{"id":7858,"date":"2024-05-13T13:00:51","date_gmt":"2024-05-13T11:00:51","guid":{"rendered":"https:\/\/www.ensec.ch\/managed-it-security\/information-security-as-service\/"},"modified":"2024-12-19T09:33:39","modified_gmt":"2024-12-19T08:33:39","slug":"information-security-as-service","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/managed-it-security\/information-security-as-service\/","title":{"rendered":"Information Security as Service"},"content":{"rendered":"<h1>Infor\u00admation Security as a Service<\/h1>\n<h2>Navigating the depths of regulations, compliance and awareness<\/h2>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<ul>\n<li>\n        <a href=\"\">Navigation:<\/a>\n    <\/li>\n<li>\n        <a href=\"#services\">Services<\/a>\n    <\/li>\n<li>\n        <a href=\"#business\">Business relevance<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<div>\n<p>Companies face enormous challenges when it comes to securing information and systems: Complex technology landscapes, rapidly intensifying cyber threats, lack of human resources for security-related roles and functions, as well as ongoing adjustments to legal and regulatory requirements in the area of IT security and compliance.<\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/03\/BLOG-Awareness.jpg\" alt=\"\"><\/p>\n<h3>The best protection against cybercrime is attentive and trained users.  We help you to create a strong &#8220;human firewall&#8221;<\/h3>\n<p>Awareness as a Service<\/p>\n<p><a href=\"\/wp-content\/uploads\/2024\/06\/ensec_Awareness-aaS_factsheet_deutsch.pdf\">Download now<\/a><\/p>\n<\/div>\n<h2>Services<\/h2>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/mss_isaas_ciso.svg\" alt=\"\"><\/p>\n<h3>CISO as a Service<\/h3>\n<div>\n<p>Chief Information Security Officers (CISO) are responsible for the company&#8217;s information security. Their tasks include assessing and dealing with security risks, advising management and IT, establishing guidelines, evaluating concepts and leading the implementation of projects.<\/p>\n<p>The increasing complexity of the subject matter, the dried-up personnel market and tight budgets do not make it easy to fill a CISO position. Incidentally, CISOs who are looking for support for themselves or their team also face similar obstacles.<\/p>\n<h3>Needs-based service<\/h3>\n<p>When it comes to filling or supporting a CISO role, the needs and requirements of each company are individual. Whether interim management, project support or the targeted outsourcing of certain tasks, such as in the area of compliance and risk management: ensec is happy to customise the CISO mandate to the specific requirements of your company.<\/p>\n<p>CISO as a Service is provided by our best security experts with industry-relevant certifications (CISM, CISA, etc.). In addition, we can ensure a fast familiarisation period thanks to our extensive know-how and wealth of experience and achieve maximum flexibility in terms of workload.<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/mss_isaas_dpo.svg\" alt=\"\"><\/p>\n<h3>DPO as a Service<\/h3>\n<div>\n<p>The appointment of a Data Protection Officer, Data Protection Advisor or Data Privacy Officer (DPO) is mandatory in some cases and highly recommended in others to implement all the processes and controls and ensure ongoing compliance with the relevant legislation.<\/p>\n<h3>Advantages of our service<\/h3>\n<p>Data protection is required by law, but it is by no means a purely legal matter. Quite the opposite. Basically, it is about creating transparency for all persons, the so-called data subjects, giving them options and preventing companies from hiding behind legal texts that are difficult to understand. A company&#8217;s data protection officer must be able to navigate through the relevant laws, regulations and legal interpretations. However, in-depth knowledge of processes and techniques is at least as important. Anyone who does not understand the function of an application with regard to its data processing and storage and cannot check security techniques for their correct application will never be able to assess a company&#8217;s compliance with external data protection requirements. A complex matter that ensec is happy to take on professionally.<\/p>\n<p>With DPO as a Service, ensec provides companies with qualified data protection experts who have a profound understanding of business processes and also have extensive knowledge in the field of IT, especially IT security.<\/p>\n<h3>Customised<\/h3>\n<p>Although most companies face similar challenges when filling the position of data protection officer, the needs and requirements are usually very individualised. Whether a full-time job, part-time job or selective support, whether interim management, project support or the outsourcing of specific tasks, such as the creation and maintenance of a data register: ensec easily adapts its mandate to the needs of each individual company.<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/mss_isaas_awareness-and-phishing.svg\" alt=\"\"><\/p>\n<h3>Awareness &#038; Phishing as a Service<\/h3>\n<div>\n<p>The implementation of successful security awareness measures requires specialised knowledge and ties up resources. ensec offers a service under the term &#8220;Managed Security Awareness&#8221; which includes the following work as standard:<\/p>\n<ul>\n<li>Regular online training for employees (short sequences, up to 12 times a year)<\/li>\n<li>Attack simulations in the form of phishing tests (up to 24x per year)<\/li>\n<li>Regular reporting (awareness level, training progress, click and report rates)<\/li>\n<li>Special training for &#8220;risky users&#8221;<\/li>\n<li>Platform for service provision<\/li>\n<li>Phish alert button for Outlook (for reporting real and simulated phishing emails)<\/li>\n<li>User support<\/li>\n<\/ul>\n<p>The service can be customised to your individual needs and supplemented with the following components, among others:<\/p>\n<ul>\n<li>Spear phishing campaigns (targeted\/ customised<\/li>\n<li>hishing attacks for specific employees\/groups)<\/li>\n<li>USB drop tests<\/li>\n<li>Creation of customised phishing templates<\/li>\n<li>Integration of own content (SCORM modules, videos)<\/li>\n<li>Distribution of topic-specific documents (directives, standards, etc.)