<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SME Munich on Barash Helvadzhaoglu</title><link>https://barashhelvadzhaoglu.com/en/tags/sme-munich/</link><description>Recent content in SME Munich on Barash Helvadzhaoglu</description><generator>Hugo -- 0.160.1</generator><language>en</language><lastBuildDate>Fri, 17 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://barashhelvadzhaoglu.com/en/tags/sme-munich/index.xml" rel="self" type="application/rss+xml"/><item><title>IT Security Obligations for Small Businesses in Bavaria — and How Digitalbonus Bayern Covers Up to 50% of the Costs</title><link>https://barashhelvadzhaoglu.com/en/posts/digitalbonus-comprehensive/</link><pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate><guid>https://barashhelvadzhaoglu.com/en/posts/digitalbonus-comprehensive/</guid><description>Which IT security measures are legally required in Bavaria? Firewall, network separation, email protection, backup — with legal references and grants up to €7,500.</description><content:encoded><![CDATA[<h1 id="it-security-obligations-for-small-businesses--and-how-digitalbonus-bayern-covers-up-to-50">IT Security Obligations for Small Businesses — and How Digitalbonus Bayern Covers Up to 50%</h1>
<p>Many small businesses in Bavaria believe that IT security is a topic for large corporations. The reality is different: The GDPR applies to <strong>everyone</strong> who processes personal data — from retailers and medical practices to hotels. And the requirements are concrete, binding, and enforced with fines.</p>
<p>The good news: The <strong>Digitalbonus Bayern</strong> reimburses up to <strong>50% of the investment costs</strong> — for firewalls, network separation, email security, backup, and more. The program runs until December 2027.</p>
<blockquote>
<p>💬 <strong>Free IT Analysis:</strong> <a href="https://wa.me/4916098665971">WhatsApp</a> or <a href="mailto:info@barashhelvadzhaoglu.com">Email</a>
We check your infrastructure free of charge — no contract, no product sales.</p>
</blockquote>
<hr>
<h2 id="the-legal-basis-what-is-actually-mandatory">The Legal Basis: What is Actually Mandatory?</h2>
<h3 id="gdpr-article-32--security-of-processing">GDPR Article 32 — Security of Processing</h3>
<p><strong>Source:</strong> <a href="https://gdpr.eu/article-32-security-of-processing/">Art. 32 GDPR</a></p>
<blockquote>
<p>„The controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk.&quot;</p>
</blockquote>
<p>This means: Every company that processes personal data — i.e., names, email addresses, health data, booking information — must set up <strong>technical protection measures</strong>. Not as a recommendation, but as a <strong>legal obligation</strong>.</p>
<h3 id="bsi-it-grundschutz--the-technical-standard">BSI IT-Grundschutz — The Technical Standard</h3>
<p><strong>Source:</strong> <a href="https://www.bsi.bund.de/grundschutz">BSI IT-Grundschutz Compendium</a></p>
<p>The Federal Office for Information Security (BSI) defines in the IT-Grundschutz specifically what &ldquo;appropriate technical measures&rdquo; mean in the sense of the GDPR. German courts and data protection authorities use this standard as a guide during audits.</p>
<p><strong>Does BSI IT-Grundschutz apply to small businesses?</strong>
Formally, it is voluntary — but: The GDPR prescribes the &ldquo;state of the art.&rdquo; In Germany, this corresponds to the BSI IT-Grundschutz. Those who do not comply may have to prove during an audit why their alternative measures are equivalent.</p>
<hr>
<h2 id="what-is-specifically-required--measure-by-measure">What is Specifically Required — Measure by Measure</h2>
<h3 id="1-firewall--mandatory-according-to-bsi-net32">1. Firewall — Mandatory according to BSI NET.3.2</h3>
<p><strong>Legal Basis:</strong> BSI IT-Grundschutz, Building Block <a href="https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/Kompendium/Bausteine/Infrastruktur/NET_3_2_Firewall.pdf">NET.3.2 Firewall</a></p>
<p>BSI NET.3.2.A2 stipulates:</p>
<blockquote>
<p>„A rule set for the firewall must be created. No data traffic may automatically pass from the external to the internal network.&quot;</p>
