Aus NetMotion wird Absolute Secure Access
VPN Lösung von Absolute
The Leuchter IT Cyber Security Audit helps to assess and optimize an organization's IT security posture and reduce risks, regardless of whether it is an on-premises, hybrid or pure cloud environment. The audit is based on a collection of best practices and recommendations that can be implemented in an IT infrastructure to ensure optimal security.
More and more companies are falling victim to cyber attacks. Many do not know what the status of their IT security is and which investments are sensible or necessary. This leaves them unprotected against attackers.
With the help of the audit, companies receive an ACTUAL analysis of their IT security and important vulnerabilities are uncovered.
The identified vulnerabilities and recommendations from the Leuchter IT cyber security audit can be cleaned up independently with the help of the existing IT partner. The components can be planned, prioritized and implemented independently by the customer. We strongly recommend repeating the process annually to ensure an optimally protected network. By repeating the process annually, the Leuchter IT Cyber Security Audit thus fulfills all processes of the Deming Circle (also PDCA cycle: Plan, Do, Check, Act).
The Leuchter IT Cyber Security Audit is a collection of over 280 checkpoints distributed over 30 building blocks. The checkpoints are evaluated according to their characteristics: cost, impact user or administrator, maturity level component, complexity, recurring, dependencies, relevance.
In order to be able to show an initial overview of cyber security as quickly and straightforwardly as possible, we conduct the audit in two phases. The first phase already identifies potential weaknesses and opportunities for improvement.
Only after the Basic Phase has been completed can the scope of the next phase, the Advanced, be estimated. An implementation is optional and can also be scheduled for a later date.
With the help of the results of automated scans, targeted manual checks and questions, vulnerabilities and misconfigurations are uncovered and presented in the Leuchter IT Cyber Security Audit.
The customer receives an evaluation of the analysis with recommendations, including a dashboard. Based on the evaluation, the customer can implement the recommendations independently or with the help of a partner in their own company in order to increase IT security.
Carefully selected test points, which specifically reveal current, known and less known weaknesses
Standardized, pragmatic and goal-oriented approach, which can be adapted as needed
Partially automated scanning process
Adapted and realistic recommendations for improving cyber security
Many years of experience in the field of cyber security
Permanent further development and adaptation to new findings
The first step is to clarify the implementation with the customer in a discussion. The customer should provide a contact person for before, during, and after the audit. In the first meeting, the scope of the Leuchter IT cyber security audit is defined and where the focus should be set.
In the initial meeting, the contact person already provides a first rough overview of the IT environment and how it is structured. This is followed by a definition of the period in which the audit is to be carried out.
In the second step, the Leuchter technician checks the servers or clients provided. The test objects are scanned using the Azure Automation Desired State Configuration software. The current state of the infrastructure is checked and the configuration is added to the Leuchter IT cyber security audit. Leuchter IT Solutions AG requires the test objects provided for this purpose.
After the analysis directly on the system, further security components are discussed with the person responsible for IT security in the company. In particular, the components that could not be detected by means of automation are discussed. In addition, the implementation status of some components is checked.
In the final step, the Leuchter IT cyber security audit is evaluated and handed over to the customer. In the process, the Leuchter employee develops solution proposals for the deficiencies found. The test objects can be released again and Leuchter no longer needs access to them.
During the handover, the catalog of measures including the results and recommendations is discussed with the customer (online or on site). After handover of the document, the customer has the option of implementing further components independently or with the help of Leuchter IT Solutions AG.
Random samples of Windows endpoints are used to verify that they meet the minimum requirements. These include, among others:
Get in touch with us. Together we will find the perfect offer for your company.
A team of various professionals will take care of your inquiries concerning the topics IT infrastructure, organisation, communication and co-operation in the modern business world. Please consign your questions and messages to our team. A proven expert in these topics will contact you.
We look forward to your inquiry!
Telefon: 041 226 50 80
VPN Lösung von Absolute
Ständig hört man in der Presse, dass die IT-Sicherheit von Unternehmen verbessert werden muss – und scheinbar hängt...
Dieser Beitrag wurde von Jonas Stalder für secnovum verfasst. Sicherheitslücken werden heute gefunden, verkauft,...
Dieser Beitrag wurde von Maurizio Tuccillo für secnovum verfasst. presented by: HSLU Hochschule Luzern Wichtigste...
Die Anzahl an Cyberattacken auf Unternehmen nimmt weiterhin zu und schlimmer noch: Die Art der Angriffe wird immer...
Das Nationale Zentrum für Cybersicherheit (NCSC) ist das Kompetenzzentrum des Bundes für Cybersicherheit und erste...
Dieser Beitrag wurde von Roland Portmann für secnovum verfasst. Die IT-Sicherheit eines Unternehmens ist Chefsache...
presented by: Hochschule Luzern – Informatik Wichtigste Merkpunkte: Definieren Sie regelmässige Zeitfenster...
Am 3. März hat Microsoft offiziell über vier schwerwiegende Lücken in den Exchange Versionen 2013, 2016 und 2019...