{"id":22925,"date":"2021-04-20T15:56:07","date_gmt":"2021-04-20T13:56:07","guid":{"rendered":"https:\/\/www.tecsens.com\/pruefung-von-cybersicherheitsunternehmen\/"},"modified":"2023-09-19T12:39:19","modified_gmt":"2023-09-19T10:39:19","slug":"pruefung-von-cybersicherheitsunternehmen","status":"publish","type":"page","link":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/","title":{"rendered":"Pr\u00fcfung von Cybersicherheitsunternehmen"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; fullwidth=&#8220;on&#8220; admin_label=&#8220;01 Curva superior&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;rgba(0,0,0,0)&#8220; background_image=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/ondaazuloscura.png&#8220; background_size=&#8220;contain&#8220; background_position=&#8220;top_center&#8220; background_repeat=&#8220;repeat-x&#8220; min_height=&#8220;176px&#8220; custom_margin=&#8220;||||false|false&#8220; custom_css_main_element=&#8220;z-index:10;&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; fullwidth=&#8220;on&#8220; admin_label=&#8220;01 slider&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;-170px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_fullwidth_slider _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; height=&#8220;550px&#8220; height_tablet=&#8220;500px&#8220; height_phone=&#8220;400px&#8220; height_last_edited=&#8220;on|tablet&#8220; custom_margin=&#8220;|0px||0px|false|false&#8220; custom_padding=&#8220;|0px||0px|false|false&#8220; animation_direction=&#8220;right&#8220; auto=&#8220;on&#8220; auto_speed=&#8220;3000&#8243; auto_ignore_hover=&#8220;on&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_slide heading=&#8220;CYBERSICHERHEITS-AUDIT&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; header_level=&#8220;h1&#8243; header_font=&#8220;Raleway|700|||||||&#8220; header_text_color=&#8220;#0075b2&#8243; header_font_size=&#8220;34px&#8220; body_font=&#8220;|600|||||||&#8220; body_text_color=&#8220;#5f5e5d&#8220; body_font_size=&#8220;28px&#8220; background_color=&#8220;#FFFFFF&#8220; background_enable_color=&#8220;on&#8220; background_enable_image=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_transition=&#8220;on&#8220;]<\/p>\n<p style=\"text-align: center;\">Wir untersuchen Ihre Systeme und zeigen deren Schwachstellen<\/p>\n<hr style=\"color: #fff; max-width: 900px; margin-bottom: 30px;\">\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\" alt=\"tecsens-Logo\" class=\"wp-image-18991 alignnone size-full\" width=\"100\" height=\"100\" srcset=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg 100w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-24x24.jpg 24w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-36x36.jpg 36w, https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens-48x48.jpg 48w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/><\/p>\n<p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;06&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;30px||1px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; global_colors_info=&#8220;{}&#8220; custom_padding=&#8220;||0px|||&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||37px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>In einer zunehmend digitalisierten Welt sind alle wichtigen Gesch\u00e4ftsinformationen exponiert und anf\u00e4llig f\u00fcr Cyberangriffe.<\/strong> Informationssysteme sind der wertvollste Teil einer Organisation, und so wie wir unsere H\u00e4user sch\u00fctzen, m\u00fcssen wir dies mit unseren Unternehmen tun.<\/p>\n<p style=\"text-align: justify;\">Kurz gesagt, <strong>stellen Sie sicher, dass die Einhaltung der Cybersicherheitsstandards, die das Datenschutzgesetz f\u00fcr Kunden, Mitarbeiter und Lieferanten vorstellt.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;37px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;11&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_enable_color=&#8220;off&#8220; background_enable_image=&#8220;off&#8220; background_size=&#8220;contain&#8220; background_position=&#8220;bottom_center&#8220; background_repeat=&#8220;repeat-x&#8220; custom_padding=&#8220;30px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;775px&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/certificacion-iso-27001-3.jpg&#8220; alt=&#8220;Zertifizierung iso 27001&#8243; title_text=&#8220;Zertifizierung iso 27001&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; transform_scale=&#8220;64%|64%&#8220; custom_margin=&#8220;9px|||||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Zertifiziert nach ISO 27001, dem h\u00f6chsten Ma\u00df an Informationssicherheit, das sicherstellt, dass wir die internationalen Sicherheitsstandards einhalten.