{"id":26701,"date":"2024-07-03T10:27:20","date_gmt":"2024-07-03T08:27:20","guid":{"rendered":"https:\/\/devity.eu\/it-security-solutions-for-small-businesses-the-cyberriskcheck\/"},"modified":"2025-12-09T11:37:40","modified_gmt":"2025-12-09T10:37:40","slug":"it-security-solutions-for-small-businesses-the-cyberriskcheck","status":"publish","type":"post","link":"https:\/\/devity.eu\/en\/it-security-solutions-for-small-businesses-the-cyberriskcheck\/","title":{"rendered":"IT security solutions for small businesses: The CyberRiskCheck"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26701\" class=\"elementor elementor-26701 elementor-23032\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4038eee e-flex e-con-boxed e-con e-parent\" data-id=\"4038eee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bd51595 e-flex e-con-boxed e-con e-child\" data-id=\"bd51595\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b19912b elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"b19912b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db8e18b5\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > IT security solution for small businesses: The CyberRiskCheck<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-47a4bda7 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47a4bda7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4229f977\" data-id=\"4229f977\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7562d58 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"7562d58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db8e296b\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > IT security solutions for small businesses: The CyberRiskCheck<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7d52b4 elementor-widget elementor-widget-ld_fancy_image\" data-id=\"e7d52b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"1\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2688\" height=\"1536\" src=\"https:\/\/devity.eu\/wp-content\/uploads\/2024\/07\/CyberRisikoCheck_Illustration.jpg\" class=\"attachment-full size-full wp-image-30116\" alt=\"\" srcset=\"https:\/\/devity.eu\/wp-content\/uploads\/2024\/07\/CyberRisikoCheck_Illustration.jpg 2688w, https:\/\/devity.eu\/wp-content\/uploads\/2024\/07\/CyberRisikoCheck_Illustration-300x171.jpg 300w, https:\/\/devity.eu\/wp-content\/uploads\/2024\/07\/CyberRisikoCheck_Illustration-1024x585.jpg 1024w, https:\/\/devity.eu\/wp-content\/uploads\/2024\/07\/CyberRisikoCheck_Illustration-1536x878.jpg 1536w, https:\/\/devity.eu\/wp-content\/uploads\/2024\/07\/CyberRisikoCheck_Illustration-2048x1170.jpg 2048w\" sizes=\"(max-width: 2688px) 100vw, 2688px\" itemprop=\"image\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a6e16c elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"4a6e16c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db8e4d2d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > In today's digital world, companies of all sizes are increasingly exposed to cyber threats. Small and medium-sized enterprises (SMEs) in particular are the focus of these attacks, as they often have less comprehensive security measures in place than large corporations. However, cyberattacks can have devastating effects - from financial loss to business interruption and significant reputational damage.  <\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d7200e elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2d7200e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db8e5c69\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > In response to the growing threat situation, the German Federal Office for Information Security (BSI) has developed DIN SPEC 27076 - a simplified IT standard for small and medium-sized companies.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fbe6a6 elementor-widget elementor-widget-menu-anchor\" data-id=\"0fbe6a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"CyberRiskCheck\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54db2527 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"54db2527\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db8e6afb\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What is the CyberRiskCheck?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29170b4a elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"29170b4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db8e792b\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Existing IT security standards are largely aimed at large companies. Until now, these standards have been too extensive for small and medium-sized companies. <\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a4da279 e-flex e-con-boxed e-con e-parent\" data-id=\"a4da279\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-efefb18 e-con-full e-flex e-con e-child\" data-id=\"efefb18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e013e7 elementor-widget elementor-widget-ld_fancy_image\" data-id=\"7e013e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"1446\" height=\"1232\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 1446 1232&#039;%2F%3E\" class=\"attachment-full size-full wp-image-30107 ld-lazyload\" alt=\"\" itemprop=\"image\" data-src=\"https:\/\/devity.eu\/wp-content\/uploads\/2025\/11\/CyberSecurityCheck.png\" data-srcset=\"https:\/\/devity.eu\/wp-content\/uploads\/2025\/11\/CyberSecurityCheck.png 1446w, https:\/\/devity.eu\/wp-content\/uploads\/2025\/11\/CyberSecurityCheck-300x256.png 300w, https:\/\/devity.eu\/wp-content\/uploads\/2025\/11\/CyberSecurityCheck-1024x872.png 1024w\" data-sizes=\"(max-width: 1446px) 100vw, 1446px\" data-aspect=\"1.1737012987013\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7eee163 e-con-full e-flex e-con e-child\" data-id=\"7eee163\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa82f95 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"fa82f95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db903cb5\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > The German Federal Office for Information Security (BSI) has developed a time and cost-efficient standard - DIN SPEC 27076. Based on DIN SPEC 27076, the CyberRiskCheck consulting standard is aimed at small and medium-sized companies with up to 250 employees. <\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f7b1e6 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"0f7b1e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db904c02\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > The standardized CyberRiskCheck helps companies to systematically assess their IT security situation and protect themselves effectively against cyber threats.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9273fcc elementor-widget elementor-widget-menu-anchor\" data-id=\"9273fcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Challenges\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbf7108 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"bbf7108\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db905b33\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What are the challenges facing companies in terms of IT security?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b48adc4 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"6b48adc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db906a22\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > Companies face a variety of challenges when it comes to protecting themselves against the increasing threat situation:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e68064e elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"e68064e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db907843\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > Complex IT security<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd348b9 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"dd348b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db908700\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > The complexity of IT security requirements often exceeds the company's expertise, which leads to increased vulnerability to cyber attacks. The complexity of modern IT infrastructures and the constantly growing threats require specialized knowledge and continuous attention, which many companies do not have. <\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02291d5 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"02291d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db9096e8\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > Limited budget<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee2ebd9 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ee2ebd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db90a6f7\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > Limited financial resources mean that companies have to forego comprehensive protection and instead limit themselves to basic security measures. However, these minimal measures are often not enough to effectively protect companies in today's threat landscape. <\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c72d94a elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"c72d94a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db90b5b5\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > Shortage of time<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-671764f elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"671764f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db90c200\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > Due to a lack of time, companies often do not have the necessary resources to adequately deal with IT security issues. Daily business operations often take up all of their attention, leaving little time for strategic planning and implementation of security measures. As a result, IT security is not prioritized until a serious incident occurs.  <\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9f84d0 elementor-widget elementor-widget-menu-anchor\" data-id=\"e9f84d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Relevance\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0c621b elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"d0c621b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db90d234\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > Why is the CyberRiskCheck relevant for companies?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3036ba5 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"3036ba5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db90e225\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > The CyberRiskCheck offers companies a structured and standardized method for addressing the aforementioned challenges. With the CyberRiskCheck, companies have a powerful solution at their fingertips to specifically identify vulnerabilities and receive prioritized recommendations for action that are tailored to their specific needs and resources.   <\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef79b6c elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ef79b6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db90f114\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > With the CyberRiskCheck, companies can not only take their IT security strategy to the next level, but also meet the requirements of banks and insurance companies for proof of cyber insurance and effectively protect themselves against cyber threats. The CyberRiskCheck helps companies to effectively improve their IT security strategy without the need for extensive expertise or significant financial resources. <\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fba82a elementor-widget elementor-widget-menu-anchor\" data-id=\"9fba82a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Procedure\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dbb708 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"4dbb708\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db910098\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > How does the CyberRiskCheck work?\n<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e474bf4 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"e474bf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db911035\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > 1st evaluation meeting<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de783d8 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"de783d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db911f82\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > In the first step, an initial meeting is held to collect initial company data, which is later evaluated in the results report. In addition, the company to be advised is informed which documents (emergency plans, backup concepts, access concepts, etc.) need to be prepared. Furthermore, the responsible persons who are to participate in the consulting process are determined.  <\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6f83b2 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"d6f83b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db912f6a\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > 2. cyber risk check<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8923c50 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"8923c50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db913ec3\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > The 27 standardized test criteria of the cyber risk check are discussed together with the IT service provider. This allows the current state of the company's security situation to be analyzed and potential weaknesses to be identified. \n<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25c5601 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"25c5601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db914f1e\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > 3. evaluation of the data<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dba3645 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"dba3645\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db915ed5\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > Based on the data collected during the cyber risk check, the IT service provider prepares a results report. The report contains the most important recommendations for action, which serve as guidelines for minimizing the most relevant security risks and taking IT security to the next level. \n<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac60f2c elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"ac60f2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db916e29\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > 4. presentation of the results<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc47715 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"bc47715\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db917dc7\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > In the final step, the IT service provider presents the results of the cyber risk check to the company being advised. The results report and the recommendations for action are explained in detail. The IT service provider is also available to answer any questions.  \n<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-74f3d9f e-flex e-con-boxed e-con e-parent\" data-id=\"74f3d9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c914078 e-con-full e-flex e-con e-child\" data-id=\"c914078\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-362f470 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"362f470\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_362f470\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-arrow-circle-right\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t\t\t\t\t<p>The cyber risk check and the results report it contains serve as the basis for further steps. For example, companies can be commissioned to implement the recommendations for action. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22ac5fb elementor-widget elementor-widget-menu-anchor\" data-id=\"22ac5fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Examination\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96a41de elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"96a41de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db91e7ef\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What is checked during the CyberRiskCheck?\n<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-904fc75 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"904fc75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db91f576\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > During the CyberRiskCheck, a comprehensive analysis of a company's IT security situation is carried out. This holistic review gives companies a clear insight into their IT security risks and enables them to take proactive measures. The check covers a number of critical aspects:  <\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba9687f elementor-widget elementor-widget-ld_fancy_image\" data-id=\"ba9687f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" width=\"1669\" height=\"757\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 1669 757&#039;%2F%3E\" class=\"attachment-full size-full wp-image-22860 ld-lazyload\" alt=\"\" itemprop=\"image\" data-src=\"https:\/\/devity.eu\/wp-content\/uploads\/2024\/06\/CyberRisikoCheck_Was_wird_gecheckt.png\" data-srcset=\"https:\/\/devity.eu\/wp-content\/uploads\/2024\/06\/CyberRisikoCheck_Was_wird_gecheckt.png 1669w, https:\/\/devity.eu\/wp-content\/uploads\/2024\/06\/CyberRisikoCheck_Was_wird_gecheckt-300x136.png 300w, https:\/\/devity.eu\/wp-content\/uploads\/2024\/06\/CyberRisikoCheck_Was_wird_gecheckt-1024x464.png 1024w, https:\/\/devity.eu\/wp-content\/uploads\/2024\/06\/CyberRisikoCheck_Was_wird_gecheckt-1536x697.png 1536w\" data-sizes=\"(max-width: 1669px) 100vw, 1669px\" data-aspect=\"2.2047556142668\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe64ab8 elementor-widget elementor-widget-menu-anchor\" data-id=\"fe64ab8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Advantages\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5f5ff0 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"d5f5ff0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db92e22c\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What are the benefits of the CyberRiskCheck?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b231029 e-flex e-con-boxed e-con e-parent\" data-id=\"b231029\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-76a1dea e-con-full e-flex e-con e-child\" data-id=\"76a1dea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a66dfe8 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"a66dfe8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_a66dfe8\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Quick start <\/h3>\t\t\t\t<p>The CyberRiskCheck offers companies a simple introduction to information security. In just four uncomplicated steps, companies receive a sound and comprehensible analysis of their current IT security situation and potential risks. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06e5e1d e-con-full e-flex e-con e-child\" data-id=\"06e5e1d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8041b76 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"8041b76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_8041b76\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Clear test criteria <\/h3>\t\t\t\t<p>The CyberRiskCheck contains 27 requirements, which are divided into regular and important requirements. This makes it clear to the company which measures should be prioritized in order to reduce acute threats. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28af480 e-con-full e-flex e-con e-child\" data-id=\"28af480\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6374f1c elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"6374f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_6374f1c\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Customized results report <\/h3>\t\t\t\t<p>The IT service provider evaluates the collected data and creates a customized results report. This report provides the individual risk status value, a visualization of the weak points and an overview of relevant recommendations for action. \n<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f128279 e-con-full e-flex e-con e-child\" data-id=\"f128279\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9bb9fa6 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"9bb9fa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_9bb9fa6\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Practice-oriented recommendations <\/h3>\t\t\t\t<p>The recommendations for action are specific and sorted by urgency and contain concrete measures to eliminate identified security gaps. This gives companies the opportunity to improve potential weaknesses in information security in a targeted manner. <\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"lqd-css-sticky-column elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-14c56c80 elementor-hidden-tablet elementor-hidden-mobile\" style=\"--lqd-sticky-offset:30px\" data-id=\"14c56c80\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5bf12455 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5bf12455\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0e0c05f\" data-id=\"0e0c05f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3db9ff elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b3db9ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-708becbe elementor-widget elementor-widget-ld_custom_menu\" data-id=\"708becbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_custom_menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div\t\t\t\tclass=\"lqd-fancy-menu lqd-custom-menu pos-rel menu-items-has-fill lqd-menu-td-none\"\n\t\t\t\t\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t<ul class=\"reset-ul\" id=\"lqd-custom-menu-708becbe\" >\n\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#CyberRiskCheck\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat is the CyberRiskCheck?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#Challenges\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat are the challenges facing companies in terms of IT security?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#Relevance\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhy is the CyberRiskCheck relevant for?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#Procedure\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tHow does the CyberRiskCheck work?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#Examination\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat is checked during the CyberRiskCheck?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#Advantages\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty left-icon icon-next-to-label\"><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat are the benefits of the CyberRiskCheck?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-599ebdc e-flex e-con-boxed e-con e-parent\" data-id=\"599ebdc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dc1d530 e-con-full e-flex e-con e-child\" data-id=\"dc1d530\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3a5bc7c e-flex e-con-boxed e-con e-child\" data-id=\"3a5bc7c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5c42dd7 e-con-full e-flex e-con e-child\" data-id=\"5c42dd7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ad900b9 e-con-full e-flex e-con e-child\" data-id=\"ad900b9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2f3d3fb e-con-full e-flex e-con e-child\" data-id=\"2f3d3fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6d87cc elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"e6d87cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db93c19d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h2 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h2\"  > Request a cyber risk check.<\/h2>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09af9f8 elementor-widget elementor-widget-hub_fancy_heading lqd-el-has-inner-anim\" data-id=\"09af9f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;enable_split&quot;:&quot;true&quot;,&quot;split_type&quot;:&quot;lines&quot;}\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f39db93cdf7\" class=\"ld-fancy-heading pos-rel mask-text\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left lqd-split-lines div\"  data-split-text=\"true\" data-split-options='{\"type\":\"lines\"}'> Start now with the CyberRiskCheck and ensure that your company is prepared for the increasing cyber threats.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94a5aaf elementor-align-center elementor-mobile-align-justify elementor-widget__width-initial elementor-widget elementor-widget-ld_button\" data-id=\"94a5aaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"https:\/\/devity.eu\/en\/contact\/\"class=\"elementor-button btn btn-solid btn-icon-shaped btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"Get started now\" class=\"btn-txt\">\n\t\t\t\t\t\tGet started now\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT security solution for small businesses: The CyberRiskCheck IT security solutions for small businesses: The CyberRiskCheck In today&#8217;s digital world, companies of all sizes are increasingly exposed to cyber threats. Small and medium-sized enterprises (SMEs) in particular are the focus of these attacks, as they often have less comprehensive security measures in place than large [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":30116,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61,1],"tags":[],"class_list":["post-26701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-unkategorisiert"],"_links":{"self":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/posts\/26701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/comments?post=26701"}],"version-history":[{"count":8,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/posts\/26701\/revisions"}],"predecessor-version":[{"id":30686,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/posts\/26701\/revisions\/30686"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/media\/30116"}],"wp:attachment":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/media?parent=26701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/categories?post=26701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/tags?post=26701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}