<\/li>\n<li>Differentiation between several training groups<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/Aus-Sicht-des-Business_Information-Security-aaS.jpg\" alt=\"\"><\/p>\n<h2>Navigating successfully &#8211; in a sea of paragraphs.<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p>Companies want data protection expertise that is clear and understandable for all employees. That&#8217;s what they get from ensec.<\/p>\n<p>Our consultants are practical and do not hide behind legal phrases. They are just as capable of explaining the necessary measures to management as they are of explaining the necessary adjustments to an application to the programmer.<\/p>\n<p>The legally relevant documentation is created in a cost-saving manner based on tested templates. In the case of complete outsourcing, ensec manages the relevant controls and processes with the help of specialised audit-proof tools.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p>\n    <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Infor\\u00admation Security as a Service\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Navigating the depths of regulations, compliance and awareness\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\",\"modified\":\"2021-07-13T19:31:48.139Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"60\",\"css\":\".el-section {\\n\\tmargin-bottom:130px;\\n}\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"active\":true,\"content\":\"Navigation:\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Services\",\"link\":\"#services\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Business relevance\",\"link\":\"#business\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]}],\"props\":{\"column_gap\":\"large\"}},{\"type\":\"row\",\"props\":{\"column_gap\":\"large\",\"layout\":\"2-3,1-3\",\"margin\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>Companies face enormous challenges when it comes to securing information and systems: Complex technology landscapes, rapidly intensifying cyber threats, lack of human resources for security-related roles and functions, as well as ongoing adjustments to legal and regulatory requirements in the area of IT security and compliance.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\",\"text_style\":\"lead\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"}}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"100\",\"id\":\"bestandteile\",\"image_position\":\"top-right\",\"image_size\":\"contain\",\"padding\":\"large\",\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"\"},\"children\":[{\"type\":\"row\",\"props\":{\"width\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"Panel Image Left\",\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"small\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-image {\\n\\tborder-radius:15px 0 0 15px;\\n}\\n\\n\\n.el-element a {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-element:hover {\\n   \\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n    transition:0.5s;\\n}\\n\\n.el-element:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2023\\\/03\\\/BLOG-Awareness.jpg\",\"image_align\":\"left\",\"image_grid_breakpoint\":\"s\",\"image_grid_width\":\"2-5\",\"image_height\":800,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":800,\"link\":\"wp-content\\\/uploads\\\/2024\\\/06\\\/ensec_Awareness-aaS_factsheet_deutsch.pdf\",\"link_margin\":\"medium\",\"link_size\":\"large\",\"link_style\":\"secondary\",\"link_target\":true,\"link_text\":\"Download now\",\"margin\":\"default\",\"meta\":\"Awareness as a Service\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_expand\":\"image\",\"panel_image_no_padding\":true,\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"title\":\"The best protection against cybercrime is attentive and trained users.  We help you to create a strong \\\"human firewall\\\"\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Services\",\"id\":\"services\",\"margin\":\"large\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"name\":\"Accordion Image Left\",\"type\":\"accordion\",\"children\":[{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>Chief Information Security Officers (CISO) are responsible for the company's information security. Their tasks include assessing and dealing with security risks, advising management and IT, establishing guidelines, evaluating concepts and leading the implementation of projects.<\\\/p>\\n\n\n<p>The increasing complexity of the subject matter, the dried-up personnel market and tight budgets do not make it easy to fill a CISO position. Incidentally, CISOs who are looking for support for themselves or their team also face similar obstacles.<\\\/p>\\n\n\n<h3>Needs-based service<\\\/h3>\\n\n\n<p>When it comes to filling or supporting a CISO role, the needs and requirements of each company are individual. Whether interim management, project support or the targeted outsourcing of certain tasks, such as in the area of compliance and risk management: ensec is happy to customise the CISO mandate to the specific requirements of your company.<\\\/p>\\n\n\n<p>CISO as a Service is provided by our best security experts with industry-relevant certifications (CISM, CISA, etc.). In addition, we can ensure a fast familiarisation period thanks to our extensive know-how and wealth of experience and achieve maximum flexibility in terms of workload.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/mss_isaas_ciso.svg\",\"title\":\"CISO as a Service\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>The appointment of a Data Protection Officer, Data Protection Advisor or Data Privacy Officer (DPO) is mandatory in some cases and highly recommended in others to implement all the processes and controls and ensure ongoing compliance with the relevant legislation.