IT security
ITQ Ransomware Check
Beim ITQ Ransomware Check wird durch unterschiedliche Auditmethoden der aktuelle Stand des Sicherheitsniveaus Ihres Unternehmens bzgl. Ransomeware-Angriffe ermittelt. Maßstab für die Bestimmung dieses Sicherheitsniveaus ist ein Anforderungskatalog, der vom ITQ (Institut für Technologiequalität) speziell für kleine und mittlere Unternehmen entwickelt wurde.
Ransomware – what's that?
Ransomware is malware that specializes in encrypting files to make them unusable. Not only local systems are infected, but the virus spreads wherever files can be found, sometimes even specifically on backups! After encoding, the victim is asked to pay high ransom to get the key to the files. After encrypting the file the victim is asked to pay high ransoms to get the key to the files. However, whether the victim receives the key afterwards is left to the arbitrariness of the attacker.
Send us a nonbinding request!
Contact us now
Prevention and response
Your advantages at a glance
The German Federal Office for Information Security (BSI) has described protective measures in a working paper to significantly reduce the risk of being infected with ransomware. The implementation of these measures is checked by us in an audit and you receive a final report with the result and implementation aids. The procedure offers you the following advantages:
Die Umsetzung dieser Maßnahmen werden von uns in einer Prüfung kontrolliert und Sie erhalten einen Abschlussbericht mit dem Ergebnis und Umsetzungshilfen.
Das Vorgehen bietet Ihnen folgende Vorteile:
+ Cost-effective testing of your own protective measures against this enormous threat
+ Reduction of liability through proof of compliance with one's own due diligence obligations
+ Discover unrecognized risks
+ Guidance for security measures to improve protection
+ Measurable result at the end of the test
+ Planned use of the IT budget based on the risk assessment
+ Objective testing by using the recommendations of the BSI
What we offer
Our services
IT-Security is not a one-time thing, it requires continuity.
Information Security Management
Why with us?
Trained technicians, computer scientists and data protection officers
High range of know how in many industries
(healthcare, energy, production, automotive, public administration)
Information Security Officer – TÜV-Certificated
Synergy effects through consulting of several companies
Your link to our