{"id":12757,"date":"2025-03-24T14:33:19","date_gmt":"2025-03-24T13:33:19","guid":{"rendered":"https:\/\/astran.de\/it-security-consulting\/"},"modified":"2026-04-22T15:30:42","modified_gmt":"2026-04-22T13:30:42","slug":"it-security-consulting","status":"publish","type":"page","link":"https:\/\/astran.de\/en\/it-security-consulting\/","title":{"rendered":"IT security consulting"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row tlg_padding=&#8221;pb0&#8243;][vc_column]<div class=\"headings-title \"><div class=\"mb70 mb-xs-40 text-center\"><h1  class=\"widgettitle\">IT Security Consulting<\/h1><div class=\"divider-wrap\"><div class=\"tlg-divider \" style=\"\"><\/div><\/div><div  class=\"widgetsubtitle\">Cybersecurity doesn't have to be complicated<\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row tlg_background_style=&#8221;bg-secondary&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5  class=\"widgettitle\">How threatened is Germany's cyberspace?<\/h5><div class=\"divider-wrap\"><div class=\"tlg-divider \" style=\"\"><\/div><\/div><\/div><\/div>[vc_column_text css=&#8221;&#8221;]<\/p>\n<p data-sourcepos=\"3:1-3:502\">The IT security situation in Germany is very tense. Cyberattacks cause massive damage, costing German companies alone \u20ac179 billion, and reports to the BSI rose by 33% (726 reports). Ransomware is the biggest threat, with ransom payments rising sharply and global revenues of US$1.1 billion in 2023. SMEs and local authorities are particularly affected, with 72 local authorities and 1.7 million residents affected by successful attacks on IT service providers. The CrowdStrike incident (July 19, 2024) caused $5.4 billion in damage, solely due to a faulty update. (As of 2024)<\/p>\n<p data-sourcepos=\"7:1-7:325\">The attack surface is broad: many Exchange servers and Android devices are vulnerable, and vulnerabilities are constantly increasing. <strong>Around 21,000 infected systems are reported every day.<\/strong> The top threats to society, the economy, and the state include identity theft, ransomware, and vulnerabilities in online servers.<\/p>\n<p data-sourcepos=\"9:1-9:110\">These developments underscore the urgent need for comprehensive and adaptive security measures.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row tlg_vertical_align=&#8221;yes&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;12699&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221; css_animation=&#8221;appear&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p data-start=\"138\" data-end=\"449\">Many small and micro enterprises (SMEs) want to improve their IT security but don&#8217;t know where to start. Existing standards such as the BSI&#8217;s IT Baseline Protection Compendium or the ISO\/IEC 27001 standard are often too complex and resource-intensive for companies with fewer than 50 employees.<\/p>\n<p data-start=\"451\" data-end=\"702\">With the new DIN SPEC 27076 consulting standard, companies with up to 50 employees can work with an IT security service provider to assess their IT security, identify vulnerabilities, and secure their business in a cost-effective manner.<\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<\/p>\n<p data-start=\"138\" data-end=\"449\">As a qualified IT service provider for the <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Informationen-und-Empfehlungen\/KMU\/CyberRisikoCheck\/CyberRisikoCheck_node.html\" target=\"_blank\" rel=\"noopener\">German Federal Office for Information Security (BSI)<\/a>, we at ASTRAN are authorized to perform the CyberRiskCheck in accordance with DIN SPEC 27076.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row tlg_background_style=&#8221;bg-primary&#8221; tlg_padding=&#8221;pb0&#8243;][vc_column]<div class=\"headings-title \"><div class=\"mb70 mb-xs-40 text-center\"><h1 style=\"color:#FFFFFF!important;text-transform: none!important;\" class=\"widgettitle\">Everyone is attacked, there are no exceptions!<\/h1><div style=\"color:#FFFFFF!important;font-size:20px;line-height:25px;text-transform: none!important;\" class=\"widgetsubtitle\">IT security is a matter for top management!