{"id":14704,"date":"2024-11-28T14:04:19","date_gmt":"2024-11-28T12:04:19","guid":{"rendered":"https:\/\/on.de\/information-security\/"},"modified":"2025-04-09T19:52:59","modified_gmt":"2025-04-09T19:52:59","slug":"information-security","status":"publish","type":"page","link":"https:\/\/on.de\/en\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"14704\" class=\"elementor elementor-14704\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-593c071 e-flex e-con-boxed e-con e-parent\" data-id=\"593c071\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1640066 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"1640066\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b10b2df elementor-widget elementor-widget-text-editor\" data-id=\"b10b2df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW11780197 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW11780197 BCX0\" data-ccp-parastyle=\"heading 1\">Protect your data with our consulting for Information Security<br><\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a457d6 elementor-widget elementor-widget-heading\" data-id=\"6a457d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fewer risks and more control through efficient management of your Information Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fb64e5 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"2fb64e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#gform_wrapper_1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover the advantages now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-371ad83 elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet e-flex e-con-boxed e-con e-parent\" data-id=\"371ad83\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5da3bc4 e-con-full e-flex e-con e-child\" data-id=\"5da3bc4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81c927d elementor-widget elementor-widget-text-editor\" data-id=\"81c927d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW11780197 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW11780197 BCX0\" data-ccp-parastyle=\"heading 1\">Protect your data with our consulting for Information Security<br><\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3e5e05 elementor-widget elementor-widget-heading\" data-id=\"f3e5e05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fewer risks and more control through efficient management of your Information Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d166894 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"d166894\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#gform_wrapper_1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover the advantages now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cafd472 e-flex e-con-boxed e-con e-parent\" data-id=\"cafd472\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4e21291 e-grid e-con-full e-con e-child\" data-id=\"4e21291\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2e14493 e-con-full e-flex e-con e-child\" data-id=\"2e14493\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e061a3 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"7e061a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1023\" height=\"1024\" src=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich.png\" class=\"attachment-full size-full wp-image-14486\" alt=\"\" srcset=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich.png 1023w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich-300x300.png 300w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich-150x150.png 150w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich-768x769.png 768w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich-12x12.png 12w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich-400x400.png 400w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich-600x600.png 600w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/elementor\/thumbs\/verlasslich-r1424bh0ezs0olvmbt771x9hh6elgkabpeeq4x9jis.png 194w\" sizes=\"(max-width: 1023px) 100vw, 1023px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d951c71 elementor-widget elementor-widget-text-editor\" data-id=\"d951c71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Trustworthy<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3596c8 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e3596c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a world where relationships are based on trust, it is crucial to gain and maintain the trust of your customers and partners. Ensure that your information assets and data are transparent and always under your control. Set a high standard with integrity and position your company as a reliable partner. Together we will build a trusting future that is characterized by long-term success. Put your trust in us &#8211; we will strengthen your network!    <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6978603 e-con-full e-flex e-con e-child\" data-id=\"6978603\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b6cfda elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4b6cfda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1023\" src=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png\" class=\"attachment-full size-full wp-image-14489\" alt=\"\" srcset=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png 1024w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-300x300.png 300w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-150x150.png 150w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-768x767.png 768w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-12x12.png 12w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-400x400.png 400w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-600x600.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-099bb85 elementor-widget elementor-widget-text-editor\" data-id=\"099bb85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Certified<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbced3f elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"bbced3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Rely on our expertise! Our highly qualified consultants not only have professional know-how, but are also all certified and can provide you with individual support.   <\/p><p>Let us achieve your goals together. We will accompany you &#8211; step by step. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-84c1838 e-con-full e-flex e-con e-child\" data-id=\"84c1838\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4086db elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"e4086db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1023\" height=\"1024\" src=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/smart.png\" class=\"attachment-full size-full wp-image-14495\" alt=\"\" srcset=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/smart.png 1023w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/smart-300x300.png 300w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/smart-150x150.png 150w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/smart-768x769.png 768w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/smart-12x12.png 12w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/smart-400x400.png 400w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/smart-600x600.png 600w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/elementor\/thumbs\/smart-r142wylyo8zkgu9u2owxj7254v890izvb62dlgsnx0.png 194w\" sizes=\"(max-width: 1023px) 100vw, 1023px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85b801c elementor-widget elementor-widget-text-editor\" data-id=\"85b801c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Smart<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f195472 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f195472\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Rely on lean and effective Information Security processes that can be seamlessly integrated into your day-to-day business. This not only increases acceptance among your customers and partners, but also makes a decisive contribution to reducing costs. With a strategically implemented Information Security Management System (ISMS), you not only increase your efficiency, but also your turnover. Take the step into the future of Information Security &#8211; smart and profitable!   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79b4179 e-con-full e-flex e-con e-parent\" data-id=\"79b4179\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0644060 e-flex e-con-boxed e-con e-child\" data-id=\"0644060\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bf59f0f e-con-full e-flex e-con e-child\" data-id=\"bf59f0f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd05d5a elementor-widget__width-initial elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"bd05d5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is an Information Security Management System?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-792cd92 elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"792cd92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The level of automation in IT is growing rapidly. Companies are becoming increasingly networked and the world of work is becoming more digital. Attacks from the internet have recently become more frequent. Today&#8217;s standards include the sustainable and effective handling of internal and external data and information.   <\/p><p>These must be protected from unauthorized access in order to prevent economic damage and protect valuable information from manipulation and unauthorized access. Information Security encompasses not only digital data, networks and computers, but also the entire network security, computer security and data protection. <\/p><p>Whether hacker attacks, unauthorized decryption of data, espionage, sabotage, vandalism or forces of nature &#8211; each of these aspects requires a well thought-out and comprehensive concept.<\/p><p>A<strong> robust Information Security Management System (ISMS) <\/strong>consists of many essential building blocks.<br>Security policies and concepts must be defined or regularly updated. Risks need to be continuously reassessed, appropriate measures defined, and their implementation monitored.<br>Audit plans must be created, prepared, conducted, and followed up.<br>And opportunities for improvement must be identified and implemented on an ongoing basis.   <\/p><p>The task of the ISMS is to adequately protect the fundamental values of <strong>confidentiality, integrity<\/strong> and <strong>availability<\/strong> of information. The definition of Information Security refers to the safeguarding of these fundamental values. This includes safeguarding information processing, in particular IT.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed2e657 elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet elementor-widget elementor-widget-toggle\" data-id=\"ed2e657\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h6 id=\"elementor-tab-title-2481\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2481\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-chevron-down\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-chevron-up\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What is an Information Security Management System?<\/a>\n\t\t\t\t\t<\/h6>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2481\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2481\"><p>The level of automation in IT is growing rapidly. Companies are becoming increasingly networked and the world of work is becoming more digital. Attacks from the internet have recently become more frequent. Today&#8217;s standards include the sustainable and effective handling of internal and external data and information.   <\/p>\n<p>These must be protected from unauthorized access in order to prevent economic damage and protect valuable information from manipulation and unauthorized access. Information Security encompasses not only digital data, networks and computers, but also the entire network security, computer security and data protection. <\/p>\n<p>Whether hacker attacks, unauthorized decryption of data, espionage, sabotage, vandalism or forces of nature &#8211; each of these aspects requires a well thought-out and comprehensive concept.<\/p>\n<p>There are many building blocks in a <strong>vital Information Security Management System (ISMS)<\/strong>: guidelines and security concepts must be defined or updated. Risks must be continuously reassessed, measures defined and their implementation monitored. Audit plans must be created, prepared, carried out and followed up. Potential for improvement must be continuously identified and realized.   <\/p>\n<p>The task of the ISMS is to adequately protect the fundamental values of <strong>confidentiality, integrity<\/strong> and <strong>availability<\/strong> of information. The definition of Information Security refers to the safeguarding of these fundamental values. This includes safeguarding information processing, in particular IT.  <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f26b006 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"f26b006\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#gform_wrapper_1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get individual advice now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-002ea94 e-flex e-con-boxed e-con e-parent\" data-id=\"002ea94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c99d29 elementor-widget elementor-widget-heading\" data-id=\"0c99d29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why is an ISMS essential?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-468afc2 elementor-widget elementor-widget-text-editor\" data-id=\"468afc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While Data Protection focuses on the protection of personal data, Information Security encompasses all aspects of Information Security &#8211; both digital and physical. Therefore, an ISMS is crucial to cover all dimensions of Information Security. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ecbaeef e-con-full e-flex e-con e-child\" data-id=\"ecbaeef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d948d2b elementor-flip-box--direction-right elementor-widget-mobile__width-initial elementor-widget__width-initial elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"d948d2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"38\" height=\"38\" viewbox=\"0 0 38 38\" fill=\"none\"><rect width=\"38\" height=\"38\" transform=\"matrix(1.19249e-08 -1 -1 -1.19249e-08 38 38)\" fill=\"url(#pattern0_5254_472)\"><\/rect><defs><pattern id=\"pattern0_5254_472\" patterncontentunits=\"objectBoundingBox\" width=\"1\" height=\"1\"><use xlink:href=\"#image0_5254_472\" transform=\"scale(0.01)\"><\/use><\/pattern><image id=\"image0_5254_472\" width=\"100\" height=\"100\" xlink:href=\"data:image\/png;base64,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\"><\/image><\/defs><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tConfidentiality\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tInformation must be treated confidentially. Only authorized users may read, process, change and access information. \t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70a561b elementor-flip-box--direction-right elementor-widget-mobile__width-initial elementor-widget__width-initial elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"70a561b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"38\" height=\"38\" viewbox=\"0 0 38 38\" fill=\"none\"><rect width=\"38\" height=\"38\" transform=\"matrix(1.19249e-08 -1 -1 -1.19249e-08 38 38)\" fill=\"url(#pattern0_5254_472)\"><\/rect><defs><pattern id=\"pattern0_5254_472\" patterncontentunits=\"objectBoundingBox\" width=\"1\" height=\"1\"><use xlink:href=\"#image0_5254_472\" transform=\"scale(0.01)\"><\/use><\/pattern><image id=\"image0_5254_472\" width=\"100\" height=\"100\" xlink:href=\"data:image\/png;base64,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\"><\/image><\/defs><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tAvailability\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tInformation must not be lost and must be accessible to authorized persons at all times. The availability of data ensures stable and reliable access to information and prevents system failures. \t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ba9d30 elementor-flip-box--direction-right elementor-widget-mobile__width-initial elementor-widget__width-initial elementor-flip-box--effect-flip elementor-widget elementor-widget-flip-box\" data-id=\"7ba9d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"flip-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-flip-box\" tabindex=\"0\">\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__front\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper elementor-view-default\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"38\" height=\"38\" viewbox=\"0 0 38 38\" fill=\"none\"><rect width=\"38\" height=\"38\" transform=\"matrix(1.19249e-08 -1 -1 -1.19249e-08 38 38)\" fill=\"url(#pattern0_5254_472)\"><\/rect><defs><pattern id=\"pattern0_5254_472\" patterncontentunits=\"objectBoundingBox\" width=\"1\" height=\"1\"><use xlink:href=\"#image0_5254_472\" transform=\"scale(0.01)\"><\/use><\/pattern><image id=\"image0_5254_472\" width=\"100\" height=\"100\" xlink:href=\"data:image\/png;base64,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\"><\/image><\/defs><\/svg>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-flip-box__layer__title\">\n\t\t\t\t\t\t\t\tIntegrity\t\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"elementor-flip-box__layer elementor-flip-box__back\">\n\t\t\t<div class=\"elementor-flip-box__layer__overlay\">\n\t\t\t\t<div class=\"elementor-flip-box__layer__inner\">\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-flip-box__layer__description\">\n\t\t\t\t\t\t\tIntegrity means that information must not be changed unnoticed. This can be compromised, for example, if hackers infiltrate systems and illegally manipulate data or if insufficiently tested software is rolled out that unintentionally changes data. \t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a3d6e1 elementor-mobile-align-left elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8a3d6e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#gform_wrapper_1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Take advantage now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b51476 e-flex e-con-boxed e-con e-parent\" data-id=\"1b51476\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee02d12 elementor-widget elementor-widget-heading\" data-id=\"ee02d12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span style=\"color: #CDD900\">handz.on:<\/span> Your partner for Information Security Management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2740971 elementor-widget elementor-widget-text-editor\" data-id=\"2740971\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether you want to introduce an ISMS from scratch, optimize existing systems as part of a continuous improvement process, prepare for audits or carry them out &#8211; we are there for you. We support you in optimizing your risk management and in planning and implementing technical and organizational measures. We are not just consultants, but above all doers. Just <strong><span style=\"color: #cdd900;\">handz.on<\/span> .<\/strong>  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa0eb31 e-con-full e-flex e-con e-child\" data-id=\"aa0eb31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-665907b e-con-full e-flex e-con e-child\" data-id=\"665907b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15d299c e-con-full e-flex e-con e-child\" data-id=\"15d299c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5acddd3 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"5acddd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCertified consultants and auditors\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe open up new perspectives on all topics\nrelating to the security of your information with an unbiased view.