As experts in the AI field, we are very familiar with the analysis of large amounts of data and the creation of complex algorithms required for this.
We will focus our expertise in 2023 in the area of cybersecurity and data protection. Both topics are closely linked.
In our workshops, we show you how you can optimally and permanently protect your company and its externally accessible web infrastructure (web server, mail server, websites, etc.), even during operations.
We not only analyze your infrastructure using complex scans (our tool JOUO is available to you as part of the workshop), but show you step by step how you can not only protect your externally accessible infrastructure against attacks, but also make it more secure with the "Zero Trust Approach" and why your name servers need an invisibility cloak.
What does that mean for you?
During workshop, we show the risk that operating a web infrastructure can pose for a company.
Where does this risk come from and how can risks be identified and eliminated in good time?
Surface attack monitoring should be mandatory for all areas of IT in companies. However, the area of web infrastructure is often not managed by the company's internal IT, but by external service providers.
The workshop imparts the knowledge to implement security strategies for websites, shops and all interactive elements of a website.
Our portal software Jouo enables management to identify attack vectors on the web infrastructure of their organization independently of IT specialists. With the help of our workshop, you will be made aware of the details of these attack vectors and thus be able to support your decisions with all the necessary information.
Using examples of successful attacks on the infrastructure of other companies, we will show you how successful such attacks on your web infrastructure could be.
We use the classification of the Mitra Attak Database.
In the workshop, we will also show you the data of your company using JOUO.
An example of content that we can show you in the workshop:
We will explain it to you by using the "classic" case of open ports. A port is an input or output connection point for an application program or peripheral devices. All ports have numbers, which are standardized (refer to this Wikipedia article). For example, ports with the number "22" are used for encrypted remote maintenance and file transfer. If such a port is now openly accessible, i.e. not protected and e.g. Let's Encrypt is used, the Let's Encrypt private key is stored on the server and can be tapped by anyone via the open port. Your security key is now not only worthless, but also allows attackers to gain access to your infrastructure.
This example illustrates what this can mean: your company is protected like a castle with thick walls and is being attacked. The defense focuses on the clearly visible attackers. However, it does not see that there is a foot-sized hole in the wall through which the key blank for all doors of the castle (your company) can be reached. This blank is now copied, finely grounded and prepared for use: All doors can be opened with it!
We don't offer standard solutions. Because we know that every customer is different. That is why we develop individual and unique solutions in close consultation with our customers. If you have any questions, just contact us.
We believe in what we do! And want to support you with what you need.
Why can you count on us? Because our company is more than just a business. Each person on our team is unique - and we all share the same values.