<\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row tlg_padding=&#8221;pb0&#8243;][vc_column]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5 style=\"font-size:50px;line-height:60px;text-transform: uppercase!important;\" class=\"widgettitle\">NIS2 Consulting for Businesses<\/h5><div class=\"divider-wrap\"><div class=\"tlg-divider \" style=\"\"><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row tlg_padding=&#8221;pt0&#8243;][vc_column width=&#8221;1\/5&#8243;][\/vc_column][vc_column width=&#8221;4\/5&#8243;][vc_column_text css=&#8221;&#8221;]The NIS2 Directive significantly expands cybersecurity requirements in Europe and affects far more companies than the previous NIS regulation. For affected organizations, cybersecurity thus becomes a strategic management task\u2014with clear obligations in the areas of risk management, incident reporting, governance, and supply chain security.<\/p>\n<p>ASTRAN helps companies assess their exposure, identify necessary actions, and systematically integrate NIS2 requirements into their organization. In this way, regulatory pressure is transformed into a robust security and resilience strategy for practical implementation.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5 style=\"font-size:20px;line-height:30px;text-transform: uppercase!important;\" class=\"widgettitle\">NIS2 <cite><i>understand<\/i><\/cite>. Implement <cite><i>requirements<\/i><\/cite>. Strengthen <cite><i>resilience<\/i><\/cite>.<\/h5><\/div><\/div>[vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">With NIS2, the European Union is establishing a binding framework for a high common level of cybersecurity. The directive replaces the previous NIS Directive and significantly tightens the requirements for companies in critical and important sectors.<br \/>\nThe focus is not only on technical protective measures, but also on clear responsibilities, robust processes, and greater involvement of senior management. This is precisely where our NIS2 consulting services come in.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5 style=\"font-size:20px;line-height:30px;text-transform: uppercase!important;\" class=\"widgettitle\">Which companies are affected by NIS2?<\/h5><\/div><\/div>[vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">NIS2 significantly expands the scope of application and covers a total of 18 sectors, including energy, transportation, healthcare, digital infrastructure, public administration, space, postal services, food production, and waste management. Classification depends on the sector to which an entity belongs, the criticality of the services provided, and certain size criteria such as the number of employees or revenue.<br \/>\nCompanies must therefore assess at an early stage whether they are classified as essential or important entities. This classification significantly determines which requirements apply and the intensity of oversight and enforcement.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5 style=\"font-size:20px;line-height:30px;text-transform: uppercase!important;\" class=\"widgettitle\">Key requirements of the NIS2 Directive<\/h5><\/div><\/div>[vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">NIS2 requires companies to implement comprehensive cyber risk management. Risks must be systematically identified, assessed, and continuously monitored. This includes, among other things, access controls, encryption, security measures for networks and systems, backup and recovery strategies, incident response, business continuity, security policies, and employee training.<br \/>\nIn addition, harmonized reporting requirements apply to security incidents. These include an initial report within 24 hours, a detailed report within 72 hours, and a final report within one month. To meet these requirements, companies need clearly defined processes, responsibilities, and robust escalation procedures.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5 style=\"font-size:20px;line-height:30px;text-transform: uppercase!important;\" class=\"widgettitle\">NIS2 is <cite><i>a top priority<\/i><\/cite><\/h5><\/div><\/div>[vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">A key difference from previous regulatory approaches is that NIS2 explicitly embeds cybersecurity at the management level. Management bodies must approve security measures, monitor their implementation, and undergo regular training. This makes cybersecurity a governance responsibility with strategic relevance for the organization.