Hospital
Checking the external attack channels of using security scan on the servers accessible via the Internet, firewall ruleset audit and advanced mail test
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Checking the external attack channels of using security scan on the servers accessible via the Internet, firewall ruleset audit and advanced mail test
Consulting on how to perform awareness trainings and phishing campaigns
Development and adaptation of guidelines and processes in connection with the European General Data Protection Regulation (GDPR)
ISO 27002 security post-audit focusing on access control, mobile devices, encryption procedures, change, release and incident processes, firewall management
Combined mobile application penetration test and source code review of mobile e-banking applications (iOS and Android)
Comprehensive security audit of a protected environment by means of physical social engineering, spear phishing, security scans & penetration tests and undercover hacking (red teaming) / Additional awareness training with live hacking for all employees and targeted training for technicians
IT security audit in two phases
External: webmail penetration test
Internal: red teaming based on various scenarios
Penetration tests from different vectors and WLAN configuration verification
Password quality check of all passwords, including password history by extracting password hashes, hash cracking and subsequent analysis of cracked passwords
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: