Subscribe to my free newsletter to receive the free PDF!
[et_pb_section fb_built=”1″ admin_label=”Header” _builder_version=”4.24.3″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#ff4747 0%|#820000 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-01.png” positioning=”none” custom_padding=”10vw||” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.23.1″ positioning=”none” z_index=”1″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_text _builder_version=”4.23.1″ text_font=”||||||||” header_font=”|700|||||||” header_font_size=”84px” background_layout=”dark” header_font_size_tablet=”54px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Bereit für Ihre Cyber-Versicherung?
[/et_pb_text][et_pb_text _builder_version=”4.27.4″ text_font=”|300|||||||” text_font_size=”17px” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Beantworten Sie fünf Fragen zur IT-Security in Ihrem Unternehmen und erfahren Sie, ob Sie die Kriterien für eine Cyber-Versicherung erfüllen!
[/et_pb_text][et_pb_button button_url=”https://itsecurity-ist-pflicht.de/#check” button_text=”Hier klicken und testen!” _builder_version=”4.27.4″ z_index=”500″ custom_margin=”||54px|||” custom_padding=”20px|30px|20px|30px|true|true” button_text_color_last_edited=”off|desktop” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(49,90,178,0.7)” saved_tabs=”all” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” button_bg_enable_color__hover=”on” button_text_color__hover_enabled=”on|desktop” button_text_color__hover=”#FF4747″ theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_image src=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-13-3-1.png” align=”right” _builder_version=”4.23.1″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”-10vw|-10vw|4vw||false|false” custom_margin_tablet=”-2vw|0vw|-24vw|” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” border_radii=”off|||100em|” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Features” _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row column_structure=”1_3,1_3,1_3″ custom_padding_last_edited=”on|desktop” _builder_version=”4.23.1″ z_index=”2″ max_width=”none” custom_margin=”-5vw||-5vw||true|false” custom_margin_tablet=”0vw||0vw||true” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” custom_padding=”|||20%” custom_padding_tablet=”|||0%” custom_padding_phone=”” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”1_3″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Schritt 1: Analyse” image=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-icon-2-1.png” _builder_version=”4.23.1″ header_level=”h2″ header_font=”|300|||||||” header_line_height=”1.4em” body_font=”|300|||||||” body_link_font=”|700|||||||” text_orientation=”center” global_colors_info=”{}” theme_builder_area=”post_content”]
Nutzen Sie unseren unverbindlichen Cyber-Versicherungs-Check und erfahren Sie sofort welche Maßnahmen Sie noch von einer Cyber-Versicherung noch trennen.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-94px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Schritt 2: Workshop” image=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-icon-18-1.png” _builder_version=”4.23.1″ header_level=”h2″ header_font=”|300|||||||” header_line_height=”1.4em” body_font=”|300|||||||” body_link_font=”|700|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Abhängig von Ergebnis Ihres Cyber-Versicherungs-Checks konzipieren wir einen Workshop, in welchem alle notwendigen Maßnahmen für eine Cyber-Versicherung erarbeitet werden.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ transform_scale_tablet=”” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”0px|-188px” transform_translate_tablet=”0px|0px” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_tablet=”” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” transform_styles_tablet=”” transform_styles_phone=”” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Schritt 3: Implementierung” image=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-icon-7-1.png” _builder_version=”4.23.1″ header_level=”h2″ header_font=”|300|||||||” header_line_height=”1.4em” body_font=”|300|||||||” body_link_font=”|700|||||||” text_orientation=”center” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Wir begleiten Ihren Weg zum ISO/IEC 27001 Cyber-Sicherheits-Konzept als externe IT-Sicherheitsbeauftragte und implementieren Ihr “Information Security Management System” (ISMS).
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ prev_background_color=”#ffffff” admin_label=”Feature” _builder_version=”4.23.1″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_stops=”#ff4747 0%|#820000 99%” background_color_gradient_start=”#004183″ background_color_gradient_end=”#001f4c” background_image=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-02.png” background_size=”contain” background_position=”bottom_center” custom_margin=”-8vh||||false|false” custom_padding=”||0px|||” top_divider_style=”slant” top_divider_height=”20vw” top_divider_flip=”horizontal” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.23.1″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”1_2″ _builder_version=”4.23.1″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_image src=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-14-1-1.jpg” _builder_version=”4.23.1″ transform_scale=”250%|250%” transform_scale_tablet=”100%|100%” transform_scale_phone=”” transform_scale_last_edited=”on|desktop” transform_translate=”-6vw|4vw” transform_translate_tablet=”0vw|0vw” transform_translate_phone=”” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate=”0deg|0deg|57deg” transform_rotate_tablet=”0deg|0deg|27deg” transform_rotate_phone=”” transform_rotate_last_edited=”on|desktop” transform_skew_tablet=”” transform_skew_phone=”” transform_skew_last_edited=”on|desktop” transform_origin_tablet=”” transform_origin_phone=”” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” custom_margin=”-8vh||||false|false” transform_styles_tablet=”” transform_styles_phone=”” border_radii=”on|500px|500px|500px|500px” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.23.1″ custom_padding=”13vw||||false|false” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_text _builder_version=”4.23.1″ text_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”|700||||on|||” header_3_text_color=”#00BCF0″ header_3_font_size=”1.5em” header_3_letter_spacing=”6px” header_3_line_height=”1.2em” background_layout=”dark” custom_padding=”|||||” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Voraussetzung
Wie wir Cyber-Versicherungen ermöglichen!
[/et_pb_text][et_pb_divider color=”#00BCF0″ divider_weight=”2px” _builder_version=”4.23.1″ width=”100px” custom_margin=”||0px” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_divider][et_pb_text _builder_version=”4.23.1″ text_font=”Overpass|300|||||||” text_font_size=”17px” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Mit 40 Jahren praktischer Erfahrung in der Gestaltung sicherer IT-Infrastrukturen ermitteln wir langfristig wirksame Cyber-Sicherheitskonzepte, die Ihnen den Abschluss eines Cyber-Versicherung ermöglichen. Wir implementieren ein “Information Security Management System” (ISMS) nach ISO/IEC 27001 auf Basis der BSI IT-Grundschutz Vorgaben und begleiten Sie als externe IT-Sicherheitsbeauftragte.
Beginnen Sie mit Ihrem unverbindlichen Cyber-Versicherungs-Check und ermitteln Sie wo Ihr Unternehmen aktuell steht!
[/et_pb_text][et_pb_button button_url=”https://itsecurity-ist-pflicht.de/#check” button_text=”Hier klicken und testen!” _builder_version=”4.27.4″ z_index=”500″ custom_margin=”||54px|||” custom_padding=”20px|30px|20px|30px|true|true” button_text_color_last_edited=”off|desktop” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(49,90,178,0.7)” saved_tabs=”all” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” button_bg_enable_color__hover=”on” button_text_color__hover_enabled=”on|desktop” button_text_color__hover=”#FF4747″ theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”2_5″ _builder_version=”4.16″ custom_padding=”380px||” custom_padding_tablet=”0px||” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_text _builder_version=”4.23.1″ text_font=”|300|||||||” header_3_font=”|700|||||||” header_3_font_size=”1.5em” header_4_font=”|900|||||||” header_4_line_height=”1.4em” background_layout_tablet=”dark” background_layout_phone=”” background_layout_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Bereit für Ihre Cyber-Versicherung?
Beantworten Sie drei Fragen zur IT-Security in Ihrem Unternehmen und erfahren Sie, ob Sie die Kriterien für eine Cyber-Versicherung erfüllen!