<br \/>\nFor companies, this means that information security must not remain isolated within IT. It must be integrated into decision-making processes, responsibilities, and overall corporate management.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row tlg_padding=&#8221;pt0&#8243;][vc_column]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5 style=\"font-size:20px;line-height:30px;text-transform: uppercase!important;\" class=\"widgettitle\">Considering Supply Chain Security<\/h5><\/div><\/div>[vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">NIS2 focuses not only on individual companies but also on security throughout the supply chain. Organizations must take into account risks associated with service providers and suppliers and incorporate security requirements into their collaborations.<br \/>\nEven companies that are not directly subject to NIS2 may be indirectly affected. In practice, this often results in contractual obligations, audit requirements, and documentation requirements vis-\u00e0-vis customers and partners.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row tlg_background_style=&#8221;bg-secondary&#8221; tlg_padding=&#8221;pb0&#8243;][vc_column]<div class=\"headings-title \"><div class=\"mb16 mb-xs-40 text-left\"><h5  class=\"widgettitle\">What We Offer<\/h5><div class=\"divider-wrap\"><div class=\"tlg-divider \" style=\"\"><\/div><\/div><div style=\"color:#000000!important;\" class=\"widgetsubtitle\">Our Services in the Area of NIS2<\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row tlg_background_style=&#8221;bg-secondary&#8221; tlg_padding=&#8221;pt0 pb0&#8243;][vc_column width=&#8221;1\/3&#8243;]<div id=\"iconbox-6a007bdbb8c85\" class=\"   \"><div class=\"icon-link\"><div class=\"display-table mb-xs-24 text-left\">\n\t\t\t\t    \t\t<div class=\"display-cell vertical-top mb-xs-24\"><i style=\"font-size:32px!important;color:#FFB805;\" class=\"ti-home  inline-block mr-30 icon-text icon-lg\"><\/i><\/div>\n\t\t\t\t    \t\t<div class=\"display-cell\"><div  class=\"icon-content\"><\/p>\n<p class=\"my-2 [&+p]:mt-4 [&_strong:has(+br)]:inline-block [&_strong:has(+br)]:pb-2\">Assessing your exposure in terms of sector, company size, and regulatory classification.<\/p>\n<p>\n<\/div><\/div>\n\t\t\t\t    \t<\/div><\/div><\/div><script type=\"text\/javascript\">jQuery(document).ready(function(){jQuery('head').append('<style type=\"text\/css\" id=\"tlg-custom-css-iconbox-6a007bdbb8c85\">#iconbox-6a007bdbb8c85 .boxed-animate.boxed-scroll .title .widgettitle:after{background-color:#FFB805!important;}<\/style>');});<\/script>[\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div id=\"iconbox-6a007bdbb8dbb\" class=\"   \"><div class=\"icon-link\"><div class=\"display-table mb-xs-24 text-left\">\n\t\t\t\t    \t\t<div class=\"display-cell vertical-top mb-xs-24\"><i style=\"font-size:32px!important;color:#FFB805;\" class=\"ti-lock  inline-block mr-30 icon-text icon-lg\"><\/i><\/div>\n\t\t\t\t    \t\t<div class=\"display-cell\"><div  class=\"icon-content\"><\/p>\n<p class=\"my-2 [&+p]:mt-4 [&_strong:has(+br)]:inline-block [&_strong:has(+br)]:pb-2\">Analysis of your current security level as well as existing processes and responsibilities.<\/p>\n<p>\n<\/div><\/div>\n\t\t\t\t    \t<\/div><\/div><\/div><script type=\"text\/javascript\">jQuery(document).ready(function(){jQuery('head').append('<style type=\"text\/css\" id=\"tlg-custom-css-iconbox-6a007bdbb8dbb\">#iconbox-6a007bdbb8dbb .boxed-animate.boxed-scroll .title .widgettitle:after{background-color:#FFB805!important;}<\/style>');});<\/script>[\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div id=\"iconbox-6a007bdbb8e62\" class=\"   \"><div class=\"icon-link\"><div class=\"display-table mb-xs-24 text-left\">\n\t\t\t\t    \t\t<div class=\"display-cell vertical-top mb-xs-24\"><i style=\"font-size:32px!important;color:#FFB805;\" class=\"ti-unlink  inline-block mr-30 icon-text icon-lg\"><\/i><\/div>\n\t\t\t\t    \t\t<div class=\"display-cell\"><div  class=\"icon-content\"><\/p>\n<p class=\"my-2 [&+p]:mt-4 [&_strong:has(+br)]:inline-block [&_strong:has(+br)]:pb-2\">Identification of gaps in risk management, governance, and incident management.<\/p>\n<p>\n<\/div><\/div>\n\t\t\t\t    \t<\/div><\/div><\/div><script type=\"text\/javascript\">jQuery(document).ready(function(){jQuery('head').append('<style type=\"text\/css\" id=\"tlg-custom-css-iconbox-6a007bdbb8e62\">#iconbox-6a007bdbb8e62 .boxed-animate.boxed-scroll .title .widgettitle:after{background-color:#FFB805!important;}<\/style>');});<\/script>[\/vc_column][\/vc_row][vc_row tlg_background_style=&#8221;bg-secondary&#8221; tlg_padding=&#8221;pt0 pb0&#8243;][vc_column width=&#8221;1\/3&#8243;]<div id=\"iconbox-6a007bdbb8efc\" class=\"   \"><div class=\"icon-link\"><div class=\"display-table mb-xs-24 text-left\">\n\t\t\t\t    \t\t<div class=\"display-cell vertical-top mb-xs-24\"><i style=\"font-size:32px!important;color:#FFB805;\" class=\"ti-loop  inline-block mr-30 icon-text icon-lg\"><\/i><\/div>\n\t\t\t\t    \t\t<div class=\"display-cell\"><div  class=\"icon-content\"><\/p>\n<p class=\"my-2 [&+p]:mt-4 [&_strong:has(+br)]:inline-block [&_strong:has(+br)]:pb-2\">Support in establishing structured reporting, escalation, and response processes.<\/p>\n<p>\n<\/div><\/div>\n\t\t\t\t    \t<\/div><\/div><\/div><script type=\"text\/javascript\">jQuery(document).ready(function(){jQuery('head').append('<style type=\"text\/css\" id=\"tlg-custom-css-iconbox-6a007bdbb8efc\">#iconbox-6a007bdbb8efc .boxed-animate.boxed-scroll .title .widgettitle:after{background-color:#FFB805!important;}<\/style>');});<\/script>[\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div id=\"iconbox-6a007bdbb8f93\" class=\"   \"><div class=\"icon-link\"><div class=\"display-table mb-xs-24 text-left\">\n\t\t\t\t    \t\t<div class=\"display-cell vertical-top mb-xs-24\"><i style=\"font-size:32px!important;color:#FFB805;\" class=\"ti-medall-alt  inline-block mr-30 icon-text icon-lg\"><\/i><\/div>\n\t\t\t\t    \t\t<div class=\"display-cell\"><div  class=\"icon-content\"><\/p>\n<p class=\"my-2 [&+p]:mt-4 [&_strong:has(+br)]:inline-block [&_strong:has(+br)]:pb-2\">Consulting on integrating management, business units, and IT into an effective security model.<\/p>\n<p>\n<\/div><\/div>\n\t\t\t\t    \t<\/div><\/div><\/div><script type=\"text\/javascript\">jQuery(document).ready(function(){jQuery('head').append('<style type=\"text\/css\" id=\"tlg-custom-css-iconbox-6a007bdbb8f93\">#iconbox-6a007bdbb8f93 .boxed-animate.boxed-scroll .title .widgettitle:after{background-color:#FFB805!important;}<\/style>');});<\/script>[\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div id=\"iconbox-6a007bdbb9030\" class=\"   \"><div class=\"icon-link\"><div class=\"display-table mb-xs-24 text-left\">\n\t\t\t\t    \t\t<div class=\"display-cell vertical-top mb-xs-24\"><i style=\"font-size:32px!important;color:#FFB805;\" class=\"ti-truck  inline-block mr-30 icon-text icon-lg\"><\/i><\/div>\n\t\t\t\t    \t\t<div class=\"display-cell\"><div  class=\"icon-content\"><\/p>\n<p class=\"my-2 [&+p]:mt-4 [&_strong:has(+br)]:inline-block [&_strong:has(+br)]:pb-2\">Consideration of requirements for suppliers and service providers, as well as documentation requirements, throughout the value chain.<\/p>\n<p>\n<\/div><\/div>\n\t\t\t\t    \t<\/div><\/div><\/div><script type=\"text\/javascript\">jQuery(document).ready(function(){jQuery('head').append('<style type=\"text\/css\" id=\"tlg-custom-css-iconbox-6a007bdbb9030\">#iconbox-6a007bdbb9030 .boxed-animate.boxed-scroll .title .widgettitle:after{background-color:#FFB805!important;}<\/style>');});<\/script>[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5 style=\"font-size:20px;line-height:30px;text-transform: uppercase!important;\" class=\"widgettitle\">The Benefits for You<\/h5><\/div><\/div>[vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">With a structured NIS2 preparation process, you can gain clarity on your regulatory obligations and the specific areas where action is required. At the same time, you will strengthen your organizational resilience, improve your ability to respond to security incidents, and establish a solid foundation for sustainable information security.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5 style=\"font-size:20px;line-height:30px;text-transform: uppercase!important;\" class=\"widgettitle\">Check now <cite><i>NIS2 vulnerability<\/i><\/cite><\/h5><\/div><\/div>[vc_column_text css=&#8221;&#8221;]<\/p>\n<p class=\"my-2 [&amp;+p]:mt-4 [&amp;_strong:has(+br)]:inline-block [&amp;_strong:has(+br)]:pb-2\">Would you like to know whether and to what extent your company is affected by NIS2? We can help you assess, prioritize, and implement the relevant requirements.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row tlg_padding=&#8221;pt64 pb64&#8243; tlg_vertical_align=&#8221;yes&#8221; css=&#8221;.vc_custom_1693378345266{background-color: #ffb805 !important;}&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;3\/6&#8243;]<div class=\"headings-title \"><div class=\"mb0 mb-xs-40 text-left\"><h5 style=\"color:#ffffff!important;\" class=\"widgettitle\">Let's work together to improve your company's IT security! Contact us\u2014we will guide you competently.<\/h5><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/6&#8243;]<a style=\"color:#FFB805;background:#ffffff;border-color:transparent;\" id=\"btn-6a007bdbb91e6\" class=\"md-trigger btn btn-rounded   \" data-modal=\"modal-6a007bdbb91e7\" href=\"#\">Contact us NOW<\/a><div class=\"modal-button\"><div id=\"modal-6a007bdbb91e7\" class=\" md-modal md-modal-1 text-left\"><div class=\"md-content\"><div class=\"md-content-inner\"><div class=\"headings-title \"><div class=\"mb70 mb-xs-40 text-center\"><h5  class=\"widgettitle\">We look forward to hearing from you.<\/h5><\/div><\/div>\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f681-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"681\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/12757#wpcf7-f681-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"681\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f681-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"flat-input\">\n\t<div class=\"overflow-hidden\">\n\t\t<div class=\"half-column half-column-left\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t\t<div class=\"half-column half-column-right\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"overflow-hidden\">\n\t\t<div class=\"half-column half-column-left\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Unternehmen\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t\t<div class=\"half-column half-column-right\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Telefonnummer\" value=\"\" type=\"text\" name=\"your-phone\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Nachricht\" name=\"your-message\"><\/textarea><\/span>\n\t<\/p>\n\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-50\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-50\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">Ich akzeptiere die <a href=\"https:\/\/astran.de\/datenschutz\/\">Datenschutzbestimmungen<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"quiz-969\"><label><span class=\"wpcf7-quiz-label\">Die Hauptstadt von Deutschland?<\/span> <input size=\"40\" class=\"wpcf7-form-control wpcf7-quiz\" autocomplete=\"off\" aria-required=\"true\" aria-invalid=\"false\" type=\"text\" name=\"quiz-969\" \/><\/label><input type=\"hidden\" name=\"_wpcf7_quiz_answer_quiz-969\" value=\"39425a81ab97d771346a1fd51b2dfe87\" \/><\/span>\n\t<\/p>\n\t<p><button type=\"submit\" class=\"wpcf7-submit wpcf7-submit-custom btn btn-filled btn-new ti-arrow-right\">JETZT kennenlernen<\/button>\n\t<\/p>\n<\/div><p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"_wpcf7_ak_\"><label>&#916;<textarea name=\"_wpcf7_ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"_wpcf7_ak_js\" value=\"134\"\/><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\ndocument.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );\n\/* ]]> *\/\n<\/script>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div><\/div><div class=\"text-center\"><a class=\"md-close inline-block mt24\" href=\"#\"><i class=\"ti-close\"><\/i><\/a><\/div><\/div><div class=\"md-overlay\"><\/div><\/div><script type=\"text\/javascript\">jQuery(document).ready(function(){jQuery('head').append('<style type=\"text\/css\" id=\"tlg-custom-css-btn-6a007bdbb91e6\">#btn-6a007bdbb91e6:hover{color:#FFFFFF!important;background:#FFB805!important;border-color:#FFFFFF!important;}<\/style>');});<\/script>[\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"tlg-spacer  \" data-height=\"50\" data-height-tablet=\"50\" data-height-mobile=\"50\" style=\"clear:both;display:block;height:50px;\"><\/div><div class=\"headings-title \"><div class=\"mb70 mb-xs-40 text-center\"><h5  class=\"widgettitle\">Our references<\/h5><div class=\"divider-wrap\"><div class=\"tlg-divider \" style=\"\"><\/div><\/div><\/div><\/div><div class=\" logo-carousel\"><ul class=\"slides owl-carousel owl-theme\"><li>\r\n    <a href=\"https:\/\/www.wsp.com\/en-gl\/\" target=\"_blank\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"1781\" height=\"848\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2025\/04\/img-jpg-wsp-red.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/astran.de\/wp-content\/uploads\/2025\/04\/img-jpg-wsp-red.jpg 1781w, https:\/\/astran.de\/wp-content\/uploads\/2025\/04\/img-jpg-wsp-red-300x143.jpg 300w, https:\/\/astran.de\/wp-content\/uploads\/2025\/04\/img-jpg-wsp-red-1024x488.jpg 1024w, https:\/\/astran.de\/wp-content\/uploads\/2025\/04\/img-jpg-wsp-red-768x366.jpg 768w, https:\/\/astran.de\/wp-content\/uploads\/2025\/04\/img-jpg-wsp-red-1536x731.jpg 1536w\" sizes=\"auto, (max-width: 1781px) 100vw, 1781px\" \/><\/a><\/li><li>\r\n    <img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"87\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/11\/logo_vht-e1569311498592.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/11\/logo_vht-e1569311498592.png 600w, https:\/\/astran.de\/wp-content\/uploads\/2023\/11\/logo_vht-e1569311498592-300x44.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/li><li>\r\n    <a href=\"https:\/\/www.psitrans.de\/de\/home\/\" target=\"_blank\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"902\" height=\"323\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/PSI-Logo-e1686221385155.jpeg\" class=\"attachment-full size-full wp-post-image\" alt=\"PSI\" \/><\/a><\/li><li>\r\n    <a href=\"https:\/\/www.transnetbw.de\/de\" target=\"_blank\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"320\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/TransnetBW-Logo.png\" class=\"attachment-full size-full wp-post-image\" alt=\"TransnetBW\" srcset=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/TransnetBW-Logo.png 2560w, https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/TransnetBW-Logo-300x38.png 300w, https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/TransnetBW-Logo-1024x128.png 1024w, https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/TransnetBW-Logo-768x96.png 768w, https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/TransnetBW-Logo-1536x192.png 1536w, https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/TransnetBW-Logo-2048x256.png 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/li><li>\r\n    <a href=\"https:\/\/www.corys.com\/en\/\" target=\"_blank\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"126\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/CORYS-Logo.png\" class=\"attachment-full size-full wp-post-image\" alt=\"CORYS\" \/><\/a><\/li><li>\r\n    <img loading=\"lazy\" decoding=\"async\" width=\"545\" height=\"185\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/Zedas-Logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"Zedas\" srcset=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/Zedas-Logo.jpg 545w, https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/Zedas-Logo-300x102.jpg 300w\" sizes=\"auto, (max-width: 545px) 100vw, 545px\" \/><\/li><li>\r\n    <img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"150\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/RailComplete-Logo.png\" class=\"attachment-full size-full wp-post-image\" alt=\"RailComplete\" \/><\/li><li>\r\n    <img loading=\"lazy\" decoding=\"async\" width=\"320\" height=\"320\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/Zoellner-Logo-e1686221262652.