Despite the great importance of processes and technology in the company, people remain the focus of attention. We don't loose focus!

Security Awareness

Focus on the human being. Different forms of awareness programs are held for customers. What they all have in common is that they always contain events for employees. They do not point out the risks and dangers with a wagging finger. On the contrary, it is casually pointed out how easy it is to exploit vulnerabilities - and that everyone can be a potential target.

The weakest link is - as in most cases - the human being. A well-known quotation with a high truthfulness! The best security processes and state-of-the-art technical protection measures bring little added value without acceptance in the company. But how can employees actually be taken along in order to increase the security level in the company? We know the answer! Let our concepts convince you!

Data Protection

We ensure the legal requirements together with the you! Compliance with the General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) are of primary importance in business environments.

We support you in the conception, implementation and further development of a data protection management system (DSMS) and guide you with the help of data protection audits to the comprehensive, new requirements of the GDPR!

Are you GDPR ready? Does your website and the legal statement already meet the requirements of the GDPR? Use our web service and check your site!

Interim-CSO / CISO on demand

Do you need an independent contact person with great expertise in the field of information security? We support those responsible for information security with advice and action. Upon request, we will take on the duties of Information Security Officer (ISO) for a limited period of time. These include, for example:

  • the conception and further development of the information security guidelines
  • identification and assessment of risks to ensure confidentiality, integrity and availability of information
  • compliance with supervisory requirements
  • the planning and implementation of security awareness trainings
  • monitoring and measuring information security in the company as well as target-group-oriented reporting