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;775px&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;\/wp-content\/2021\/02\/ACTIVO_TI_ISO_27001_-_ACCREDIA.pdf&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;SIEHE ZERTIFIKAT&#8220; button_alignment=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_color=&#8220;#ffffff&#8220; button_bg_color=&#8220;#0076b2&#8243; button_border_color=&#8220;RGBA(0,0,0,0)&#8220; button_border_radius=&#8220;34px&#8220; button_font=&#8220;Maven Pro|500|||||||&#8220; button_use_icon=&#8220;off&#8220; background_layout=&#8220;dark&#8220; custom_margin=&#8220;||20px||false|false&#8220; box_shadow_style=&#8220;preset1&#8243; box_shadow_blur=&#8220;7px&#8220; global_colors_info=&#8220;{}&#8220; button_text_color__hover_enabled=&#8220;on|hover&#8220; button_border_color__hover_enabled=&#8220;on|hover&#8220; button_border_color__hover=&#8220;RGBA(0,0,0,0)&#8220; button_text_color__hover=&#8220;#5f5e5d&#8220; button_bg_color__hover_enabled=&#8220;on|desktop&#8220; button_bg_color__hover=&#8220;#FFFFFF&#8220; button_bg_enable_color__hover=&#8220;on&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;37px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;03&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;30px||41px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/consultoria-transformacion-digital-seguridad-14.png&#8220; alt=&#8220;Lagerung robusto&#8220; title_text=&#8220;Lagerung robusto&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;-50px||52px|||&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Was ist ein Cybersicherheitsaudit?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><strong>Eine Cybersicherheitspr\u00fcfung versucht, das Prozessszenario einer Organisation durch eine Analyse darzustellen, die ihren Fluss von Eingaben\/Ausgaben und Schwachstellen im System definiert.<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;0px|||||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Wann sollte ich das tun?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Es wird empfohlen, dies mindestens einmal j\u00e4hrlich zu tun.<\/p>\n<p style=\"text-align: justify;\">Das proaktive Scannen von Schwachstellen und Systemausf\u00e4llen hilft uns, gro\u00dfe Probleme in der Zukunft zu vermeiden.<\/p>\n<p style=\"text-align: justify;\">Technologie schreitet voran und damit die Methodik von Cyberkriminellen. Kein Unternehmen jeder Gr\u00f6\u00dfe ist frei, diese Bedrohungen zu erleiden.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;12&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; use_background_color_gradient=&#8220;on&#8220; background_color_gradient_stops=&#8220;#eeeeee 65%|#ffffff 65%&#8220; background_color_gradient_start=&#8220;#eeeeee&#8220; background_color_gradient_start_position=&#8220;65%&#8220; background_color_gradient_end=&#8220;#ffffff&#8220; background_color_gradient_end_position=&#8220;65%&#8220; custom_padding=&#8220;3px||5px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;50px|||||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;lista alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; custom_padding=&#8220;20px|30px|20px|30px|false|false&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; box_shadow_style=&#8220;preset1&#8243; box_shadow_blur=&#8220;55px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076b2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_text_color=&#8220;#0076B2&#8243; header_2_font=&#8220;Maven Pro||||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 class=\"titulo\" style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/objetivos-1.jpg\" alt=\"Ziele\" class=\"wp-image-18837 alignnone size-full\" width=\"16\" height=\"15\"> Ziele<\/h2>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">F\u00fchren Sie den Schutz- und Verbesserungsplan aus oder aktualisieren Sie ihn.<\/li>\n<li style=\"text-align: justify;\">Erkennung von Sicherheitsverletzungen und internen und externen Sicherheitsl\u00fccken.<\/li>\n<li style=\"text-align: justify;\">Planen und durchf\u00fchren Sie eine Korrektur der Ergebnisse.<\/li>\n<li style=\"text-align: justify;\">Schulung und Sensibilisierung des IT-Teams.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;lista alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; custom_padding=&#8220;20px|30px|20px|30px|false|false&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; box_shadow_style=&#8220;preset1&#8243; box_shadow_blur=&#8220;55px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076b2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_text_color=&#8220;#0076B2&#8243; header_2_font=&#8220;Maven Pro||||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||12px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 class=\"titulo\" style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/beneficios.jpg\" alt=\"Erl\u00f6s\" class=\"wp-image-18841 alignnone size-full\" width=\"16\" height=\"15\"> Erl\u00f6s<\/h2>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<ul>\n<li style=\"text-align: justify;\">Gew\u00e4hrleisten Sie die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit von Daten.<\/li>\n<li style=\"text-align: justify;\">Minderung gro\u00dfer Risiken.<\/li>\n<li style=\"text-align: justify;\">Verhinderung gezielter oder nicht zielgerichteter Angriffe sowie Denial-of-Service.