{"id":677,"date":"2019-06-24T12:17:54","date_gmt":"2019-06-24T10:17:54","guid":{"rendered":"https:\/\/www.bho-consulting.com\/was\/it-security\/"},"modified":"2022-11-24T17:16:33","modified_gmt":"2022-11-24T16:16:33","slug":"it-security","status":"publish","type":"page","link":"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/","title":{"rendered":"IT-Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221; css=&#8221;.vc_custom_1570786116640{padding-top: 10em !important;padding-bottom: 10em !important;background-image: url(https:\/\/www.bho-consulting.com\/wp-content\/uploads\/2019\/10\/bho_consulting_it-sicherheit_300.png?id=438) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;tile-3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221;][vc_column][vc_empty_space height=&#8221;3em&#8221;][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1568716495393{margin-bottom: 0px !important;}&#8221;]\n<h1 style=\"text-align: left;\">IT-Security<\/h1>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1669305421073{margin-bottom: 0px !important;}&#8221;]Effective and sustainable data protection consulting does not stop where process recommendations have been developed. Both data protection and compliance in many other legally regulated areas require implementation in the IT landscape of your company. Of course, BHO Consulting GmbH also supports you and your employees in the technical implementation of IT security requirements in your company.<\/p>\n<p>The constantly growing influence of IT on all business processes requires appropriate measures for maintaining adequate IT security in your company. Through our comprehensive advice and cooperation between consultants with legal and technical backgrounds, we are able to conduct IT security audits and support your company all the way to the concrete implementation of a comprehensive IT security concept.<\/p>\n<p>On the one hand, this enables you to implement data protection requirements, but also, for example, to protect your most important assets, namely your trade secrets. This is because the German Trade Secrets Act (\u201eGesch\u00e4ftsgeheimnisgesetz, GeschGehG\u201c), which recently came into force, means that trade secrets are only protected against unauthorised access if you are technically and organisationally protected against unauthorised access and this protection is documented.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1669305609749{margin-bottom: 0px !important;}&#8221;]<strong>In IT security consulting, we provide the following services for you, among others:<\/strong><\/p>\n<ul>\n<li>Auditing of IT security measures in the company<\/li>\n<li>Development of action plans and recommendations for improvements<\/li>\n<li>Support in setting up an ISMS (Information Security Management System) up to and including certification according to ISO27001.<\/li>\n<li>Development of technical-organisational measures in accordance with Art. 32 GDPR, such as security guidelines for WLAN, regulations for the use of mobile devices, procedures in the event of suspected viruses in the company, access and entry systems for critical areas or physical security for data centres or server rooms.<\/li>\n<li>Process documentation and protection needs classification for the Trade Secrets Act<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1669306590709{margin-bottom: 0px !important;}&#8221;]<strong>Further consulting activities in our consulting environment<\/strong><\/p>\n<p><a href=\"https:\/\/www.bho-consulting.com\/en\/was\/representatives-in-the-eu\/\">&#8211; Appointment as representative according to article 27 GDPR for companies outside the EU<\/a><\/p>\n<p><a href=\"https:\/\/www.bho-consulting.com\/en\/was\/data-protection-management\/\">&#8211; Data Protection Management<\/a><\/p>\n<p><a href=\"https:\/\/www.bho-consulting.com\/en\/was\/external-data-protection-officer\/\">&#8211; external Data Protection Officer<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221; css=&#8221;.vc_custom_1570786116640{padding-top: 10em !important;padding-bottom: 10em !important;background-image: url(https:\/\/www.bho-consulting.com\/wp-content\/uploads\/2019\/10\/bho_consulting_it-sicherheit_300.png?id=438) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;tile-3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221;][vc_column][vc_empty_space height=&#8221;3em&#8221;][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1568716495393{margin-bottom: 0px !important;}&#8221;] IT-Security [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1669305421073{margin-bottom: 0px !important;}&#8221;]Effective and sustainable data protection consulting does not stop where process recommendations have been developed. Both data protection and compliance in many other legally regulated areas require implementation [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":672,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-677","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Security &#8211; BHO Consulting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Security &#8211; BHO Consulting\" \/>\n<meta property=\"og:description\" content=\"[vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221; css=&#8221;.vc_custom_1570786116640{padding-top: 10em !important;padding-bottom: 10em !important;background-image: url(https:\/\/www.bho-consulting.com\/wp-content\/uploads\/2019\/10\/bho_consulting_it-sicherheit_300.png?id=438) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;tile-3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221;][vc_column][vc_empty_space height=&#8221;3em&#8221;][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1568716495393{margin-bottom: 