Would you like a non-binding consultation?+41 41 781 57 72
The IT Security Officer or Data Protection Officer (DPO) on a temporary basis (Mandate) is responsible for the planning, introduction, coordination and control of all information security and data protection measures and advises the management on all issues relating to information security and data protection. We take on this task for you as part of an external mandate. You benefit from our experience and comprehensive know-how at management, organizational, legal and technical level.
You work in an important function and your technical IT environment is becoming increasingly complex. At the same time, you should make important decisions faster and more frequently. The IT language is becoming increasingly incomprehensible and bristles with incomprehensible terms. Risks are often underestimated because the complexity of the matter cannot be understood. You are aware of your responsibility and liability and would now like competent professional support for a short time.
With our independent cyber security analysis, you get an objective picture of your IT security. You will find out whether your IT infrastructure is really secure. The result of the cyber security assessment is clear and shows you unambiguously what action is needed and what you should do about it. Information security is therefore more than just securing data (e.g. backup). It also includes securing longer-term business activities and protecting the knowledge of employees in the company. Information security is therefore a strategic/organizational issue, not a purely technical one.
Cyberattacks usually start with an attachment in a phishing email. Incorrect, careless or negligent handling of confidential information by employees is one of the greatest risk factors for companies. Therefore, a fundamental sensitization of all employees to a security-conscious and responsible way of thinking and acting in the company's activities is indicated.
Establish an open approach to risks in your company. Catastrophes do not occur more frequently today than in the past. However, the damage is more expensive and the consequences are more far-reaching! Our IT risk management is based on the systematic identification and minimization of risks. Only a functioning risk management enables the consistent use of appropriate - i.e. also economically justifiable - measures.