Deutsch (DE-CH-AT)English (United Kingdom)
  • How can attacks be avoided?

    ✓ Ensure essential controls are met
    ✓ Find, track, and assess data
    ✓ Monitor event logs

  • What do attacks have in


    75% were not discovered
    83% were not highly difficult
    87% were avoidable

  • How do breaches occur?


    62% system error
    59% hacking and intrusions
    31% incorporated malicious code
    22% exploited a vulnerability
    15% physical threats

  • Who is behind data breaches?


    73% resulted from external sources
    18% were caused by insiders
    39% implicated business partners




Home Quick IT Basic Check
IT Basic Check

The exchanging of information between companies is continually increasing, and the information being exchanged is becoming more increasingly sensitive. While it was mere addresses in the past, today entire financial transactions are being executed across the Internet.

But how do you know whether you can trust your partner?

Does he have his infrastructure under control and is he prepared to continually invest in his security? The Federal Office for Security in Information Technology (shortened to BSI in German) has developed the IT Baseline Protection Certificate based on the IT Baseline Protection Handbook. This certificate must be reviewed at set intervals by an independent testing agency, so that you can be sure that your partner fulfils the basic requirements.

And how about you?

During a one-day check we shall inspect the construction of your infrastructure and compare these with the requirements of the IT Baseline Protection requirements. You will receive the results and suggestions as to how you can fulfil the requirements of the handbook.


  • Recording the current infrastructure available
  • Network / Server / computer room/ access controls
  • Internet access
  • Security lines
  • Analysis of the results and illustration of possible defects
  • wo-hour results workshop on your premises

Quick Links

A one day security check for your infrastructure.

IP Vulnerability Scan

Attacks on your external systems to determine potential risks.