Blog EN

11 tips for fast ISO 27001 certification

We would like to provide valuable tips for the implementation of ISO 27001 for all companies that are aiming for certification. The ISO 27001 standard describes the requirements of an information security management system (ISMS), which also includes having a person responsible for information security. This person is often called the information security officer [...]

By |2022-11-06T09:38:55+01:0008.11.2021|Blog EN, Hints, ISMS tools|

Does the new Net­work and Infor­ma­ti­on Sys­tems Secu­ri­ty Act (NISG) affect me and does it requi­re ISO 27001 certification?

The Network and Information System Security Act - NISG (see publications) only concerns defined sectors defined in §2 of the Act: Energy, transport, banking, financial market infrastructures, healthcare, drinking water supply, digital infrastructures as operators of essential services. In addition, providers of digital services, such as online marketplaces, online search engines and cloud computing [...]

By |2022-11-06T09:51:13+01:0007.06.2019|Blog EN, ISMS tools|

Should I cer­ti­fy my com­pa­ny to ISO 27001?

ISO 27001 defines the requirements for an Information Security Management System (ISMS). This defines a continuous improvement process (CIP, see Link) which enables the company to determine the necessary security measures in a risk-oriented approach and subsequently to implement and continuously improve them. Often an ISMS is perceived as a software tool, which it [...]

By |2022-11-06T09:51:48+01:0015.02.2019|Blog EN, ISMS tools|

What use is the Trans­port Lay­er Secu­ri­ty TLS 1.3?

Encryption on the World Wide Web has a long history, which explains the abbreviations used today. It started back in 1993 with Secure Sockets Programming as a prototype. Netscape subsequently completed Secure Sockets Layer (SSL). SSL version 1 was never published. Version 2 dates back to 1995. Version 3 was published in 1996 as a [...]

By |2022-11-06T09:54:10+01:0004.04.2018|Blog EN|

Secu­re on the net with SEC4YOU: 15% dis­count on pene­tra­ti­on tests

Follow the recommendation of experts: perform an infrastructure penetration test at least once a year. When performing penetration tests, we pay attention to a structured approach. To this end, we divide our technical audits into phases according to the recommendation of the German Federal Office for Information Security (BSI): Preparation Information gathering and automatic [...]

By |2024-04-19T18:38:44+02:0005.03.2018|Blog EN|

free data pro­tec­tion awa­re­ness trai­ning contents

More and more often we are asked how to train data protection and the requirements of the GDPR. For internal data protection officers (DPOs) or, if you don't have a DPO, for the internal data protection contact person, there are numerous training courses and courses for further training in the GDPR requirements. However, familiarization [...]

Go to Top