</blockquote>
<p>BSI NET.3.2.A9 adds:</p>
<blockquote>
<p>„The firewall must log all important events.&quot;</p>
</blockquote>
<p><strong>What this means in practice:</strong></p>
<ul>
<li>A simple DSL router is <strong>not</strong> a firewall in the sense of the BSI.</li>
<li>A UTM firewall (e.g., Fortinet FortiGate, Palo Alto) is required.</li>
<li>The firewall must sit between <strong>all</strong> network zones — not just between the internet and the internal network.</li>
</ul>
<p><strong>Eligible for Digitalbonus:</strong> ✅ Yes — Hardware and configuration services.</p>
<hr>
<h3 id="2-network-segmentation-vlans--mandatory-according-to-bsi-net11-and-gdpr-art-25">2. Network Segmentation (VLANs) — Mandatory according to BSI NET.1.1 and GDPR Art. 25</h3>
<p><strong>Legal Basis:</strong></p>
<ul>
<li>BSI IT-Grundschutz, Building Block <a href="https://www.bsi.bund.de/grundschutz">NET.1.1 Network Architecture and Design</a></li>
<li>GDPR Art. 25 — Data protection by design and by default (Privacy by Design)</li>
</ul>
<blockquote>
<p>„Personal data must be processed in such a way that only persons who need it for their tasks have access.&quot;</p>
</blockquote>
<p><strong>What this means in practice:</strong></p>
<p>The following device classes must be operated in <strong>separate networks (VLANs)</strong>:</p>
<table>
  <thead>
      <tr>
          <th>Network Segment</th>
          <th>What belongs in it</th>
          <th>Risk without separation</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td><strong>Employee Net</strong></td>
          <td>PCs, Laptops</td>
          <td>Access to customer data</td>
      </tr>
      <tr>
          <td><strong>Server / NAS</strong></td>
          <td>File server, Backup system</td>
          <td>Data loss during attack</td>
      </tr>
      <tr>
          <td><strong>IoT Devices</strong></td>
          <td>Printers, IP Cameras, Smart TV, UPS</td>
          <td>Known security gaps, no updates</td>
      </tr>
      <tr>
          <td><strong>Guest WLAN</strong></td>
          <td>Customers, Patients, Hotel guests</td>
          <td>Access to internal systems</td>
      </tr>
      <tr>
          <td><strong>POS / Checkout</strong></td>
          <td>Card terminal, Checkout system</td>
          <td>PCI DSS obligation, payment data</td>
      </tr>
  </tbody>
</table>
<p><strong>Why printers are dangerous:</strong>
IP printers often have outdated firmware and no automatic security updates. A compromised printer on the same network as the accounting PC gives attackers direct access to all data.</p>
<p><strong>Why IP cameras are dangerous:</strong>
Cheap IP cameras (Hikvision, Dahua) are regularly misused in international hacker attacks — as an entry point into the company network.</p>
<p><strong>Eligible for Digitalbonus:</strong> ✅ Yes — Managed switches, Access Points, configuration services.</p>
<hr>
<h3 id="3-guest-wlan-with-captive-portal-and-log-storage">3. Guest WLAN with Captive Portal and Log Storage</h3>
<p><strong>Legal Basis:</strong></p>
<ul>
<li>GDPR Art. 32 — Technical protection measures</li>
<li>§ 100 TKG (Telecommunications Act) — Traffic data</li>
<li>BSI IT-Grundschutz NET.2.2 — WLAN usage</li>
</ul>
<p><strong>What is required:</strong></p>
<p><strong>a) Complete Isolation:</strong>
The guest WLAN must have <strong>no</strong> access to internal systems. A hotel guest or patient in the waiting room must not be able to access booking systems, printers, or employee files.</p>
<p><strong>b) Connection Logs — 12-month storage obligation:</strong>
Anyone offering public WLAN must keep connection data (IP address, connection time, connection duration) for <strong>12 months</strong> — for possible official inquiries.</p>
<p><strong>c) Captive Portal with GDPR Consent:</strong>
Upon login, the guest must be informed about data processing and actively consent.</p>
<p><strong>Technical Implementation:</strong>
The connection logs are captured by the firewall (e.g., FortiGate) and automatically transferred to a NAS device — stored there for 12 months.</p>
