Cyber Security Awareness

  • Focus on the employee and his or her security competence
  • Derive concrete measures to support further development
  • Sustainably improve cyber security in the company
  • Protect the company better against threats such as phishing

Increase the attention of employees

Cyber security is often associated with technology or processes in companies. However, due to the variety of ways in which companies work with data, information and applications, the human factor is playing an increasingly decisive role.

Cyber security awareness helps ensure that your company's business can be implemented securely. Based on our experience in security and change management, we have identified three different dimensions that need to be addressed in order to ensure a strong security awareness among all employees in the long term.

 

Cyber security awareness concept

Assess, optimize, stabilize - our three-stage approach ensures that security awareness is successfully established in all areas.

Assessment

Objective: Determination of the current situation and the baseline for cyber security awareness

  • Implementation of a first phishing campaign to assess the security awareness of the employees
  • Conducting interviews with employees and managers
  • Derivation of tailor-made measures and recommendations

Optimization

Objective: Implementation of tailor-made measures to increase cyber security awareness

  • Selection of proven security awareness measures (workshop and training, weekly storytime, gamification, learning videos, etc.)
  • Carrying out monitoring and deriving adjustments

 

Stabilization

Goal: Sustainable anchoring of cyber security awareness

  • Regularly survey security awareness score to understand dynamics (e.g. conduct monthly security awareness quizzes)
  • Offering a Security Awareness Starter Pack with tutorial videos, stories, and best practices for new hires
  • Establishment of an internal advice center for questions relating to security

 

  • Assessment
  • Optimization
  • Stabilization

What defines us

All facets at a glance

We have always combined in-depth technological know-how with our expertise in processes and business requirements. With our approach, our customers benefit from high security standards without negatively impacting the user experience.

Awarded Microsoft Partner

As a multiple award-winning Microsoft Partner, including in the area of security, and with over 100 certified employees, we ensure that solutions such as Microsoft Azure AD or Microsoft 365 offer our customers the best possible protection.

Proven experts

Our own consultants are certified in many security areas - whether as ISO 27001 Lead Implementer (PECB), in Microsoft security topics or as data protectionist. We have everyone on board who can meet your different requirements.

Our Cyber Security services

Zero Trust Architecture

We offer Zero Trust Envisioning Workshops to create an understanding. We take over the development of an individual Zero Trust strategy and implement this Zero Trust strategy and roadmap together with the client.

Information security

We advise on general questions in the area of information security as well as on the special requirements of information security in the cloud. The initiation, planning, implementation and documentation of the information security management system is carried out in accordance with ISO 27001.

Data Protection & Compliance

Whether in the cloud or specific Microsoft environment: we identify areas of action, derive measures, ensure compliance (DSGVO, works council) and support the creation of necessary documentation.

Identity & Access Management with Microsoft 365

Whether Zero Trust, Single Sign On or Governance processes - we design, implement and optimize solutions based on state-of-the-art Microsoft technologies such as Azure AD.

Threat Protection with Microsoft 365

We design and implement threat protection strategies. The technological basis is formed by Microsoft 365 technologies such as Microsoft Defender for Endpoint, Defender for Office, Defender for Identity and Microsoft Defender for Cloud.

Let us talk about your project

Your personal contacts

Ruth Subjetzki

Project inquiries & Account management

* Mandatory fields