[/et_pb_text][et_pb_button button_url=”https://itsecurity-ist-pflicht.de/#check” button_text=”Hier klicken und testen!” _builder_version=”4.27.4″ z_index=”500″ custom_margin=”||54px|||” custom_padding=”20px|30px|20px|30px|true|true” button_text_color_last_edited=”off|desktop” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(49,90,178,0.7)” saved_tabs=”all” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” button_bg_enable_color__hover=”on” button_text_color__hover_enabled=”on|desktop” button_text_color__hover=”#FF4747″ theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_image src=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-14-1.png” _builder_version=”4.16″ animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Feature” _builder_version=”4.23.1″ use_background_color_gradient=”on” background_color_gradient_type=”circular” background_color_gradient_direction_radial=”top right” background_color_gradient_stops=”#ff4747 1%|#820000 100%” background_color_gradient_start=”#00ffd8″ background_color_gradient_end=”#0029e2″ background_image=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-03-1-1.png” background_position=”bottom_center” custom_margin=”100px||5vh||false|false” custom_padding=”10vw||10vw||true|” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ z_index=”1″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”2_5″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_text _builder_version=”4.23.1″ text_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”|700||||on|||” header_3_text_color=”#00BCF0″ header_3_font_size=”1.5em” header_3_letter_spacing=”6px” header_3_line_height=”1.2em” background_layout=”dark” custom_padding=”|||||” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”off|desktop” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Vorgehen
Wie wir Cyber-Sicherheit umsetzen!
[/et_pb_text][et_pb_text _builder_version=”4.23.1″ text_font=”Overpass|300|||||||” text_font_size=”17px” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Cyber-Sicherheit gelingt nur, wenn alle am selben Strang ziehen. Wir binden alle notwendigen Verantwortlichen von Anfang an in die Analyse- und Planungsprozesse ein. Dabei koordinieren und moderieren wir die Beteiligten und begleiten Sie als externe IT-Sicherheitsbeauftragte zu Ihrer ISO/IEC 27001 zertifizierten Cyber-Versicherung.
[/et_pb_text][et_pb_button button_url=”https://itsecurity-ist-pflicht.de/#check” button_text=”Hier klicken und testen!” _builder_version=”4.27.4″ z_index=”500″ custom_margin=”||54px|||” custom_padding=”20px|30px|20px|30px|true|true” button_text_color_last_edited=”off|desktop” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(49,90,178,0.7)” saved_tabs=”all” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” button_bg_enable_color__hover=”on” button_text_color__hover_enabled=”on|desktop” button_text_color__hover=”#FF4747″ theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_blurb title=”Workshops für Cyber-Sicherheit” image=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-illustrated-icons-08-1.png” icon_placement=”left” image_icon_width=”120px” image_icon_width_tablet=”120px” image_icon_width_phone=”50px” image_icon_width_last_edited=”on|phone” _builder_version=”4.23.1″ header_level=”h3″ header_font=”|700||||on|||” header_font_size=”1.5em” header_line_height=”1.4em” body_font=”|300|||||||” background_color=”#ffffff” text_orientation=”center” custom_padding=”24px|20px|24px|20px|true|true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” image_max_width=”120px” image_max_width_tablet=”” image_max_width_phone=”50px” image_max_width_last_edited=”on|phone” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
In einem dedizierten Cyber-Sicherheits-Workshop erfassen wir alle relevanten Prozesse und ermitteln Ihr aktuelles Cyber-Sicherheits-Risiko. Gemeinsam mit Geschäftsführung, Qualitäts-Managment und IT-Management (externen IT-Dienstleister), wird hierbei ein Cyber-Sicherheits-Konzept gem. ISO/IEC 27001 erarbeitet.