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4fb448 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"a4fb448\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tHolistic and practicable\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe support and advise you in integrating a holistic Information Security Management System (ISMS) into your daily work in a practicable manner.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8275c2 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"e8275c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tInternal Data Protection audits\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe work with you to prepare and conduct internal and external audits.\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80b34ab elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"80b34ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#gform_wrapper_1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get advice now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f3f3a67 e-flex e-con-boxed e-con e-parent\" data-id=\"f3f3a67\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-753e62e e-con-full e-flex e-con e-child\" data-id=\"753e62e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e4da44c e-con-full e-flex e-con e-child\" data-id=\"e4da44c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c6932aa elementor-widget elementor-widget-heading\" data-id=\"c6932aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The benefits of an effective ISMS for your company<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e6f42b e-grid e-con-full e-con e-child\" data-id=\"7e6f42b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8845f86 elementor-position-inline-start elementor-tablet-position-block-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"8845f86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPrevent potential hazards\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tBy recognizing potential threats, you protect your most important asset: your company's information and data.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a634f4a elementor-position-inline-start elementor-tablet-position-block-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"a634f4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCreating trust and customer loyalty\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tBy handling data and information securely, you create trust, which strengthens cooperation and customer loyalty in the long term and secures your sales.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29a0c80 elementor-position-inline-start elementor-tablet-position-block-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"29a0c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAvoid unforeseen expenses\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWith a functioning ISMS, you can proactively prevent costly security incidents, data loss and the associated financial and reputational damage.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-090d1f0 elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"090d1f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#gform_wrapper_1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Use advantages<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d2bbf76 e-flex e-con-boxed e-con e-parent\" data-id=\"3d2bbf76\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f96d2ee e-con-full e-flex e-con e-child\" data-id=\"7f96d2ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b981b68 elementor-widget__width-initial elementor-widget-laptop__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3b981b68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Current standards for Information Security - the most important information at a glance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-416dfc42 elementor-widget elementor-widget-text-editor\" data-id=\"416dfc42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An <strong>Information Security Management System <\/strong>or <strong>Information Security Management System (ISMS)<\/strong> comprises a list of roles, responsibilities, regulations and procedural requirements aimed at structuring, permanently defining, controlling, monitoring and continuously improving Information Security. The international standard <strong>ISO\/IEC 27001<\/strong> specifies the requirements for the establishment, implementation, improvement and maintenance of the<strong> Information Security Management System.<\/strong> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14e70960 e-con-full e-flex e-con e-child\" data-id=\"14e70960\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2adc9234 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"2adc9234\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><p>Our <span style=\"color: #CDD900\">handz.on\n<\/span>services in the area of ISMS:<\/p>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39af4796 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"39af4796\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAdvice and support with the implementation of an efficient and practicable ISMS\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3319ae1e elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"3319ae1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOrientation towards national (IT baseline protection) and international (ISO 27001) standards\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-377d2840 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"377d2840\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDevelopment of architectures and solutions to achieve your information protection goals on a daily basis\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4a4bb6 elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"e4a4bb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#gform_wrapper_1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d1bee6d e-flex e-con-boxed e-con e-parent\" data-id=\"d1bee6d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3960593 e-con-full e-flex e-con e-child\" data-id=\"3960593\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e97687 e-con-full e-flex e-con e-child\" data-id=\"8e97687\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cde8671 elementor-widget elementor-widget-text-editor\" data-id=\"cde8671\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With our <strong>ISO 27001 certification<\/strong> for Information Security Management, we offer you an internationally recognized standard for the implementation of an <strong>ISMS<\/strong>.<\/p><p>Our team of Information Security experts ensures that all requirements are met and that your Information Security is continuously improved.