<p><strong>Eligible for Digitalbonus:</strong> ✅ Yes — WLAN hardware and configuration.</p>
<hr>
<h3 id="4-email-security--mandatory-according-to-bsi-app53-and-gdpr-art-32">4. Email Security — Mandatory according to BSI APP.5.3 and GDPR Art. 32</h3>
<p><strong>Legal Basis:</strong></p>
<ul>
<li>BSI IT-Grundschutz, Building Block <a href="https://www.bsi.bund.de/grundschutz">APP.5.3 General Email Client and Server</a></li>
<li>GDPR Art. 32 — Protection against unauthorized access and data loss</li>
</ul>
<p>BSI APP.5.3.A1 stipulates:</p>
<blockquote>
<p>„Protective measures must be taken against malware in emails. Incoming and outgoing emails must be checked for malware.&quot;</p>
</blockquote>
<p><strong>What this means in practice:</strong>
A simple email mailbox at Ionos or Strato without additional protection is <strong>not sufficient</strong>.</p>
<p>What is required:</p>
<ul>
<li><strong>Spam Filtering:</strong> Blocking of unsolicited bulk emails.</li>
<li><strong>Malware Protection:</strong> Detection of harmful attachments (Ransomware, Trojans).</li>
<li><strong>Phishing Protection:</strong> Detection of forged sender addresses (Business Email Compromise).</li>
<li><strong>Logging:</strong> Proof of all filtered emails.</li>
</ul>
<p><strong>Technical Solution:</strong>
A cloud-based Email Security Gateway (e.g., Hornetsecurity, FortiMail Cloud) routes all incoming emails through a security filter before they reach the recipient. Works with any existing email system — Office 365, Google Workspace, or simple webmail.</p>
<p><strong>Eligible for Digitalbonus:</strong> ✅ Yes — as an IT security software license (up to 18 months).</p>
<hr>
<h3 id="5-endpoint-protection-antivirus--edr--mandatory-according-to-bsi-sys21-and-gdpr-art-32">5. Endpoint Protection (Antivirus / EDR) — Mandatory according to BSI SYS.2.1 and GDPR Art. 32</h3>
<p><strong>Legal Basis:</strong></p>
<ul>
<li>BSI IT-Grundschutz, Building Block <a href="https://www.bsi.bund.de/grundschutz">SYS.2.1 General Client</a></li>
<li>GDPR Art. 32 — Protection against data loss through malware</li>
</ul>
<p>BSI SYS.2.1.A6 stipulates:</p>
<blockquote>
<p>„A virus protection program must be installed and activated on clients. The virus protection program must be updated regularly.&quot;</p>
</blockquote>
<p>BSI SYS.2.1.A7 adds:</p>
<blockquote>
<p>„Security-relevant events must be logged and checked for anomalies.&quot;</p>
</blockquote>
<p><strong>What this means in practice:</strong></p>
<p>A single antivirus program on each PC — without central management — does <strong>not</strong> comply with the BSI standard. What is required:</p>
<ul>
<li><strong>Central Management:</strong> An administrator sees the protection status of all devices at a glance.</li>
<li><strong>Real-time Protection:</strong> Threats are detected before they cause damage.</li>
<li><strong>Ransomware Protection:</strong> File encryption by malware is blocked.</li>
<li><strong>Logging:</strong> All security events are recorded — for potential audits.</li>
<li><strong>Monthly Reports:</strong> Proof of active protective measures.</li>
</ul>
<p><strong>Technical Solution:</strong>
Centrally managed EDR solutions like Bitdefender GravityZone or ESET Protect enable the management of all devices via a central dashboard.</p>
<p><strong>Eligible for Digitalbonus:</strong> ✅ Yes — Software licenses and setup services.</p>
<hr>
<h3 id="6-data-backup--mandatory-according-to-bsi-con3-and-gobd">6. Data Backup — Mandatory according to BSI CON.3 and GoBD</h3>
<p><strong>Legal Basis:</strong></p>
<ul>
<li>BSI IT-Grundschutz, Building Block <a href="https://www.bsi.bund.de/grundschutz">CON.3 Data Backup Concept</a></li>
<li>GoBD (Principles of Proper Bookkeeping) — legal retention obligations</li>
<li>GDPR Art. 32 — Recoverability of personal data</li>
</ul>
<p>BSI CON.3.A7 stipulates:</p>
<blockquote>
<p>„The backed-up data must be restored regularly to check the functionality of the data backup.&quot;</p>
</blockquote>
<p><strong>The 3-2-1 Rule — Industry Standard:</strong></p>
<ul>
<li><strong>3</strong> Copies of the data</li>
<li><strong>2</strong> Different storage media (e.g., NAS + Cloud)</li>