[/et_pb_blurb][et_pb_blurb title=”Implementierung von Cyber-Sicherheit” image=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-illustrated-icons-06-1.png” icon_placement=”left” image_icon_width=”120px” image_icon_width_tablet=”120px” image_icon_width_phone=”50px” image_icon_width_last_edited=”on|phone” _builder_version=”4.23.1″ header_level=”h3″ header_font=”|700||||on|||” header_font_size=”1.5em” header_line_height=”1.4em” body_font=”|300|||||||” background_color=”#ffffff” text_orientation=”center” custom_padding=”24px|20px|24px|20px|true|true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” image_max_width=”120px” image_max_width_tablet=”” image_max_width_phone=”50px” image_max_width_last_edited=”on|phone” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Gemeinsam mit allen beteiligten Abteilungen und Dienstleistern überführen wir Ihr Cyber-Sicherheits-Konzept in die Praxis und etablieren dadurch Ihr “Information Security Management System” (ISMS) im gesamten Unternehmen.
[/et_pb_blurb][et_pb_blurb title=”Externe IT-Sicherheitsbeauftragte” image=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-illustrated-icons-03-1.png” icon_placement=”left” image_icon_width=”120px” image_icon_width_tablet=”120px” image_icon_width_phone=”50px” image_icon_width_last_edited=”on|phone” _builder_version=”4.23.1″ header_level=”h3″ header_font=”|700||||on|||” header_font_size=”1.5em” header_line_height=”1.4em” body_font=”|300|||||||” background_color=”#ffffff” text_orientation=”center” custom_padding=”24px|20px|24px|20px|true|true” border_radii=”on|10px|10px|10px|10px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”60px” box_shadow_color=”rgba(10,45,97,0.1)” image_max_width=”120px” image_max_width_tablet=”” image_max_width_phone=”50px” image_max_width_last_edited=”on|phone” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Wir koordinieren und begleiten Ihren Weg zur ISO/IEC 27001 Cyber-Versicherung. Wir initiieren, implementieren und pflegen Ihr “Information Security Management System” (ISMS) als externe IT-Sicherheitsbeauftragte.
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ module_id=”check” _builder_version=”4.27.4″ _module_preset=”default” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.27.4″ _module_preset=”default” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”1_2″ _builder_version=”4.27.4″ _module_preset=”default” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_text _builder_version=”4.23.1″ text_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”56px” header_2_line_height=”1.1em” header_3_font=”|700||||on|||” header_3_text_color=”#00BCF0″ header_3_font_size=”1.5em” header_3_letter_spacing=”6px” header_3_line_height=”1.2em” custom_padding=”|||||” header_2_font_size_tablet=”38px” header_2_font_size_phone=”26px” header_2_font_size_last_edited=”on|desktop” header_3_font_phone=”Overpass|700|||||||” header_3_font_last_edited=”off|desktop” header_3_font_size_tablet=”24px” header_3_font_size_phone=”18px” header_3_font_size_last_edited=”off|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Testen
Bereit für Ihre Cyber-Versicherung?
[/et_pb_text][et_pb_code _builder_version=”4.27.0″ _module_preset=”default” hover_enabled=”0″ global_colors_info=”{}” theme_builder_area=”post_content” sticky_enabled=”0″]
Verständnis
Wie wir Cyber-Sicherheit garantieren!
[/et_pb_text][et_pb_divider color=”#00b4ff” divider_weight=”2px” _builder_version=”4.16″ width=”100px” custom_margin=”||0px” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_divider][et_pb_text _builder_version=”4.23.1″ text_font=”Overpass|300|||||||” text_font_size=”17px” background_layout=”dark” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|desktop” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Zuverlässige Cyber-Sicherheit kann nur durch ein gemeinsames Verständnis über alle Abteilungen und Mitarbeitenden hinaus gewährt werden. Trotzdem ist es nicht möglich, sich vor jeder Bedrohung zu schützen. Den Ernstfall zu planen und ihm mit geprüften Strategien zu begegnen, ist die einzig effiziente Lösung. Die Sensibilisierung aller Personen im Unternehmen unabhänig von ihrer Position, ist daher einer der kritischen Faktoren in jedem Cyber-Sicherheits-Konzept.
Wir wollen Ihnen dabei helfen, die aktuellem Sicherheitslücken zu schließen, nachdem wir sie gemeinsam aufgedeckt haben!