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;09&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;30px||1px|||&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;55px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;3_5,2_5&#8243; module_class=&#8220;reverse&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;3_5&#8243; module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#0076b2&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Maven Pro||||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;16px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||6px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 class=\"titulo\" style=\"text-align: left;\">Cybersecurity-Audit-Services<\/h2>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.4em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||11px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><span style=\"text-decoration: underline;\">Interne Revision<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.4em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||16px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Systeme <strong>werden aus dem privaten Unternehmensnetzwerk analysiert,<\/strong>ein Thema simuliert einen Angriff innerhalb der Organisation.<\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.4em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||11px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\"><span style=\"text-decoration: underline;\">Externe Revision<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text module_class=&#8220;lista&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.4em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||11px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: justify;\">Systeme <strong>werden aus dem Internet analysiert, das Motiv ist extern<\/strong> und simuliert einen Angriff von au\u00dferhalb der Organisation.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;2_5&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-interna-y-externa-17.jpg&#8220; alt=&#8220;internes und externes Cybersicherheitsaudit&#8220; title_text=&#8220;internes und externes Cybersicherheitsaudit&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;13&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;5px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;0px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; custom_padding=&#8220;||34px|||&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Bereichen<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_4,1_4,1_4,1_4&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;775px&#8220; custom_margin=&#8220;0px||30px||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; module_class=&#8220;alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#0076B2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Webseite<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; module_class=&#8220;alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#0076B2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">E-Mail<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; module_class=&#8220;alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#0076B2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Ras<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; module_class=&#8220;alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#0076B2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Dateifreigabe<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_4,1_4,1_4,1_4&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;775px&#8220; custom_margin=&#8220;0px||0px||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; module_class=&#8220;alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#0076B2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Betriebssystem<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; module_class=&#8220;alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#0076B2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">App (Server, Mittelstand, etc.)<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; module_class=&#8220;alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#0076B2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Netzwerk- oder Sicherheitssysteme<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; module_class=&#8220;alineamiento-vertical&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|13px|13px|13px|13px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#0076B2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Passwortspeicherung<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;55px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;#eeeeee&#8220; divider_weight=&#8220;3px&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; disabled_on=&#8220;on|on|off&#8220; admin_label=&#8220;05a&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;30px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; custom_padding=&#8220;||34px|||&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Wie machen wir Cybersicherheits-Audits?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-orden-ideas-1.jpg&#8220; alt=&#8220;Cybersecurity Audit ordnet Ideen an&#8220; title_text=&#8220;Cybersecurity Audit ordnet Ideen an&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5F5E5D&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Wir analysieren Ihre Infrastruktur, indem wir eine Servicekarte erstellen<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-analizar-2.jpg&#8220; alt=&#8220;Cybersicherheits-Audit-Analyse&#8220; title_text=&#8220;Cybersicherheits-Audit-Analyse&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Wir erkennen Fehler und Schwachstellen<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-diseno-2.jpg&#8220; alt=&#8220;\u00dcberwachung des Cybersicherheitsdesigns&#8220; title_text=&#8220;\u00dcberwachung des Cybersicherheitsdesigns&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Ausnutzen erkannter Schwachstellen <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-identificacion-cambios-1.jpg&#8220; alt=&#8220;Cybersicherheitsaudit zur Identifizierung von \u00c4nderungen&#8220; title_text=&#8220;Cybersicherheitsaudit zur Identifizierung von \u00c4nderungen&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Datenextraktion<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-plan-tecnologia-1.jpg&#8220; alt=&#8220;Cybersicherheits-Audit-Technologieplan&#8220; title_text=&#8220;Cybersicherheits-Audit-Technologieplan&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Erkennung zuk\u00fcnftiger Verpflichtungen oder neuer Angriffsvektoren<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-estudio-necesidades-1.jpg&#8220; alt=&#8220;Cybersicherheits-Audit-Studienbedarf&#8220; title_text=&#8220;Cybersicherheits-Audit-Studienbedarf&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Detaillierte Sende- und Risikobewertung<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1100px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;55px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; disabled_on=&#8220;off|off|on&#8220; admin_label=&#8220;05b&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;30px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;dos-columnas&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-orden-ideas-1.jpg&#8220; alt=&#8220;Cybersecurity Audit ordnet Ideen an&#8220; title_text=&#8220;Cybersecurity Audit ordnet Ideen an&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Wir analysieren Ihre Infrastruktur, indem wir eine Servicekarte erstellen<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;dos-columnas&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-analizar-2.jpg&#8220; alt=&#8220;Cybersicherheits-Audit-Analyse&#8220; title_text=&#8220;Cybersicherheits-Audit-Analyse&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Wir erkennen Fehler und Schwachstellen<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;dos-columnas&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-diseno-2.jpg&#8220; alt=&#8220;\u00dcberwachung des Cybersicherheitsdesigns&#8220; title_text=&#8220;\u00dcberwachung des Cybersicherheitsdesigns&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Wir erkennen Fehler und Schwachstellen<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;dos-columnas&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-identificacion-cambios-1.jpg&#8220; alt=&#8220;Cybersicherheitsaudit zur Identifizierung von \u00c4nderungen&#8220; title_text=&#8220;Cybersicherheitsaudit zur Identifizierung von \u00c4nderungen&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Datenextraktion<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;dos-columnas&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-plan-tecnologia-1.jpg&#8220; alt=&#8220;Cybersicherheits-Audit-Technologieplan&#8220; title_text=&#8220;Cybersicherheits-Audit-Technologieplan&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Erkennung zuk\u00fcnftiger Verpflichtungen oder neuer Angriffsvektoren<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; module_class=&#8220;dos-columnas&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||20px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/auditoria-ciberseguridad-estudio-necesidades-1.jpg&#8220; alt=&#8220;Cybersicherheits-Audit-Studienbedarf&#8220; title_text=&#8220;Cybersicherheits-Audit-Studienbedarf&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; border_radii=&#8220;on|12px|12px|12px|12px&#8220; box_shadow_style=&#8220;preset1&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro|600|||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">Detaillierte Sende- und Risikobewertung<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;10&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#F1F6F8&#8243; background_enable_image=&#8220;off&#8220; background_size=&#8220;contain&#8220; background_position=&#8220;bottom_center&#8220; background_repeat=&#8220;repeat-x&#8220; custom_margin=&#8220;24px|||||&#8220; custom_padding=&#8220;30px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1000px&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5F5E5D&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;5px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Mehr erfahren&#8230;<\/h2>\n<p style=\"text-align: center;\">[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; admin_label=&#8220;Fila&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;775px&#8220; custom_padding=&#8220;75px||0px|||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blog posts_number=&#8220;1&#8243; show_author=&#8220;off&#8220; show_date=&#8220;off&#8220; show_categories=&#8220;off&#8220; show_pagination=&#8220;off&#8220; module_class=&#8220;adelantoblog&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Maven Pro|500|||||||&#8220; header_text_color=&#8220;#5F5E5D&#8220; header_font_size=&#8220;16px&#8220; body_font=&#8220;Maven Pro||||||||&#8220; body_font_size=&#8220;16px&#8220; background_color=&#8220;RGBA(0,0,0,0)&#8220; text_orientation=&#8220;justified&#8220; custom_padding=&#8220;||||false|false&#8220; border_radii_fullwidth=&#8220;on|20px|20px|20px|20px&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_blog][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blog posts_number=&#8220;1&#8243; show_author=&#8220;off&#8220; show_date=&#8220;off&#8220; show_categories=&#8220;off&#8220; show_pagination=&#8220;off&#8220; offset_number=&#8220;1&#8243; module_class=&#8220;adelantoblog&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Maven Pro|500|||||||&#8220; header_text_color=&#8220;#5F5E5D&#8220; header_font_size=&#8220;16px&#8220; body_font=&#8220;Maven Pro||||||||&#8220; body_text_align=&#8220;justify&#8220; body_font_size=&#8220;16px&#8220; background_color=&#8220;RGBA(0,0,0,0)&#8220; custom_padding=&#8220;||||false|false&#8220; border_radii_fullwidth=&#8220;on|20px|20px|20px|20px&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;Ondaazulclara&#8220; _builder_version=&#8220;4.9.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; background_image=&#8220;https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/ondaazulclara.jpg&#8220; background_size=&#8220;contain&#8220; background_position=&#8220;top_center&#8220; background_repeat=&#8220;repeat-x&#8220; height=&#8220;96px&#8220; custom_margin=&#8220;-35px|||||&#8220; custom_padding=&#8220;2px||100px|||&#8220; global_module=&#8220;20514&#8243; global_colors_info=&#8220;{}&#8220;][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; theme_builder_area=&#8220;post_content&#8220; _builder_version=&#8220;4.21.2&#8243; _module_preset=&#8220;default&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; module_id=&#8220;consulting&#8220; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;19px|auto||auto||&#8220; custom_padding=&#8220;0px||55px|||&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][et_pb_code _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;30px|30px|30px|30px|false|false&#8220; custom_css_before=&#8220;span.wpcf7-list-item {display:block;}&#8220; border_radii=&#8220;on|8px|8px|8px|8px&#8220; box_shadow_style=&#8220;preset2&#8243; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f34142-o1\" lang=\"de-DE\" dir=\"ltr\" data-wpcf7-id=\"34142\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/de\/wp-json\/wp\/v2\/pages\/22925#wpcf7-f34142-o1\" method=\"post\" class=\"wpcf7-form init wpcf7-acceptance-as-validation\" aria-label=\"Kontaktformular\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"34142\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"de_DE\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f34142-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<p><b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Kommerzieller berater\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Kommerzieller berater<\/span><\/label><\/span><\/span><\/span><\/b> - Ja, Sie haben es bereits klar<br \/>\n<b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Technischer Berater\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Technischer Berater<\/span><\/label><\/span><\/span><\/span><\/b> - Wir f\u00fchren Sie zur besten L\u00f6sung<br \/>\n<b><span class=\"wpcf7-form-control-wrap\" data-name=\"radio-106\"><span class=\"wpcf7-form-control wpcf7-radio\"><span class=\"wpcf7-list-item first last\"><label><input type=\"radio\" name=\"radio-106\" value=\"Allgemeine Informationen\" checked=\"checked\" \/><span class=\"wpcf7-list-item-label\">Allgemeine Informationen<\/span><\/label><\/span><\/span><\/span><\/b><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"nombre\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name*\" value=\"\" type=\"text\" name=\"nombre\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"text-274\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" value=\"Unternehmen\" type=\"text\" name=\"text-274\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mail*\" value=\"\" type=\"email\" name=\"email\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"telefono\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Telefon*\" value=\"\" type=\"tel\" name=\"telefono\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"mensaje\"><textarea cols=\"40\" rows=\"6\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required campo\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Nachricht*\" name=\"mensaje\"><\/textarea><\/span>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"aceptacion\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><input type=\"checkbox\" name=\"aceptacion\" value=\"1\" aria-invalid=\"false\" \/><\/span><\/span><\/span> \u00a0Ich habe die Datenschutzerkl\u00e4rung gelesen und <a href=\"https:\/\/www.tecsens.com\/en\/data-protection\/\" target=\"_blank\">akzeptiere sie.<\/a>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acepta-recibir-info\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acepta-recibir-info\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">\u00a0Ich m\u00f6chte per E-Mail kommerzielle Informationen \u00fcber Produkte und Dienstleistungen von TECSENS erhalten.<\/span><\/label><\/span><\/span><\/span>\n<\/p>\n<span class=\"wpcf7-form-control-wrap recaptcha\" data-name=\"recaptcha\"><span data-sitekey=\"6LfURk4gAAAAAEZGOFb7aVgEGBWHEQecGNbaKJCa\" class=\"wpcf7-form-control wpcf7-recaptcha g-recaptcha\"><\/span>\r\n<noscript>\r\n\t<div class=\"grecaptcha-noscript\">\r\n\t\t<iframe loading=\"lazy\" src=\"https:\/\/www.google.com\/recaptcha\/api\/fallback?k=6LfURk4gAAAAAEZGOFb7aVgEGBWHEQecGNbaKJCa\" frameborder=\"0\" scrolling=\"no\" width=\"310\" height=\"430\">\r\n\t\t<\/iframe>\r\n\t\t<textarea name=\"g-recaptcha-response\" rows=\"3\" cols=\"40\" placeholder=\"reCaptcha Response Here\">\r\n\t\t<\/textarea>\r\n\t<\/div>\r\n<\/noscript>\r\n<\/span>\n<p style=\"text-align:center\"><input class=\"wpcf7-form-control wpcf7-submit has-spinner boton\" type=\"submit\" value=\"SCHIKEN\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#5f5e5d&#8220; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;35px||36px||false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<h2 style=\"text-align: center;\">M\u00fcssen Sie mit einem Experten sprechen?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;52px||7px||false|false&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<p style=\"text-align: left;\"><strong>Unsere B\u00fcros<\/strong><\/p>\n<p style=\"text-align: left;\">\n<ul>\n<li style=\"text-align: left;\">Paseo de la Castellana 171, 4\u00ba Izq, 28046 (Madrid)<\/li>\n<li style=\"text-align: left;\">C\/Figueres 8 Despacho 12, 08022 (Barcelona)<\/li>\n<li style=\"text-align: left;\">Edisonstra\u00dfe 63 Haus A, 1. Stock, 12459 (Berlin)<span style=\"font-size: 19px;\"><\/span> <span style=\"text-align: justify;\"><\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;||3px|||&#8220; custom_padding=&#8220;||0px|||&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][\/et_pb_divider][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;7px||||false|false&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_llamar-1.png\" width=\"20\" height=\"20\" alt=\"Symbolaufruf\" class=\"wp-image-28495 alignnone size-full\" style=\"float: left;\"><span style=\"font-size: 19px;\"><\/span> <a href=\"tel:%20+34917914400\" title=\"  (+34) 917 914 400\"> <\/a><span style=\"color: #333333;\"><a href=\"tel:%20+34917914400\" title=\" (+34) 917 914 400\">(+34) 917 914<\/a><\/span> 400 \/ (+<a href=\"tel:+34935455600\" style=\"color: #333333;\"> <\/a><a href=\"tel:%20+34935455600\" title=\" (+34) 935 455 600\"> 34) 935 455 600 \/ (+<\/a><a href=\"tel:+493086323849\" data-auth=\"NotApplicable\">49) 30 863 238 49<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;||3px|||&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][\/et_pb_divider][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;4px||||false|false&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_email.png\" width=\"20\" height=\"20\" alt=\"E-Mail-Ikono\" class=\"wp-image-28499 alignnone size-full\">  <a href=\"mailto:info@tecsens.com\">info@tecsens.com<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;||3px|||&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][\/et_pb_divider][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Maven Pro||||||||&#8220; text_text_color=&#8220;#5f5e5d&#8220; text_font_size=&#8220;19px&#8220; text_line_height=&#8220;1.2em&#8220; header_2_font=&#8220;Raleway|700|||||||&#8220; header_2_text_color=&#8220;#0076B2&#8243; header_2_font_size=&#8220;36px&#8220; header_2_letter_spacing=&#8220;2px&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;2px||52px||false|false&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;]<\/p>\n<p style=\"text-align: left;\"><span style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/05\/icono_hora.png\" width=\"20\" height=\"20\" alt=\"Symbolzeit\" class=\"wp-image-28503 alignnone size-full\">  <strong>Montag bis Donnerstag<\/strong> 9.00-18.30h <strong>Freitag<\/strong> 9.00-15.00h<\/span><\/p>\n<p>[\/et_pb_text][et_pb_social_media_follow icon_color=&#8220;#FFFFFF&#8220; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220; theme_builder_area=&#8220;post_content&#8220;][et_pb_social_media_follow_network social_network=&#8220;linkedin&#8220; url=&#8220;https:\/\/www.linkedin.com\/company\/tecsens\/mycompany\/verification\/?viewAsMember=true&#8220; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#007bb6&#8243; global_colors_info=&#8220;{}&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220; theme_builder_area=&#8220;post_content&#8220;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;twitter&#8220; url=&#8220;https:\/\/twitter.com\/Tecsens&#8220; _builder_version=&#8220;4.17.3&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#00aced&#8220; global_colors_info=&#8220;{}&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220; theme_builder_area=&#8220;post_content&#8220;]twitter[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wir untersuchen Ihre Systeme und zeigen deren Schwachstellen In einer zunehmend digitalisierten Welt sind alle wichtigen Gesch\u00e4ftsinformationen exponiert und anf\u00e4llig f\u00fcr Cyberangriffe. Informationssysteme sind der wertvollste Teil einer Organisation, und so wie wir unsere H\u00e4user sch\u00fctzen, m\u00fcssen wir dies mit unseren Unternehmen tun. Kurz gesagt, stellen Sie sicher, dass die Einhaltung der Cybersicherheitsstandards, die das [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":120,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-22925","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pr\u00fcfung von Cybersicherheitsunternehmen - Tecsens<\/title>\n<meta name=\"description\" content=\"Der Cybersecurity Audit Service untersucht Systeme und hebt gesch\u00e4ftliche Schwachstellen hervor, indem er dazu beitr\u00e4gt, diese zu sch\u00fctzen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pr\u00fcfung von Cybersicherheitsunternehmen - Tecsens\" \/>\n<meta property=\"og:description\" content=\"Der Cybersecurity Audit Service untersucht Systeme und hebt gesch\u00e4ftliche Schwachstellen hervor, indem er dazu beitr\u00e4gt, diese zu sch\u00fctzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-19T10:39:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"32\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\"},\"headline\":\"Pr\u00fcfung von Cybersicherheitsunternehmen\",\"datePublished\":\"2021-04-20T13:56:07+00:00\",\"dateModified\":\"2023-09-19T10:39:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/\"},\"wordCount\":6312,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/\",\"url\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/\",\"name\":\"Pr\u00fcfung von Cybersicherheitsunternehmen - Tecsens\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"datePublished\":\"2021-04-20T13:56:07+00:00\",\"dateModified\":\"2023-09-19T10:39:19+00:00\",\"description\":\"Der Cybersecurity Audit Service untersucht Systeme und hebt gesch\u00e4ftliche Schwachstellen hervor, indem er dazu beitr\u00e4gt, diese zu sch\u00fctzen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pr\u00fcfung von Cybersicherheitsunternehmen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g\",\"caption\":\"Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pr\u00fcfung von Cybersicherheitsunternehmen - Tecsens","description":"Der Cybersecurity Audit Service untersucht Systeme und hebt gesch\u00e4ftliche Schwachstellen hervor, indem er dazu beitr\u00e4gt, diese zu sch\u00fctzen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/","og_locale":"de_DE","og_type":"article","og_title":"Pr\u00fcfung von Cybersicherheitsunternehmen - Tecsens","og_description":"Der Cybersecurity Audit Service untersucht Systeme und hebt gesch\u00e4ftliche Schwachstellen hervor, indem er dazu beitr\u00e4gt, diese zu sch\u00fctzen.","og_url":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/","og_site_name":"Tecsens","article_modified_time":"2023-09-19T10:39:19+00:00","og_image":[{"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"32\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/"},"author":{"name":"Admin","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859"},"headline":"Pr\u00fcfung von Cybersicherheitsunternehmen","datePublished":"2021-04-20T13:56:07+00:00","dateModified":"2023-09-19T10:39:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/"},"wordCount":6312,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/","url":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/","name":"Pr\u00fcfung von Cybersicherheitsunternehmen - Tecsens","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","datePublished":"2021-04-20T13:56:07+00:00","dateModified":"2023-09-19T10:39:19+00:00","description":"Der Cybersecurity Audit Service untersucht Systeme und hebt gesch\u00e4ftliche Schwachstellen hervor, indem er dazu beitr\u00e4gt, diese zu sch\u00fctzen.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2021\/02\/logo-tecsens.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/de\/pruefung-von-cybersicherheitsunternehmen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/de\/"},{"@type":"ListItem","position":2,"name":"Pr\u00fcfung von Cybersicherheitsunternehmen"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/1f72960a60140421bab7c0c55b923859","name":"Admin","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cef66946068415daaf1178cd189f6c18?s=96&d=mm&r=g","caption":"Admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/pages\/22925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/comments?post=22925"}],"version-history":[{"count":10,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/pages\/22925\/revisions"}],"predecessor-version":[{"id":45316,"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/pages\/22925\/revisions\/45316"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/de\/wp-json\/wp\/v2\/media?parent=22925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}