<li><strong>1</strong> Copy off-site (e.g., AWS Frankfurt)</li>
</ul>
<p><strong>What this means in practice:</strong>
A single external hard drive that is occasionally manually loaded does <strong>not</strong> comply with the BSI standard. What is required:</p>
<ul>
<li><strong>Automatic daily backup</strong> — no manual intervention.</li>
<li><strong>Encryption</strong> — data is protected even if the backup medium is stolen.</li>
<li><strong>External copy</strong> — in case of fire or burglary, the backup remains preserved.</li>
<li><strong>Regular restoration tests</strong> — proof that the backup works.</li>
<li><strong>GoBD Compliance</strong> — retention periods of 6–10 years for accounting data.</li>
</ul>
<p><strong>Technical Solution:</strong>
NAS device (e.g., Synology) with automatic encrypted synchronization to AWS S3 Frankfurt — EU data center, GDPR compliant.</p>
<p><strong>Eligible for Digitalbonus:</strong> ✅ Yes — NAS hardware and Cloud backup setup.</p>
<hr>
<h2 id="real-fines--triggered-by-complaints-not-inspections">Real Fines — Triggered by Complaints, Not Inspections</h2>
<p>The BayLDA does <strong>not carry out regular routine audits</strong>. Fines arise through:</p>
<ul>
<li><strong>Customer Complaints</strong> — a dissatisfied patient, guest, or employee.</li>
<li><strong>Data Breaches</strong> — hacker attack, data loss, accidental disclosure.</li>
<li><strong>Competitor Complaints</strong> — competitors file a report.</li>
</ul>
<p>The Bavarian State Office for Data Protection Supervision (BayLDA) imposed the highest number of fines in 2023 since the introduction of the GDPR. Real examples: Dental practice in Bavaria €3,500, retail trade €1,200 — triggered by individual customer complaints.</p>
<p><strong>Important:</strong> Ignorance is no excuse. The GDPR has been in force since 2018 — every company had time to adapt.</p>
<hr>
<h2 id="what-the-digitalbonus-bayern-funds">What the Digitalbonus Bayern Funds</h2>
<p><strong>Program:</strong> <a href="https://www.digitalbonus.bayern">Digitalbonus Bayern</a>
<strong>Funding Rate:</strong> 50% of eligible costs
<strong>Maximum:</strong> €7,500 (Digitalbonus Standard) — once for each funding area (IT Security and Digitalization)
<strong>Duration:</strong> until December 31, 2027
<strong>Application:</strong> Exclusively digital via ELSTER business account</p>
<table>
  <thead>
      <tr>
          <th>Measure</th>
          <th>Eligible</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>Firewall (Hardware + License + Configuration)</td>
          <td>✅ Yes</td>
      </tr>
      <tr>
          <td>Managed Switch for VLAN separation</td>
          <td>✅ Yes</td>
      </tr>
      <tr>
          <td>WLAN Access Points</td>
          <td>✅ Yes</td>
      </tr>
      <tr>
          <td>NAS + encrypted Cloud backup</td>
          <td>✅ Yes</td>
      </tr>
      <tr>
          <td>Email security license (up to 18 months)</td>
          <td>✅ Yes</td>
      </tr>
      <tr>
          <td>Antivirus/EDR licenses (up to 18 months)</td>
          <td>✅ Yes</td>
      </tr>
      <tr>
          <td>Installation and configuration services</td>
          <td>✅ Yes</td>
      </tr>
      <tr>
          <td>Maintenance contract (up to 18 months)</td>
          <td>✅ Yes</td>
      </tr>
      <tr>
          <td>Consulting services (up to 50% of total costs)</td>
          <td>✅ Yes</td>
      </tr>
      <tr>
          <td>Standard PCs, Laptops, Printers</td>
          <td>❌ No</td>
      </tr>
      <tr>
          <td>Standard office software (Office, Windows)</td>
          <td>❌ No</td>
      </tr>
  </tbody>
</table>
<p><strong>Important Condition:</strong> The application must be submitted <strong>before</strong> the start of the project. Neither the order nor the verbal assignment may take place before receipt of the application confirmation.</p>
<hr>
<h2 id="example-calculation-small-hotel-10-rooms-5-employees">Example Calculation: Small Hotel (10 rooms, 5 employees)</h2>
<table>
  <thead>
      <tr>
          <th>Measure</th>
          <th>Costs</th>
