How well is your data protected?

Test your organization, technology & awareness with the cyber security check

Every day the media reports about successful cyber attacks on businesses, which cause significant financial and reputational damage. How well are you protected against such attacks?


Strong cyber security despite digitalization

Driven by digitalization, you process, store and transmit large amounts of sensitive information on a daily basis via a wide variety of IT systems and applications.

To ensure the security of digitally processed information, the requirements of external bodies (for example, via laws or industry standards) for information security in your company are constantly increasing.
Your customers also trust you with efficiently protecting their data against cyber attacks.

Protect your data with a Cyber Security Check

Based on internationally recognized standards of information security (ISO/IEC 27001:2015, ISO/IEC 27001:2017, BSI IT-Grundschutz, PCI DSS, NIST Cyber Security Framework), the recommendations of ISACA, ISC², ISF and the German Federal Office for Information Security, as well as current best practices, we conduct a Cyber Security Check at your premises. We will thoroughly check your organization, technology and the awareness of your employees.

How do we proceed when performing a Cyber Security Check?

We customize each Cyber Security Check to your needs and circumstances. Usually it includes the following phases:

Phase 1
Analysis and definition of the scope

Phase 2
Planning and preparation

Phase 3
On-site and off-site assessment

Phase 4
Reporting and presentation of results

Phase 5
Optional: Consulting on the implementation of recommended measures

Phase 6
Optional: Update of the final report

Phase 7
Optional: Additional assessments

What will be checked during a Cyber Security Check?

Within the scope of the Cyber Security Check, the following topics may be considered and examined by experts from usd AG:

  • Protection of network transitions
  • Malware defense
  • Inventory of the IT systems
  • Prevention of exploitable security vulnerabilities
  • Secure interaction with the internet
  • Log data collection and evaluation
  • Ensuring an up-to-date level of information
  • Management of security incidents
  • Secure authentication
  • Ensuring the availability of necessary resources
  • Physical security
  • Secure software development
  • Performance of technical security analyses
  • Secure handling of cloud applications
  • Awareness raising and training of employees
  • Information security governance
  • Configuration management
Cyber Security Check



Please contact us with any questions or queries.

Phone: +49 6102 8631-190
Contact Form


Kontakt usd Sales

Anna-Magdalena Kohl
usd Team Lead Sales,
PCI Professional