What is the process of an IT-Risk Analysis?
Together with you, we will not only determine how worthy of protection your systems, company data, etc. are, but also define which threats (e.g. fire, water, theft, ransomware) are relevant for you. In doing so, we address the most important information security objectives (confidentiality protection, integrity protection, availability protection). In our approach, we are guid-ed by common standards, e.g. ISO 27005. We are happy to support you in implementing the measures identified.