en
  • de
Baggenstos Firmen Logo
  • Services
    • Managed Services
      • Azure Backup
      • Azure Site Recovery
      • Azure Billing
      • Managed Azure Workplace
      • Operation Care
    • Consulting Services
      • Azure Landingzone
      • Coding-as-a-Service
      • Cloud Readiness Workshop
      • Security Assessment
      • Lift and Shift
      • Azure AVD Assessment
      • Azure Migration & Modernization
      • Modern Workplace
  • Technology
    • Azure
    • Microsoft 365 & Co
    • Microsoft Copilot
    • Videos: briefly explained
    • Cloud-PC
    • Security: Overview
  • References
  • Company
    • About
    • 100 years Baggenstos
      • Videos: briefly explained
      • 100 Jahre in Bildern
      • 100 years Baggenstos
    • Team
    • Why Baggenstos
    • Certifications
      • Certifications
    • Baggiwood
  • News
    • Events
    • News
    • Webinars
    • Videos: briefly explained
  • Career
  • Contact
Baggenstos Firmen Logo
  • Services
    • Managed Services
      • Azure Backup
      • Azure Site Recovery
      • Azure Billing
      • Managed Azure Workplace
      • Operation Care
    • Consulting Services
      • Azure Landingzone
      • Coding-as-a-Service
      • Cloud Readiness Workshop
      • Security Assessment
      • Lift and Shift
      • Azure AVD Assessment
      • Azure Migration & Modernization
      • Modern Workplace
  • Technology
    • Azure
    • Microsoft 365 & Co
    • Microsoft Copilot
    • Videos: briefly explained
    • Cloud-PC
    • Security: Overview
  • References
  • Company
    • About
    • 100 years Baggenstos
      • Videos: briefly explained
      • 100 Jahre in Bildern
      • 100 years Baggenstos
    • Team
    • Why Baggenstos
    • Certifications
      • Certifications
    • Baggiwood
  • News
    • Events
    • News
    • Webinars
    • Videos: briefly explained
  • Career
  • Contact
en
  • de
What about your IT security? ►
05.03.2024

Rethinking security: digital sovereignty in the cloud

Free yourself from cloud dependency! Discover in our article how digital sovereignty in the cloud is becoming a key strategy for companies. Here are practical approaches and innovations to strengthen security and control.

The increasing use of cloud services is leading companies into complex dependencies. The overview of networks, technologies and interfaces is being lost - with serious consequences. Digital sovereignty for self-determination and control over data, technologies and security measures is becoming increasingly important. Find out which security measures are important for your company in today's article.

Cloud, security and dependencies

The pandemic has increased dependence on transnational cloud solutions. The CLOUD Act jeopardises confidentiality through US access to data hosted abroad. Identifying and closing security gaps is therefore of the utmost importance.


  • The CLOUD Act (Clarifying Lawful Overseas Use of Data Act) is a US law that came into force in 2018 on the access of US authorities to data stored on the internet.

Data sovereignty in Europe

With Gaia-X, Europe is pursuing the goal of strengthening data sovereignty and reducing dependence on foreign cloud providers. The aim is to create a federated and secure data infrastructure in accordance with European standards.


  • The Gaia-X project aims to create an efficient, competitive, secure and trustworthy data infrastructure for Europe.

Digital Switzerland

The "Digital Switzerland" strategy sets clear priorities for the digital transformation, in particular securing the infrastructure and promoting innovation. The Data Protection Act (DPA) has been fundamentally revised to improve the protection of personal data. But what about sovereignty in the Swiss cloud landscape?

Die Schweiz steht vor der Herausforderung, ihre digitale Souveränität zu stärken, da sie auf Cloud-Lösungen von aussereuropäischen Anbietern angewiesen ist. Open-Source-Lösungen* fördern Transparenz, Unabhängigkeit und digitale Resilienz proaktiv und verringern die Abhängigkeit von einem einzigen Cloudanbieter.


  • Open source generally refers to open software whose source code is publicly accessible. An open source solution therefore describes a solution approach that is based on an open source.

Challenge for SMEs

Small and medium-sized enterprises (SMEs) are increasingly the target of cyber attacks, as they often have a lot of data but only limited resources to protect it. They often lack budget, expertise and specialised personnel. Here are five practical approaches to improve their cyber security. Staff training is crucial to raise awareness of cyber threats.

Focusing on data with strict encryption and precise access control is crucial. Reducing complexity, especially through zero trust, is advantageous. As-a-service models such as managed services enable efficient resource utilisation. Preparation for attacks: Analysis of status and activity data and involvement of external service providers for continuous monitoring and defence against cyber attacks.

The most important measures in the Quick Check

  • Regular training for employees to sensitise them to cyber threats.
  • Focus on protecting the data itself through encryption and strict access control.
  • Reduce complexity, in particular through zero trust and secure components.
  • Evaluation of as-a-service models to control costs and conserve resources.
  • Future-proofing through the use of XDR solutions, preferably from external providers.

Implementing these measures enables SMEs to organise their cyber security efficiently despite limited resources.

Conclusion: time to rethink cloud security

It is time to rethink security in the cloud and establish digital sovereignty as an essential element of digital transformation. Only by acting proactively can companies retain control over their data and technologies and shape a secure digital future.

On the safe side with Baggenstos

Baggenstos supports you with individual training for your employees and data-centred security strategies. Managed security services ensure comprehensive protection. Regular security audits, emergency plans and compliance management further strengthen your IT security. The integration of innovative technologies guarantees proactive protection against cyber threats for your company. Contact us for your first step towards greater security.


  • The source of today's article is this publication by Martin Andenmatten on the portal netzwoche.ch

Think, rethink, think ahead

Security 2.0: Digital sovereignty in the cloud

Contact Objective safety analysis ►
Previous article

The new Microsoft Planner: A s...

Next article

Webinar recording Microsoft 36...

News Rethinking security: digital sovereignty in the cloud

Newsletter

Support

  • Services
    • Managed Services
      • Operation Care
      • Managed Azure Workplace
      • Azure Billing
      • Azure Backup
      • Azure Site Recovery
    • Consulting Services
      • Azure Migration & Modernization
      • Lift and Shift
      • Azure AVD Assessment
      • Coding-as-a-Service
      • Cloud Readiness Workshop
      • Azure Landingzone
      • Security Assessment
      • Modern Workplace
  • Technology
    • Azure
    • Microsoft Copilot
    • Security: Overview
    • Videos: briefly explained
    • Microsoft 365 & Co
    • Cloud-PC
  • References
  • Company
    • About
    • 100 years Baggenstos
      • 100 years Baggenstos
      • 100 Jahre in Bildern
      • Videos: briefly explained
    • Team
    • Why Baggenstos
    • Certifications
      • Certifications
    • Baggiwood
  • News
    • Webinars
    • Videos: briefly explained
  • Career
  • Data Protection
  • Terms

Folgen Sie uns auf: LinkedIn / Youtube / Instagram / Facebook / X

© 2025

A. Baggenstos & Co. AG