Technical/applicable information security is about the three protection goals: the confidentiality, integrity and availability of data. It tests for technical and organizational measures to protect systems from cyberattacks and other threats. These include, for example, access controls, cryptography, access management, firewalls, proxies, current Versions, Operations Security (OPSec) and several others. All tests are performed manually in a multi-tool process to provide the best possible identification of vulnerabilities.
Legal security is mostly threatened by consequences of non-compliance with legal requirements. The federal government continuously adapts the Data Protection Act and Information Security Act to the growing threats in information security. It is the company or its management who is responsible for complying with the legal requirements and who bears the full risk in the event of a loss. The necessary protection is provided by a complete and up-to-date data protection policy and, if necessary, cyber protection insurance. In our Security Check, we check your privacy policy for compatibility with the applicable data protection law.
Comprehensive, strategic and technical measures are taken into account in IT risk management. These are implemented with documentation and objectives. Particular attention is paid to ensuring that important business processes and corporate assets are protected.
In an emergency, rapid action is required. With appropriate risk management, you gain valuable time and can counteract damage to your reputation at an early stage. As part of our security check, we use a threat analysis to systematically record, structure and evaluate the various threats to your IT systems and IT processes.
To cover IT security as comprehensively as possible, the
Data Pie® Security Check examines the following three areas: