Popular searches
Hamburger Menu
Mann arbeitet am Schreibtisch mit Notebook und Mikro im abgedunkelten Raum
Frau schreibt mit schwarzem Stift auf roten Zettel die Worte "Problem leaks in Security, Impact"
4 Kollegen sitzen vor 2 großen Bildschirmen mit Weltkarte und Datenreihen.
Mann hockt vor der Rückseite eines geöffneten Serverschranks und prüft die Verkabelung.

IT security the unorthodox way – welcome to codecentric

We think like hackers. This is the best way of stopping potential attackers.

Have you been hacked? Do you need help? ⁠

24/7 emergency hotline for IT security incidents: +49 32 221097748 (powered by COGITANDA)

//

Where are your vulnerabilities?

Why IT security? This is why: A growing number of businesses are falling victim to data theft, cyber extortion, espionage, and sabotage. A Bitkom survey from 2023 revealed that companies suffered losses in excess of 206 billion euros as a result. Many attacks could have been prevented with the right IT security measures. Do you know the vulnerabilities in your organization? 

IT security check. See the big picture.

Where do you stand in terms of IT security? Our free online check will give you an overview of the state of your IT security in just a few minutes – including specific tips on how to improve it.

Illustration of the way to secure IT in the company
//

Your way to secure IT

If you want to protect your company against cyberattacks, you should take a structured approach. First, look at the critical points in your company. Think about typical weak points such as shadow IT, a lack of security awareness or poorly secured web applications.

To understand where you stand with your IT security, an IT security assessment gives you an initial overview. The assessment puts your entire IT landscape to the test in terms of technology and processes.

Once it is clear where your weak points are, you proceed according to criticality and effort. Step by step. Start your IT security journey today!

//

Our hacks against hackers and for your IT Security

We are the experts who protect your business from cyber attacks because we know how attackers think and we understand what needs to be protected. We have the expertise and tools to make your IT environment secure, regardless of whether you need to secure web applications, cloud infrastructure, or IT infrastructure. Take a look around and discover our portfolio of solutions for your IT Security.

//

Avoiding cyber risk – establishing IT Security

//

Do you have a secure handle on shadow IT?

Illustration: Mann sitzt vor Notebook, daraus kommen Arme einer Krake, darum herum Totenkopf, Warnzeichen und Fußspuren.

Shadow IT in your organization brings with it all kinds of security issues, because no one really has control over which devices and programs are in use. Outdated software and a lack of standards create security vulnerabilities that make it easy for attackers to gain access. It also increases the risk of phishing and malware. You also risk breaching compliance regulations and legal security, not to mention data loss and leaks. 

You can undertake the following:

  • Use OSINT to gain an overview of what data about your business can be found on the Internet.
  • An IT Infrastructure Penetration test helps you to identify vulnerabilities in your system environment and track down unauthorized devices and applications.
  • Bolster your central IT administration with an IT Security Assessment in order to take full control of all IT activities.

//

How vulnerable are your colleagues?

Illustration: 3 Personen, die mit Megaphonen rufen, darum herum zerbrochenes Siegel und Fingerabdrücke.

If your team doesn't have a heightened awareness of IT security, it can quickly backfire. A casual approach to sensitive data, the use of weak passwords, or a failure to follow security guidelines increases the risk of falling victim to a cyber attack. Missed updates can also quickly lead to security vulnerabilities. And if your team then fails to recognize or report security incidents, the consequences can be dire. This is why it is important that everyone in the team internalizes safe IT security practices to minimize vulnerabilities in your organization.

You can undertake the following:

  • You can run a phishing campaign to see just how vulnerable your colleagues are. This is the starting point for further initiatives. 
  • Raise your colleagues' awareness through regular IT Security Workshops in which they learn everything they need to know.
  • Monitor your network and traffic on a regular basis to quickly detect any irregularities.

//

How secure are your web applications?

Illustration: links sitzt Person mit Füßen hoch vor Notebook, rechts greift Person mit Angel und Maske das Notebook an.

Web applications pose a number of tricky challenges for IT security. Firstly, they are a popular target for hackers because they are usually publicly accessible and often subject to attacks such as cross-site scripting or SQL injections. Added to this are new, unknown security vulnerabilities and unprotected APIs that constitute further risks. And then you also have to be able to handle session IDs and data privacy securely. In other words: the more extensive and complex your web application is, the greater the potential for attack.

You can undertake the following:

Do you have any further questions?

Let's exchange ideas. I am looking forward to hearing about your IT security issues.

Marc Lenze

Marc Lenze