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"Z\u00f6llner\" \/><\/li><li>\r\n    <a href=\"https:\/\/www.everii.io\/\" target=\"_blank\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"366\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/everii-Group-Logo-e1686221275377.png\" class=\"attachment-full size-full wp-post-image\" alt=\"everii Group\" \/><\/a><\/li><li>\r\n    <a href=\"https:\/\/neovendi.com\/\" target=\"_blank\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"944\" height=\"479\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/Neovendi-Logo-e1686221357287.png\" class=\"attachment-full size-full wp-post-image\" alt=\"Neovendi\" \/><\/a><\/li><li>\r\n    <a href=\"https:\/\/www.stromnetz-hamburg.de\/\" target=\"_blank\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"536\" height=\"198\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/StromnetzHH-Logo.png\" class=\"attachment-full size-full wp-post-image\" alt=\"StromnetzHH\" srcset=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/StromnetzHH-Logo.png 536w, https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/StromnetzHH-Logo-300x111.png 300w\" sizes=\"auto, (max-width: 536px) 100vw, 536px\" \/><\/a><\/li><li>\r\n    <a href=\"https:\/\/signon-group.com\/\" target=\"_blank\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"119\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/SIGNON-Logo.png\" class=\"attachment-full size-full wp-post-image\" alt=\"SIGNON\" srcset=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/SIGNON-Logo.png 425w, https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/SIGNON-Logo-300x84.png 300w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/><\/a><\/li><li>\r\n    <a href=\"http:\/\/www.transys.hu\/en\" target=\"_blank\" rel=\"\"><img loading=\"lazy\" decoding=\"async\" width=\"240\" height=\"70\" src=\"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/TranSys-Logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"TranSys\" \/><\/a><\/li><\/ul><\/div><div class=\"tlg-spacer  \" data-height=\"50\" data-height-tablet=\"50\" data-height-mobile=\"50\" style=\"clear:both;display:block;height:50px;\"><\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row tlg_padding=&#8221;pb0&#8243;][vc_column][\/vc_column][\/vc_row][vc_row tlg_background_style=&#8221;bg-secondary&#8221;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;] The IT security situation in Germany is very tense. Cyberattacks cause massive damage, costing German companies alone \u20ac179 billion, and reports to the BSI rose by 33% (726 reports). Ransomware is the biggest threat, with ransom payments rising sharply and global revenues of US$1.1 billion in 2023. SMEs and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12757","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Risk Check according to DIN SPEC 27076<\/title>\n<meta name=\"description\" content=\"Let&#039;s work together to improve your company&#039;s IT security! Contact us\u2014we will guide you competently through the CyberRiskCheck.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/astran.de\/en\/it-security-consulting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT security consulting\" \/>\n<meta property=\"og:description\" content=\"Let&#039;s work together to improve your company&#039;s IT security! Contact us\u2014we will guide you competently through the CyberRiskCheck.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/astran.de\/en\/it-security-consulting\/\" \/>\n<meta property=\"og:site_name\" content=\"ASTRAN Business Consulting GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-22T13:30:42+00:00\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/astran.de\\\/en\\\/it-security-consulting\\\/\",\"url\":\"https:\\\/\\\/astran.de\\\/en\\\/it-security-consulting\\\/\",\"name\":\"Cyber Risk Check according to DIN SPEC 27076\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/astran.de\\\/#website\"},\"datePublished\":\"2025-03-24T13:33:19+00:00\",\"dateModified\":\"2026-04-22T13:30:42+00:00\",\"description\":\"Let's work together to improve your company's IT security! Contact us\u2014we will guide you competently through the CyberRiskCheck.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/astran.de\\\/en\\\/it-security-consulting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/astran.de\\\/en\\\/it-security-consulting\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/astran.de\\\/en\\\/it-security-consulting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/astran.de\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT security consulting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/astran.de\\\/#website\",\"url\":\"https:\\\/\\\/astran.de\\\/\",\"name\":\"ASTRAN Business Consulting GmbH\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/astran.