Popular Posts:
Warum dein Excel-Kurs Zeitverschwendung ist – was du wirklich lernen solltest!
Hand aufs Herz: Wann hast du zuletzt eine komplexe Excel-Formel ohne Googeln getippt? Eben. KI schreibt heute den Code für dich. Erfahre, warum klassische Excel-Trainings veraltet sind und welche 3 modernen Skills deinen Marktwert im Büro jetzt massiv steigern.
Cybersicherheit: Die 3 größten Fehler, die 90% aller Mitarbeiter machen
Hacker brauchen keine Codes, sie brauchen nur einen unaufmerksamen Mitarbeiter. Von Passwort-Recycling bis zum gefährlichen Klick: Wir zeigen die drei häufigsten Fehler im Büroalltag und geben praktische Tipps, wie Sie zur menschlichen Firewall werden.
So sieht das wirklich perfekte Homeoffice-Setup für 2026 aus
Ihr Homeoffice ist veraltet? Steigern Sie 2026 Produktivität & Gesundheit. Unser Guide zeigt das perfekte Setup: von ergonomischen Stühlen und 4K-Webcams bis zu Mesh-WLAN und Kabelmanagement. So investieren Sie in Ihre Karriere.
Internet, Telefon & TV: Die besten Komplettpakete
Internet, TV & Telefon aus einer Hand? Wir vergleichen die Komplettpakete von Telekom, Vodafone, O2 & 1&1. Wer punktet bei Speed, TV-Komfort (MagentaTV vs. GigaTV) und Preis? So finden Sie das beste Triple-Play-Angebot für Ihre Adresse.
5 Anzeichen, dass dein Chef dich im Homeoffice digital überwacht
Nur weil du im Homeoffice bist, heißt das nicht, dass dir niemand zusieht. "Bossware" ist auf dem Vormarsch. Wir zeigen 5 subtile Anzeichen für digitale Überwachung – von "Teams-Status"-Kult bis zu verdächtigen IT-Tools. So erkennst du die Warnsignale und schützt deine Karriere.
Schluss mit dem Tool-Chaos: 5 Apps, die Euer Office wirklich produktiver machen
Schluss mit digitaler Reibung: Diese 5 Apps machen Ihr Büro wirklich produktiver. Entdecken Sie, wie Asana, Loom, Notion, Zapier und Slack die Effizienz steigern, Meetings reduzieren und Ihr Team smarter vernetzen – wenn man sie richtig einsetzt.



























