Cyber Security

What is Cyber Security?

To put it simply: "How to not to get hacked". Of course, not only safe use of the Internet is meant, but everything that has to do with safe use of computers of all kinds (online and offline). Thus, cyber security includes everything needed to protect against threats, data breaches and intruders.
In practical terms, this means that many different aspects have to be considered; Protecting the network, detecting threats in applications, training staff and customers, implementing access control systems as well as active maintenance of an appropriate data protection strategy.
We are happy to help you with our knowledge and practical experience. We'd aslo be happy to visit you on site, so just give us a call!

Data Protection

Data protection represents the legal framework in which companies, private individuals, but also the federal government and cantons must operate. Data protection laws vary greatly from country to country. We know the various legal areas and would be happy to advise you.
Why do we need data protection? To protect privacy! The private sphere, as natural as it seems, is essential for every human being. If it is disregarded or violated, large damage the individual or groups of individuals can occur relatively quickly.

data protection

Data Safety

data safety

Data Safety is often broken down into 3 aspects to make the term more tangible;
Data Confidentiality: How is it ensured that nobody who is not authorized can read or much less change the data of concern?
Data Integrity: How can I be sure that the data I have received is correct and has not been altered in transit from the sender to receiver?
Data Availability: Is my data always accessible to all authorised personal in the company?

Our Cyber Security Services

Consulting

Have you been hacked? Call us immediately without any obligation. This is to prevent further damage to your data and IT landscape. Malware often spreads quickly and unnoticed.

Would you like a report on the current security status of your IT landscape? We would be happy to visit you, take the time to take a look at all the details of your IT infrastructure and create a report on the current state of data security.
This can then be used as a basis for developing a new or improve an existing cyber security strategy.

Training Courses

The following is certain: By far the most frequently used attacks are so-called social engineering attacks.
The essence of a social engineering attack is the idea of ​​manipulating people in such a way that they give the attacker access to data or even money. We've all received emails like this. However, this is just one of many data security threats.

In our training courses, all staff are therefore brought up to date. Backgrounds are explained in detail, defense mechanisms are learned and a data protection stretegy are worked out.

Pen Testing

Penetration testing is a central element of an actively practiced data protection strategy.
Firewalls, strong passwords everywhere, trained staff with a watchful eye, software updated, it's all good.
The crucial question is now: does it actually work in practice? That's exactly what we want to find out; we hack you on behalf of you! As a result, you will receive a report and concrete suggestions for closing the security gaps found.
Depending on the size of the company and the complexity of the IT landscape, the timing of this process can vary.

+