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/astran.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/astran.de\\\/#organization\",\"name\":\"ASTRAN Business Consulting GmbH\",\"url\":\"https:\\\/\\\/astran.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/astran.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/astran.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/05-Astran_logo_mit_titel_schwarz.png\",\"contentUrl\":\"https:\\\/\\\/astran.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/05-Astran_logo_mit_titel_schwarz.png\",\"width\":7494,\"height\":1656,\"caption\":\"ASTRAN Business Consulting GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/astran.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ASTRAN_BC\",\"https:\\\/\\\/www.linkedin.com\\\/organization-guest\\\/company\\\/astran-business-consulting-gmbh\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Risk Check according to DIN SPEC 27076","description":"Let's work together to improve your company's IT security! Contact us\u2014we will guide you competently through the CyberRiskCheck.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/astran.de\/en\/it-security-consulting\/","og_locale":"en_US","og_type":"article","og_title":"IT security consulting","og_description":"Let's work together to improve your company's IT security! Contact us\u2014we will guide you competently through the CyberRiskCheck.","og_url":"https:\/\/astran.de\/en\/it-security-consulting\/","og_site_name":"ASTRAN Business Consulting GmbH","article_modified_time":"2026-04-22T13:30:42+00:00","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/astran.de\/en\/it-security-consulting\/","url":"https:\/\/astran.de\/en\/it-security-consulting\/","name":"Cyber Risk Check according to DIN SPEC 27076","isPartOf":{"@id":"https:\/\/astran.de\/#website"},"datePublished":"2025-03-24T13:33:19+00:00","dateModified":"2026-04-22T13:30:42+00:00","description":"Let's work together to improve your company's IT security! Contact us\u2014we will guide you competently through the CyberRiskCheck.","breadcrumb":{"@id":"https:\/\/astran.de\/en\/it-security-consulting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/astran.de\/en\/it-security-consulting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/astran.de\/en\/it-security-consulting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/astran.de\/en\/home\/"},{"@type":"ListItem","position":2,"name":"IT security consulting"}]},{"@type":"WebSite","@id":"https:\/\/astran.de\/#website","url":"https:\/\/astran.de\/","name":"ASTRAN Business Consulting GmbH","description":"","publisher":{"@id":"https:\/\/astran.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/astran.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/astran.de\/#organization","name":"ASTRAN Business Consulting GmbH","url":"https:\/\/astran.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/astran.de\/#\/schema\/logo\/image\/","url":"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/05-Astran_logo_mit_titel_schwarz.png","contentUrl":"https:\/\/astran.de\/wp-content\/uploads\/2023\/03\/05-Astran_logo_mit_titel_schwarz.png","width":7494,"height":1656,"caption":"ASTRAN Business Consulting GmbH"},"image":{"@id":"https:\/\/astran.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ASTRAN_BC","https:\/\/www.linkedin.com\/organization-guest\/company\/astran-business-consulting-gmbh"]}]}},"_links":{"self":[{"href":"https:\/\/astran.de\/en\/wp-json\/wp\/v2\/pages\/12757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/astran.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/astran.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/astran.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/astran.de\/en\/wp-json\/wp\/v2\/comments?post=12757"}],"version-history":[{"count":7,"href":"https:\/\/astran.de\/en\/wp-json\/wp\/v2\/pages\/12757\/revisions"}],"predecessor-version":[{"id":13055,"href":"https:\/\/astran.de\/en\/wp-json\/wp\/v2\/pages\/12757\/revisions\/13055"}],"wp:attachment":[{"href":"https:\/\/astran.de\/en\/wp-json\/wp\/v2\/media?parent=12757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}