0px !important;}&#8221;] IT-Security [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1669305421073{margin-bottom: 0px !important;}&#8221;]Effective and sustainable data protection consulting does not stop where process recommendations have been developed. Both data protection and compliance in many other legally regulated areas require implementation [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"BHO Consulting\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-24T16:16:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/\",\"url\":\"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/\",\"name\":\"IT-Security &#8211; BHO Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/www.bho-consulting.com\/#website\"},\"datePublished\":\"2019-06-24T10:17:54+00:00\",\"dateModified\":\"2022-11-24T16:16:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.bho-consulting.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\",\"item\":\"https:\/\/www.bho-consulting.com\/en\/was\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bho-consulting.com\/#website\",\"url\":\"https:\/\/www.bho-consulting.com\/\",\"name\":\"BHO Consulting\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.bho-consulting.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bho-consulting.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bho-consulting.com\/#organization\",\"name\":\"BHO Consulting\",\"url\":\"https:\/\/www.bho-consulting.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bho-consulting.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bho-consulting.com\/wp-content\/uploads\/2019\/06\/bho-consulting-logo.png\",\"contentUrl\":\"https:\/\/bho-consulting.com\/wp-content\/uploads\/2019\/06\/bho-consulting-logo.png\",\"width\":288,\"height\":288,\"caption\":\"BHO Consulting\"},\"image\":{\"@id\":\"https:\/\/www.bho-consulting.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT-Security &#8211; BHO Consulting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/","og_locale":"en_US","og_type":"article","og_title":"IT-Security &#8211; BHO Consulting","og_description":"[vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221; css=&#8221;.vc_custom_1570786116640{padding-top: 10em !important;padding-bottom: 10em !important;background-image: url(https:\/\/www.bho-consulting.com\/wp-content\/uploads\/2019\/10\/bho_consulting_it-sicherheit_300.png?id=438) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;tile-3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row fullwidth=&#8221;true&#8221; fullwidth_content=&#8221;false&#8221;][vc_column][vc_empty_space height=&#8221;3em&#8221;][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1568716495393{margin-bottom: 0px !important;}&#8221;] IT-Security [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;.vc_custom_1669305421073{margin-bottom: 0px !important;}&#8221;]Effective and sustainable data protection consulting does not stop where process recommendations have been developed. Both data protection and compliance in many other legally regulated areas require implementation [&hellip;]","og_url":"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/","og_site_name":"BHO Consulting","article_modified_time":"2022-11-24T16:16:33+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/","url":"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/","name":"IT-Security &#8211; BHO Consulting","isPartOf":{"@id":"https:\/\/www.bho-consulting.com\/#website"},"datePublished":"2019-06-24T10:17:54+00:00","dateModified":"2022-11-24T16:16:33+00:00","breadcrumb":{"@id":"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bho-consulting.com\/en\/was\/it-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.bho-consulting.com\/en\/was\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.bho-consulting.com\/en\/"},{"@type":"ListItem","position":2,"name":"What","item":"https:\/\/www.bho-consulting.com\/en\/was\/"},{"@type":"ListItem","position":3,"name":"IT-Security"}]},{"@type":"WebSite","@id":"https:\/\/www.bho-consulting.com\/#website","url":"https:\/\/www.bho-consulting.com\/","name":"BHO Consulting","description":"","publisher":{"@id":"https:\/\/www.bho-consulting.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bho-consulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bho-consulting.com\/#organization","name":"BHO Consulting","url":"https:\/\/www.bho-consulting.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bho-consulting.com\/#\/schema\/logo\/image\/","url":"https:\/\/bho-consulting.com\/wp-content\/uploads\/2019\/06\/bho-consulting-logo.png","contentUrl":"https:\/\/bho-consulting.com\/wp-content\/uploads\/2019\/06\/bho-consulting-logo.png","width":288,"height":288,"caption":"BHO Consulting"},"image":{"@id":"https:\/\/www.bho-consulting.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.bho-consulting.com\/en\/wp-json\/wp\/v2\/pages\/677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bho-consulting.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bho-consulting.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bho-consulting.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bho-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=677"}],"version-history":[{"count":5,"href":"https:\/\/www.bho-consulting.com\/en\/wp-json\/wp\/v2\/pages\/677\/revisions"}],"predecessor-version":[{"id":1220,"href":"https:\/\/www.bho-consulting.com\/en\/wp-json\/wp\/v2\/pages\/677\/revisions\/1220"}],"up":[{"embeddable":true,"href":"https:\/\/www.bho-consulting.com\/en\/wp-json\/wp\/v2\/pages\/672"}],"wp:attachment":[{"href":"https:\/\/www.bho-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}