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-517df42 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"517df42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ISO 27001<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8805973 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"8805973\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tFormulates requirements for an Information Security Management System\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1277c5c elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"1277c5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tProvides guidelines for the assessment and treatment of safety risks\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff04943 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"ff04943\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tConsiders Information Security in the context of the organization and encourages management to take internal and external factors into account\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74d0744 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"74d0744\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tConsiders conformity with laws and regulations\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9654bac elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"9654bac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDefines specific management activities, such as evaluating Information Security Management based on KPIs to be defined\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84ffbc0 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"84ffbc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIs intended for use by internal and external auditors to determine implementation\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25a73bd elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"25a73bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#gform_wrapper_1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6fbc440 e-flex e-con-boxed e-con e-parent\" data-id=\"6fbc440\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-08a5e28 e-con-full e-flex e-con e-child\" data-id=\"08a5e28\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a08537 elementor-widget elementor-widget-heading\" data-id=\"0a08537\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our <span style=\"color: #CDD900\">handz.on<\/span> service - strategy, processes, solutions from a single source\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8501932 elementor-widget elementor-widget-text-editor\" data-id=\"8501932\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our <strong>Information Security <\/strong>experts offer comprehensive support. We help you select and implement the best strategies and tools to ensure your <strong>Information Security<\/strong>. This includes Information Security audits, conducting risk analyses and introducing improvement measures based on the results.  <\/p><p>Regardless of whether you need a completely new<strong> Information Security Management System <\/strong>(ISMS) or are looking for selective ISMS optimizations as part of the continuous improvement process &#8211; we are at your side as experts in the field of<strong> Information Security Management<\/strong>. Contact us to optimize your <strong>Information Security Strategy<\/strong> and protect your data. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3533ecf e-flex e-con-boxed e-con e-parent\" data-id=\"3533ecf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9927746 e-con-full e-flex e-con e-child\" data-id=\"9927746\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd26422 elementor-widget elementor-widget-heading\" data-id=\"bd26422\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Exclusive white paper: <br>6 steps to ISO 27001 certification<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccfc17d elementor-widget elementor-widget-spacer\" data-id=\"ccfc17d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb015b9 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"bb015b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/on.de\/wp-content\/uploads\/2024\/12\/230531-handz.on_Whitepaper_ISO-Zertifizierung-1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9e9eba e-flex e-con-boxed e-con e-parent\" data-id=\"c9e9eba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09d0111 elementor-widget elementor-widget-heading\" data-id=\"09d0111\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our certificates:\n\n<br> Proven expertise for your projects<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1bfec82 e-grid e-con-full e-con e-child\" data-id=\"1bfec82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0c8d4a3 e-con-full e-flex e-con e-child\" data-id=\"0c8d4a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10d5bc0 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"10d5bc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1023\" src=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png\" class=\"attachment-full size-full wp-image-14489\" alt=\"\" srcset=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png 1024w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-300x300.png 300w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-150x150.png 150w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-768x767.png 768w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-12x12.png 12w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-400x400.png 400w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-600x600.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-471266b elementor-widget elementor-widget-text-editor\" data-id=\"471266b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>EXIN Information Security Foundation<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6330846 e-con-full e-flex e-con e-child\" data-id=\"6330846\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17463e6 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"17463e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1023\" src=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png\" class=\"attachment-full size-full wp-image-14489\" alt=\"\" srcset=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png 1024w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-300x300.png 300w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-150x150.png 150w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-768x767.png 768w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-12x12.png 12w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-400x400.png 400w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-600x600.