Feel free to contact us via mobile or via e-mail.

contactinfo@currentSecurity.chemail0041 79 322 18 80

Thank you for your message and we will get back to you as soon as possible.

Close

Oh no, something went wrong. Please contact us directly by email or Phone.

Close

Write us a message with the contact form.

DE
 
Contact

umwasesgeht

Outsourcing

There a lot of products which promise that by just using the product everything is solved. If it would be that easy then security would not be that big of a topic. Some of the products have some good uses cases, they are not enough. An attacker only needs to find one weak point.

Your product will not be secure, but it should be secure enough!

Therefore security must be part of your business: It needs internal know-how. It is an illusion to produce an unhackable or secure device. It will always be an assessment and decision of security, investment and usability. The following questions need to be answered, a tool will not help beforehand:

Which are our important and precious assets?

Who are potentially and realistically attackers?

How much money would we loose if xy would happen? What would we do?

How much trouble are we we willing to bear?

How much effort are we ready to invest to secure an asset?

How do we react to incidents known to our customer?

What is our strategy if an incident happens? (You need to react fast)

How do we detect and document incidents?

Which know-how do we have internally and which one do we need from outside?

How to tackle the security topic?

Unfortunately we can read at the moment of different incidents where businesses underestimate security.
But how to tackle this topic? At the end it will be important that most of the know-how stays internal, because otherwise there is a high risk that on the next project or even only updating the current one everything starts from scratch. We would like to collaborate with your staff to develop actions and we help to set them in place. After a risk and threat analysis external tools can really help, e.g. to secure a connection or to detect intrusion (IDS) or to secure the licenses or to train your people or....
We help you go the next step.