Stark und Sicher: Wie ein Security Operations Center gegen Cyberbedrohungen schützt – 6 wichtigste Punkte
In einer zunehmend digitalen Welt sind Cyberbedrohungen eine der grössten Herausforderungen für Unternehmen. Ob kleine...
The Leuchter IT Cyber Security Audit helps to assess and optimize an organization's IT security posture and reduce risks, regardless of whether it is an on-premises, hybrid or pure cloud environment. The audit is based on a collection of best practices and recommendations that can be implemented in an IT infrastructure to ensure optimal security.
More and more companies are falling victim to cyber attacks. Many do not know what the status of their IT security is and which investments are sensible or necessary. This leaves them unprotected against attackers.
With the help of the audit, companies receive an ACTUAL analysis of their IT security and important vulnerabilities are uncovered.
The identified vulnerabilities and recommendations from the Leuchter IT Cyber Security Audit can be settled independently with the help of the existing IT partner. The components can be planned, prioritized and implemented independently by the customer. We strongly recommend repeating the process annually to ensure an optimally protected network. By repeating the process annually, the Leuchter IT Cyber Security Audit thus fulfills all processes of the Deming Circle (also PDCA cycle: Plan, Do, Check, Act).
The Leuchter IT Cyber Security Audit is a collection of over 280 checkpoints distributed over 30 modules. The checkpoints are evaluated according to their characteristics: cost, impact user or administrator, maturity level component, complexity, recurring, dependencies, relevance.
In order to be able to show an initial overview of cyber security as quickly and straightforwardly as possible, we conduct the audit in two phases. The first phase already identifies potential weaknesses and opportunities for improvement.
Only after the Basic Phase has been completed, the scope of the next phase, the Advanced, can be estimated. An implementation is optional and can also be scheduled for a later date.
With the help of the results of automated scans, targeted manual checks and questions, vulnerabilities and misconfigurations are uncovered and presented in the Leuchter IT Cyber Security Audit.
The customer receives an evaluation of the analysis with recommendations, including a dashboard. Based on the evaluation, the customer can implement the recommendations independently or with the help of a partner in their own company in order to increase IT security.
Carefully selected test points, which specifically reveal current, known and less known weaknesses
Standardized, pragmatic and goal-oriented approach, which can be adapted as needed
Partially automated scanning process
Adapted and realistic recommendations for improving cyber security
Many years of experience in the field of cyber security
Permanent further development and adaptation to new findings
The first step is to clarify the implementation with the customer in a discussion. The customer should provide a contact person for before, during, and after the audit. In the first meeting, the scope of the Leuchter IT Cyber Security Audit is defined and where the focus should be set.
In the initial meeting, the contact person already provides a first rough overview of the IT environment and how it is structured. This is followed by a definition of the period in which the audit is to be carried out.
In the second step, the Leuchter technician checks the servers or clients provided. The test objects are scanned using the Azure Automation Desired State Configuration software. The current state of the infrastructure is checked and the configuration is added to the Leuchter IT Cyber Security Audit. Leuchter IT Solutions AG requires the test objects provided for this purpose.
After the analysis directly on the system, further security components are discussed with the person responsible for IT security in the company. In particular, the components that could not be detected by means of automation are discussed. In addition, the implementation status of some components is checked.
In the final step, the Leuchter IT Cyber Security Audit is evaluated and handed over to the customer. In the process, the Leuchter employee develops solution proposals for the deficiencies found. The test objects can be released again and Leuchter no longer needs access to them.
During the handover, the catalog of measures including the results and recommendations is discussed with the customer (online or on site). After handover of the document, the customer has the option of implementing further components independently or with the help of Leuchter IT Solutions AG.
Random samples of Windows endpoints are used to verify that they meet the minimum requirements. These include, among others:
Get in touch with us. Together we will find the perfect offer for your company.
A team of various professionals will take care of your inquiries concerning the topics IT infrastructure, organisation, communication and co-operation in the modern business world. Please consign your questions and messages to our team. A proven expert in these topics will contact you.
We look forward to your inquiry!
Team IT-Infrastruktur
Telefon: 041 226 50 80
E-Mail: kontakt@leuchterag.ch
In einer zunehmend digitalen Welt sind Cyberbedrohungen eine der grössten Herausforderungen für Unternehmen. Ob kleine...
In einer zunehmend vernetzten und digitalen Geschäftswelt ist Vertrauen eine wertvolle Währung. Besonders wenn es um...
Wir sind stolz darauf, bekannt zu geben, dass wir erfolgreich die ISO 27001 Rezertifizierung bestanden haben, und zwar...
In der heutigen vernetzten Welt sind Telefonanrufe nach wie vor ein beliebtes Werkzeug für Social Engineering-Angriffe....
Fortinet hat am 8. Februar 2024 mehrere Schwachstellen in FortiOS bekannt gemacht:
Am 5. Februar 2024 haben wir unsere Kunden, die AnyDesk in ihrem Unternehmen einsetzten, über einen Sicherheitsvorfall...
Viele Nutzer sind der Meinung, dass ihre Passwörter sicher sind oder dass sie diese vernachlässigen können, weil die...
In der Ära der Digitalisierung ist der Schutz von Informationen und persönlichen Daten von höchster Bedeutung. Die...
Dieser Beitrag wurde von Yvo Schwery für secnovum verfasst. Yvo Schwery ist seit 2019 in der OCOM AG in Brig-Glis...