[/et_pb_text][et_pb_button button_url=”https://itsecurity-ist-pflicht.de/#check” button_text=”Hier klicken und testen!” _builder_version=”4.27.4″ z_index=”500″ custom_margin=”||54px|||” custom_padding=”20px|30px|20px|30px|true|true” button_text_color_last_edited=”off|desktop” box_shadow_style=”preset3″ box_shadow_vertical=”20px” box_shadow_blur=”40px” box_shadow_spread=”-10px” box_shadow_color=”rgba(49,90,178,0.7)” saved_tabs=”all” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”20px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” button_bg_enable_color__hover=”on” button_text_color__hover_enabled=”on|desktop” button_text_color__hover=”#FF4747″ theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_image src=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-10.png” _builder_version=”4.16″ custom_margin=”-20vw|-9vw||||” custom_margin_tablet=”0vw|0vw||” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_image][et_pb_text disabled_on=”on|on|on” _builder_version=”4.16″ text_font=”Overpass|300|||||||” header_4_font=”Overpass|900|||||||” header_4_line_height=”1.4em” background_layout=”dark” max_width=”400px” disabled=”on” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Mauris blandit aliquet
Elit, eget tincidunt nibh pulvinar a. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Donec velit neque
[/et_pb_text][et_pb_button button_text=”Learn More” disabled_on=”on|on|on” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|18px|8px|18px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” disabled=”on” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][et_pb_text disabled_on=”on|on|on” _builder_version=”4.16″ text_font=”Overpass|300|||||||” header_4_font=”Overpass|900|||||||” header_4_line_height=”1.4em” background_layout=”dark” max_width=”400px” disabled=”on” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”]
Mauris blandit aliquet
Elit, eget tincidunt nibh pulvinar a. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Donec velit neque
[/et_pb_text][et_pb_button button_text=”Learn More” disabled_on=”on|on|on” _builder_version=”4.16″ custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_use_color_gradient=”on” button_bg_color_gradient_type=”circular” button_bg_color_gradient_direction=”140deg” button_bg_color_gradient_direction_radial=”top right” button_bg_color_gradient_stops=”#003070 0%|#001f4c 100%” button_bg_color_gradient_start=”#003070″ button_bg_color_gradient_end=”#001f4c” button_border_width=”0px” button_border_radius=”100px” button_font=”Overpass|900||on|||||” button_use_icon=”off” custom_padding=”8px|18px|8px|18px|true|true” hover_enabled=”1″ box_shadow_style=”preset3″ box_shadow_vertical=”0px” box_shadow_blur=”0px” box_shadow_spread=”-10px” box_shadow_color=”rgba(25,114,255,0.4)” disabled=”on” locked=”off” global_colors_info=”{}” box_shadow_color__hover=”#2585b2″ box_shadow_blur__hover_enabled=”on” box_shadow_blur__hover=”40px” box_shadow_vertical__hover_enabled=”on” box_shadow_vertical__hover=”10px” theme_builder_area=”post_content”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Section” _builder_version=”4.23.1″ background_color=”RGBA(255,255,255,0)” z_index=”0″ custom_margin=”||||false|false” custom_padding=”||||false|false” bottom_divider_style=”slant” bottom_divider_color=”rgba(255,71,71,0.1)” bottom_divider_height=”40vw” bottom_divider_flip=”horizontal” global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}” theme_builder_area=”post_content”][et_pb_image src=”https://wp-base.ir/wp-content/uploads/2024/12/cyber-security-07-2.png” _builder_version=”4.23.1″ z_index=”-1″ max_width=”700px” custom_margin=”-40vh||||false|false” custom_margin_tablet=”-45vw|||” custom_margin_phone=”-50vw|||” custom_margin_last_edited=”on|tablet” custom_padding=”||0px|||” animation_style=”zoom” animation_intensity_zoom=”5%” locked=”off” global_colors_info=”{}” theme_builder_area=”post_content”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section]