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-751bb00 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"751bb00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>EN ISO 22301 &#8211; <br>Business Continuity Management<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7957623 e-con-full e-flex e-con e-child\" data-id=\"7957623\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e2cd62 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"1e2cd62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"799\" src=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png\" class=\"attachment-large size-large wp-image-14489\" alt=\"\" srcset=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png 1024w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-300x300.png 300w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-150x150.png 150w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-768x767.png 768w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-12x12.png 12w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-400x400.png 400w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-600x600.png 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6605680 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"6605680\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>EN ISO 27001 Lead Implementer<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4322487 e-grid e-con-full e-con e-child\" data-id=\"4322487\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d56aa3e e-con-full e-flex e-con e-child\" data-id=\"d56aa3e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be6cce5 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"be6cce5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"799\" src=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png\" class=\"attachment-large size-large wp-image-14489\" alt=\"\" srcset=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png 1024w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-300x300.png 300w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-150x150.png 150w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-768x767.png 768w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-12x12.png 12w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-400x400.png 400w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-600x600.png 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecdff90 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"ecdff90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ISO 27001 Foundation<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-968ae18 e-con-full e-flex e-con e-child\" data-id=\"968ae18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ebc1c52 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"ebc1c52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1023\" src=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png\" class=\"attachment-full size-full wp-image-14489\" alt=\"\" srcset=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png 1024w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-300x300.png 300w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-150x150.png 150w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-768x767.png 768w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-12x12.png 12w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-400x400.png 400w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-600x600.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ef4708 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3ef4708\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ISO 27001 Practitioner<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5fe9487 e-con-full e-flex e-con e-child\" data-id=\"5fe9487\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5df9087 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5df9087\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"799\" src=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png\" class=\"attachment-large size-large wp-image-14489\" alt=\"\" srcset=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat.png 1024w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-300x300.png 300w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-150x150.png 150w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-768x767.png 768w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-12x12.png 12w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-400x400.png 400w, https:\/\/on.de\/wp-content\/uploads\/2025\/02\/zertifikat-600x600.png 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c77150 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1c77150\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>BSI &#8211; IT Basic Protection Practitioner<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f9a2d8c e-flex e-con-boxed e-con e-parent\" data-id=\"3f9a2d8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2231bdab elementor-widget elementor-widget-heading\" data-id=\"2231bdab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">BSI IT baseline protection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b54da32 e-con-full e-flex e-con e-child\" data-id=\"6b54da32\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-36cb237 e-con-full e-flex e-con e-child\" data-id=\"36cb237\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1257d289 e-con-full e-flex e-con e-child\" data-id=\"1257d289\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5cf912d elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"5cf912d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAims to achieve an appropriate level of protection for IT systems\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93291ba elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"93291ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tRecommends technical security measures as well as infrastructural, organizational and personnel protection measures\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f18925 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"4f18925\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDispenses with a detailed risk analysis\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eaefc3e elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"eaefc3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDefines three categories of protection needs and assigns specific measures to them\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cf6fb9 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"2cf6fb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tA combination with ISO 27001 is possible (ISO 27001 based on IT baseline