<\\\/p>\\n\n\n<h3>Advantages of our service<\\\/h3>\\n\n\n<p>Data protection is required by law, but it is by no means a purely legal matter. Quite the opposite. Basically, it is about creating transparency for all persons, the so-called data subjects, giving them options and preventing companies from hiding behind legal texts that are difficult to understand. A company's data protection officer must be able to navigate through the relevant laws, regulations and legal interpretations. However, in-depth knowledge of processes and techniques is at least as important. Anyone who does not understand the function of an application with regard to its data processing and storage and cannot check security techniques for their correct application will never be able to assess a company's compliance with external data protection requirements. A complex matter that ensec is happy to take on professionally.<\\\/p>\\n\n\n<p>With DPO as a Service, ensec provides companies with qualified data protection experts who have a profound understanding of business processes and also have extensive knowledge in the field of IT, especially IT security.<\\\/p>\\n\n\n<h3>Customised<\\\/h3>\\n\n\n<p>Although most companies face similar challenges when filling the position of data protection officer, the needs and requirements are usually very individualised. Whether a full-time job, part-time job or selective support, whether interim management, project support or the outsourcing of specific tasks, such as the creation and maintenance of a data register: ensec easily adapts its mandate to the needs of each individual company.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/mss_isaas_dpo.svg\",\"title\":\"DPO as a Service\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>The implementation of successful security awareness measures requires specialised knowledge and ties up resources. ensec offers a service under the term \\\"Managed Security Awareness\\\" which includes the following work as standard:<\\\/p>\\n\n\n<ul>\\n\n\n<li>Regular online training for employees (short sequences, up to 12 times a year)<\\\/li>\\n\n\n<li>Attack simulations in the form of phishing tests (up to 24x per year)<\\\/li>\\n\n\n<li>Regular reporting (awareness level, training progress, click and report rates)<\\\/li>\\n\n\n<li>Special training for \\\"risky users\\\"<\\\/li>\\n\n\n<li>Platform for service provision<\\\/li>\\n\n\n<li>Phish alert button for Outlook (for reporting real and simulated phishing emails)<\\\/li>\\n\n\n<li>User support<\\\/li>\\n<\\\/ul>\\n\n\n<p>The service can be customised to your individual needs and supplemented with the following components, among others:<\\\/p>\\n\n\n<ul>\\n\n\n<li>Spear phishing campaigns (targeted\\\/ customised<\\\/li>\\n\n\n<li>hishing attacks for specific employees\\\/groups)<\\\/li>\\n\n\n<li>USB drop tests<\\\/li>\\n\n\n<li>Creation of customised phishing templates<\\\/li>\\n\n\n<li>Integration of own content (SCORM modules, videos)<\\\/li>\\n\n\n<li>Distribution of topic-specific documents (directives, standards, etc.)<\\\/li>\\n\n\n<li>Differentiation between several training groups<\\\/li>\\n<\\\/ul>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/mss_isaas_awareness-and-phishing.svg\",\"title\":\"Awareness & Phishing as a Service\"}}],\"props\":{\"collapsible\":false,\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tfont-size:2.3vh;\\n    padding-bottom:15px;\\n}\\n\\n.el-image {\\n\\tmargin-top:10px;\\n}\\n\\n.el-content {\\n\\tmax-width:80%;\\n}\\n\\n.uk-child-width-expand {\\n\\tpadding-bottom:50px;\\n}\",\"image_align\":\"left\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"s\",\"image_grid_width\":\"1-4\",\"image_height\":\"200\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_vertical_align\":false,\"image_width\":\"250\",\"link_margin\":\"small\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"multiple\":false,\"show_image\":true,\"show_link\":true,\"title_element\":\"h3\"}}]}]}],\"name\":\"Bestandteile\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p>Companies want data protection expertise that is clear and understandable for all employees. That's what they get from ensec.<\\\/p>\\n\n\n<p>Our consultants are practical and do not hide behind legal phrases. They are just as capable of explaining the necessary measures to management as they are of explaining the necessary adjustments to an application to the programmer.<\\\/p>\\n\n\n<p>The legally relevant documentation is created in a cost-saving manner based on tested templates. In the case of complete outsourcing, ensec manages the relevant controls and processes with the help of specialised audit-proof tools.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/Aus-Sicht-des-Business_Information-Security-aaS.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"Navigating successfully - in a sea of paragraphs.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"ensec \\u2013 Call to action\"}],\"version\":\"4.4.16\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infor\u00admation Security as a Service Navigating the depths of regulations, compliance and awareness Our IT security experts will be happy to advise you. Call now Navigation: Services Business relevance Companies face enormous challenges when it comes to securing information and systems: Complex technology landscapes, rapidly intensifying cyber threats, lack of human resources for security-related roles [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7803,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7858","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7858"}],"version-history":[{"count":5,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7858\/revisions"}],"predecessor-version":[{"id":8097,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7858\/revisions\/8097"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7803"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}