Blog EN

Infor­ma­ti­on secu­ri­ty risk sur­vey for 27001 and TISAX®

Due to the rapidly increasing threats to an IT operation, every company should survey and evaluate the relevant IT threats with regard to information security. However, the selection of threats for the primary InfoSec protection goals confidentiality, integrity and availability is very complex, because there are no simple threat lists, especially for small and [...]

By |2022-11-06T10:05:24+01:0008.07.2022|Blog EN, Hints, ISMS tools|

11 tips for fast ISO 27001 certification

We would like to provide valuable tips for the implementation of ISO 27001 for all companies that are aiming for certification. The ISO 27001 standard describes the requirements of an information security management system (ISMS), which also includes having a person responsible for information security. This person is often called the information security officer [...]

By |2022-11-06T09:38:55+01:0008.11.2021|Blog EN, Hints, ISMS tools|

Does the new Net­work and Infor­ma­ti­on Sys­tems Secu­ri­ty Act (NISG) affect me and does it requi­re ISO 27001 certification?

The Network and Information System Security Act - NISG (see publications) only concerns defined sectors defined in §2 of the Act: Energy, transport, banking, financial market infrastructures, healthcare, drinking water supply, digital infrastructures as operators of essential services. In addition, providers of digital services, such as online marketplaces, online search engines and cloud computing [...]

By |2022-11-06T09:51:13+01:0007.06.2019|Blog EN, ISMS tools|

Should I cer­ti­fy my com­pa­ny to ISO 27001?

ISO 27001 defines the requirements for an Information Security Management System (ISMS). This defines a continuous improvement process (CIP, see Link) which enables the company to determine the necessary security measures in a risk-oriented approach and subsequently to implement and continuously improve them. Often an ISMS is perceived as a software tool, which it [...]

By |2022-11-06T09:51:48+01:0015.02.2019|Blog EN, ISMS tools|

What use is the Trans­port Lay­er Secu­ri­ty TLS 1.3?

Encryption on the World Wide Web has a long history, which explains the abbreviations used today. It started back in 1993 with Secure Sockets Programming as a prototype. Netscape subsequently completed Secure Sockets Layer (SSL). SSL version 1 was never published. Version 2 dates back to 1995. Version 3 was published in 1996 as a [...]

By |2022-11-06T09:54:10+01:0004.04.2018|Blog EN|

Secu­re on the net with SEC4YOU: 15% dis­count on pene­tra­ti­on tests

Follow the recommendation of experts: perform an infrastructure penetration test at least once a year. When performing penetration tests, we pay attention to a structured approach. To this end, we divide our technical audits into phases according to the recommendation of the German Federal Office for Information Security (BSI): Preparation Information gathering and automatic [...]

By |2024-04-19T18:38:44+02:0005.03.2018|Blog EN|
Go to Top