protection)\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3924c0 elementor-mobile-align-left elementor-widget elementor-widget-button\" data-id=\"c3924c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#gform_wrapper_1\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Carry out a security check now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Protect your data with our consulting for Information Security Fewer risks and more control through efficient management of your Information Security Discover the advantages now Protect your data with our consulting for Information Security Fewer risks and more control through efficient management of your Information Security Discover the advantages now Trustworthy In a world where [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-14704","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Security: Protect your data with experts<\/title>\n<meta name=\"description\" content=\"Information Security experts offer comprehensive support for your ISMS. Strategies and tools to protect your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/en\/https:\/\/on.de\/en\/information-security\/\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security: Protect your data with experts\" \/>\n<meta property=\"og:description\" content=\"Information Security experts offer comprehensive support for your ISMS. Strategies and tools to protect your data.\" \/>\n<meta property=\"og:url\" content=\"\/en\/https:\/\/on.de\/en\/information-security\/\/\" \/>\n<meta property=\"og:site_name\" content=\"on.de\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-09T19:52:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1023\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/information-security\\\/\",\"url\":\"https:\\\/\\\/on.de\\\/en\\\/information-security\\\/\",\"name\":\"IT Security: Protect your data with experts\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/information-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/on.de\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/verlasslich.png\",\"datePublished\":\"2024-11-28T12:04:19+00:00\",\"dateModified\":\"2025-04-09T19:52:59+00:00\",\"description\":\"Information Security experts offer comprehensive support for your ISMS. Strategies and tools to protect your data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/on.de\\\/en\\\/information-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/information-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/on.de\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/verlasslich.png\",\"contentUrl\":\"https:\\\/\\\/on.de\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/verlasslich.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/on.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/on.de\\\/en\\\/\",\"name\":\"on.de\",\"description\":\"Professionelles IT-Consulting und ma\u00dfgeschneiderte Software-L\u00f6sungen f\u00fcr Ihren Unternehmenserfolg\",\"publisher\":{\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/on.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/#organization\",\"name\":\"on.de\",\"url\":\"https:\\\/\\\/on.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/on.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/handz.on_Logo-RGB_whitelime.svg\",\"contentUrl\":\"https:\\\/\\\/on.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/handz.on_Logo-RGB_whitelime.svg\",\"caption\":\"on.de\"},\"image\":{\"@id\":\"https:\\\/\\\/on.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security: Protect your data with experts","description":"Information Security experts offer comprehensive support for your ISMS. Strategies and tools to protect your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/en\/https:\/\/on.de\/en\/information-security\/\/","og_locale":"en_US","og_type":"article","og_title":"IT Security: Protect your data with experts","og_description":"Information Security experts offer comprehensive support for your ISMS. Strategies and tools to protect your data.","og_url":"\/en\/https:\/\/on.de\/en\/information-security\/\/","og_site_name":"on.de","article_modified_time":"2025-04-09T19:52:59+00:00","og_image":[{"width":1023,"height":1024,"url":"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/on.de\/en\/information-security\/","url":"https:\/\/on.de\/en\/information-security\/","name":"IT Security: Protect your data with experts","isPartOf":{"@id":"https:\/\/on.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/on.de\/en\/information-security\/#primaryimage"},"image":{"@id":"https:\/\/on.de\/en\/information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich.png","datePublished":"2024-11-28T12:04:19+00:00","dateModified":"2025-04-09T19:52:59+00:00","description":"Information Security experts offer comprehensive support for your ISMS. Strategies and tools to protect your data.","breadcrumb":{"@id":"https:\/\/on.de\/en\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/on.de\/en\/information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/on.de\/en\/information-security\/#primaryimage","url":"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich.png","contentUrl":"https:\/\/on.de\/wp-content\/uploads\/2025\/02\/verlasslich.png"},{"@type":"BreadcrumbList","@id":"https:\/\/on.de\/en\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/on.de\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security"}]},{"@type":"WebSite","@id":"https:\/\/on.de\/en\/#website","url":"https:\/\/on.de\/en\/","name":"on.de","description":"Professional IT Consulting and custom software solutions for your success","publisher":{"@id":"https:\/\/on.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/on.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/on.de\/en\/#organization","name":"on.de","url":"https:\/\/on.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/on.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/on.de\/wp-content\/uploads\/2024\/08\/handz.on_Logo-RGB_whitelime.svg","contentUrl":"https:\/\/on.de\/wp-content\/uploads\/2024\/08\/handz.on_Logo-RGB_whitelime.svg","caption":"on.de"},"image":{"@id":"https:\/\/on.de\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/on.de\/en\/wp-json\/wp\/v2\/pages\/14704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/on.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/on.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/on.de\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/on.de\/en\/wp-json\/wp\/v2\/comments?post=14704"}],"version-history":[{"count":0,"href":"https:\/\/on.de\/en\/wp-json\/wp\/v2\/pages\/14704\/revisions"}],"wp:attachment":[{"href":"https:\/\/on.de\/en\/wp-json\/wp\/v2\/media?parent=14704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}