          <th>After Funding (50%)</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>FortiGate Firewall + 1-year license</td>
          <td>€1,000</td>
          <td>€500</td>
      </tr>
      <tr>
          <td>Managed Switch (VLAN-capable)</td>
          <td>€500</td>
          <td>€250</td>
      </tr>
      <tr>
          <td>3× WLAN Access Points</td>
          <td>€900</td>
          <td>€450</td>
      </tr>
      <tr>
          <td>NAS + AWS Backup setup</td>
          <td>€500</td>
          <td>€250</td>
      </tr>
      <tr>
          <td>Email Security (18 months)</td>
          <td>€400</td>
          <td>€200</td>
      </tr>
      <tr>
          <td>Antivirus/EDR 5 devices (18 months)</td>
          <td>€300</td>
          <td>€150</td>
      </tr>
      <tr>
          <td>Installation &amp; Configuration</td>
          <td>€1,000</td>
          <td>€500</td>
      </tr>
      <tr>
          <td>18 months maintenance</td>
          <td>€900</td>
          <td>€450</td>
      </tr>
      <tr>
          <td><strong>Total</strong></td>
          <td><strong>€5,500</strong></td>
          <td><strong>€2,750</strong></td>
      </tr>
  </tbody>
</table>
<p>The hotel pays <strong>€2,750</strong> — the Free State of Bavaria takes over <strong>€2,750</strong>.</p>
<hr>
<h2 id="for-whom-is-this-relevant">For Whom is This Relevant?</h2>
<ul>
<li><strong>Hotels &amp; Guesthouses</strong> — guest WLAN, camera systems, booking data, POS terminals</li>
<li><strong>Medical &amp; Therapy Practices</strong> — patient data, professional secrecy, GDPR + §75b SGB V</li>
<li><strong>Law Firms</strong> — client confidentiality, strict GDPR obligations</li>
<li><strong>Cafés &amp; Restaurants</strong> — guest WLAN, checkout system, reservation data</li>
<li><strong>Language Schools</strong> — student WLAN, administration data, teacher data</li>
<li><strong>Small Offices (2–20 people)</strong> — without their own IT department</li>
</ul>
<hr>
<h2 id="what-we-offer-independent-consulting--no-product-sales">What We Offer: Independent Consulting — No Product Sales</h2>
<p>We do not sell products. You choose your own providers and products — we help with planning, installation, configuration, and documentation.</p>
<p>As a <strong>Senior Network Security Engineer with 11+ years of experience</strong> in banking, industry, and hospitality (including Hilton, Marriott, Crown Hotel Group, Wyndham Grand Europa), we offer:</p>
<ol>
<li><strong>Free IT Infrastructure Analysis</strong> — we look at your current situation and show where the gaps are.</li>
<li><strong>Independent Product Recommendation</strong> — we recommend what suits you, not what is the most expensive.</li>
<li><strong>Technical Implementation</strong> — VLAN configuration, firewall setup, backup setup, email security.</li>
<li><strong>Digitalbonus Application Preparation</strong> — we help with the documentation of the eligible measures.</li>
<li><strong>Ongoing Maintenance</strong> — monthly monitoring, updates, point of contact for problems.</li>
</ol>
<hr>
<h2 id="next-step-free-analysis">Next Step: Free Analysis</h2>
<p><strong>📱 WhatsApp:</strong> <a href="https://wa.me/4916098665971">wa.me/4916098665971</a></p>
<p><strong>📧 Email:</strong> <a href="mailto:info@barashhelvadzhaoglu.com">info@barashhelvadzhaoglu.com</a></p>
<p><em>Free analysis. No assignment without your consent. No product sales — only consulting and technical expertise.</em></p>
<hr>
<h2 id="further-links">Further Links</h2>
<ul>
<li><a href="https://www.digitalbonus.bayern">Digitalbonus Bayern — Official Funding Program</a></li>
<li><a href="https://gdpr.eu/article-32-security-of-processing/">GDPR Article 32 — Security of Processing</a></li>
<li><a href="https://www.bsi.bund.de/grundschutz">BSI IT-Grundschutz Compendium</a></li>
<li><a href="https://www.lda.bayern.de">BayLDA — Bavarian State Office for Data Protection Supervision</a></li>
<li><a href="https://www.bundesfinanzministerium.de/Content/DE/Downloads/BMF_Schreiben/Weitere_Steuerthemen/Abgabenordnung/2019-11-28-GoBD.pdf">GoBD — Principles of Bookkeeping</a></li>
</ul>
]]></content:encoded></item></channel></rss>