{"id":7725,"date":"2024-09-24T21:57:26","date_gmt":"2024-09-24T19:57:26","guid":{"rendered":"https:\/\/kalweit-its.de\/smes\/"},"modified":"2024-10-10T15:12:55","modified_gmt":"2024-10-10T13:12:55","slug":"smes","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/en\/smes\/","title":{"rendered":"SMES"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”||10px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/mountain1.jpg” title_text=”mountain1″ _builder_version=”4.16″ _module_preset=”5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.27.0″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_3,1_3,1_3″ use_custom_gutter=”on” gutter_width=”2″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
in Germany were affected by cyber attacks, with losses of over 220 billion euros per year.
\n[Source: Bitkom Digital Association][\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
in Germany were affected by cyber attacks, with losses of over 220 billion euros per year.
\n[Source: Bitkom Digital Association][\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
in Germany were affected by cyber attacks, with losses of over 220 billion euros per year.
\n[Source: Bitkom Digital Association][\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” custom_css_main_element=”z-index: 3;” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” text_orientation_tablet=”left” text_orientation_phone=”left” text_orientation_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
SMEs are ideal targets for cybercriminals.
\nHere are some of the reasons why: <\/p>\n
These factors make SMEs a “gateway” for cybercriminals, who often use SMEs as a springboard to attack larger companies.<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2022\/03\/image-24.jpg” title_text=”image (24)” module_class=”crop-img-3-2 animate-img” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” text_orientation_tablet=”left” text_orientation_phone=”left” text_orientation_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]A successful cyberattack can have far-reaching consequences for SMEs.
\nIn addition to direct financial losses due to data theft or blackmail, there is often the threat of long-term damage.
\nBusiness interruptions lead to a loss of sales, while reputational damage can shake customer confidence in the long term.
\nLegal consequences in the event of a breach of data protection regulations, high costs for restoring systems and possible liability claims from affected customers or business partners are an additional burden.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” hover_enabled=”0″ text_orientation_tablet=”left” text_orientation_phone=”left” text_orientation_last_edited=”on|tablet” global_colors_info=”{}” text_orientation=”center” sticky_enabled=”0″]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” text_orientation_tablet=”left” text_orientation_phone=”left” text_orientation_last_edited=”on|tablet” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]IT security is a holistic process. Particularly in application development, it can be of economic interest to identify security-relevant problem areas not at the time of release, but already in the coding process. As an experienced consulting boutique specializing in penetration testing, we know the state-of-the-art standards, known or common attack vectors and hurdles in secure software development. The project knowledge of each penetration test ensures that we can adapt this knowledge and pass it on as part of our business consulting.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.27.2″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2024\/10\/Bildschirmfoto-2024-10-01-um-12.56.32.png” title_text=”Philipp Red” align_tablet=”center” align_phone=”center” align_last_edited=”on|phone” _builder_version=”4.27.0″ _module_preset=”default” max_height=”350px” max_height_tablet=”500px” max_height_phone=”250px” max_height_last_edited=”on|desktop” border_radii=”on|350px|350px|350px|350px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text content_tablet=”<\/p>\n
%22Without annual (re)investment in IT security, not only is a company's future at stake – it risks losing everything it has worked for for years in an instant.%22<\/p>\n
” content_phone=”<\/p>\n
%22Without annual (re)investment in IT security, not only is a company's future at stake – it risks losing everything it has worked for over the years in an instant.%22<\/p>\n
” content_last_edited=”on|phone” _builder_version=”4.27.0″ _module_preset=”default” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” global_colors_info=”{}”]<\/p>\n
“Without annual (re)investment in IT security, not only is a company’s future at stake – it risks losing everything it has worked for for years in an instant.”<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
Sven Philipp Kalweit, CEO, Director Strategy & Consulting
Kalweit ITS GmbH<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]Your personal IT security consultant.
\nWe help you to make the right decisions for your IT security.
\nOur support ranges from the development of a suitable security strategy to advice in an acute threat situation. You don’t have to be an IT expert.
\nWe translate complex security topics into understandable language and help you make the best decisions for your budget.[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]<\/p>\n
1200 \u20ac per working day<\/p>\n
Offer requests<\/a><\/p>\n [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ module_class=”leistungen-row” _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.0″ _module_preset=”default” text_font=”||||||||” global_colors_info=”{}”]<\/p>\n [\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” custom_padding=”||2px|||” global_colors_info=”{}”]The supreme discipline of IT security: we find real vulnerabilities in your IT systems before real attackers can exploit them. We do this by acting like potential attackers. As one of the leading consulting boutiques specializing in manual penetration testing, we are also really good at it.[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.24.0″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.27.2″ _module_preset=”default” text_font=”EuclidCircularB Light||||||||” global_colors_info=”{}”]<\/p>\n Price on request<\/p>\nIdentification of weak points<\/h3>\n