Protect yourself from cyber attacks and penalties

With our platform, you not only recognise cyber risks, but also learn how to protect yourself from cyber attacks without any prior knowledge of online security. You'll understand the potential penalties, but you'll be independent of expensive cyber security personnel or consultancies.

Home - Cover

Our services

green circle
yellow circle

Cyber security as clear as never before

yellow circle
green circle

With the CI-Platform, you have a contact point for all topics related to cyber security and the GDPR and are proactively informed about changes and current trends. This means you know how to protect yourself and how to implement the GDPR. This means you are always up to date. In addition to in-depth risk analyses, you will receive a clear and comprehensible risk profile. We also offer precise recommendations for action with practical examples of how you can best react to certain potential risks.

In addition, you will receive lawyer-approved templates and company guidelines that will put you in a good position to deal with the GDPR.

If you are faced with a complex problem that you cannot solve on your own, we offer you a marketplace where you can get in touch with proven experts.

Why take a risk when effective protection is so simple

yellow circle

Secure the advantages of the CI-Platform now

You no longer have to read through dry, cumbersome literature or online articles on the topic of cyber security. We offer you bundled knowledge on this topic clearly and comprehensibly prepared via our platform. So you don't need any previous knowledge!

Costs can arise online due to various factors. This also includes security gaps, of course. We help you to minimise possible costs by identifying risks at an early stage.

Our CI platform helps you to identify, assess and evaluate the threats to your customer datathrough intelligent risk profiling and in-depth risk analysis.

Satisfied customer Cyber Insight

Relation of costs to safety level

yellow circle
green circle

Increasing safety level with the CI platform

With our product you will be able to significantly improve your risk level. For small and medium-sized businesses, we have optimally tailored modules for every requirement and scope. From basic security to superior security of your data, you can determine the optimal cost-benefit factor for you to ultimately enjoy the best protection. With the help of an interactive inventory and comprehensible recommendations for action, you can implement these independently and quickly. There is no need to hire expensive consultants and make time-consuming arrangements with service providers.

green circle
yellow circle
Figure Graph Cyber Insight
yellow circle

This is how it works

3 steps to more cyber security

Register free of charge

The first step is often the hardest - not with us. You don't take any financial risk, because registration is free.

Answer questions

In order to identify risks and to find out your personal requirement profile, we ask the right questions and thus quickly arrive at clear answers.

yellow circle

Assessment of your risk of receiving a penalty and recommendation for action

Through the in-depth risk depth analysis and its result, we are able to provide you with a precise penalty probability profile and an accurate recommendation for action.

Intelligent risk assessment

yellow circle
green circle

A clear answer is always preceded by a simple question

yellow circle

Security

How much attention is paid to the security of IT systems in the company?

Online presence

Is the company present on the internet?

Processing purposes

Is there a purpose for the data processing?

Woman sitting cross-legged Cyber Insight

Data subjects' rights

Are the rights of those affected known and implemented? 

Data protection notifications

When must a data protection notification be made?

Processor

Are there other companies that process data for which you are responsible?

Woman sitting cross-legged Cyber Insight

Security

How much attention is paid to the security of IT systems in the company?

Online presence

Is the company present on the internet?

Processing purposes

Is there a purpose for the data processing?

Data subjects' rights

Are the rights of those affected known and implemented? 

Data protection notifications

When must a data protection notification be made?

Processor

Are there other companies that process data for which you are responsible?

Woman sitting cross-legged Cyber Insight
green circle

Upon completion you will receive our award*.

Show with our seal how trustworthy you are

Cyber Insight Seal
green circle

With our seal, you increase the trust of your customers. They know that their data is in good hands with you and that your platform is trustworthy." to "With our seal, you increase the trust of your customers. They know that their data is in good hands with you and that your company is trustworthy.

Our roadmap

yellow circle
yellow circle
green circle
green circle
green circle
green circle

Many more functions planned for the future

Automated cyber security and DSGVO tests

as of Q3/22

Documents & Templates

as of Q4/22

Training material and videos

from Q1/23

Further modules for regulatory requirements

from Q2/23

Blog

Here you will find news and information about cyber security.

green circle
yellow circle
yellow circle
green circle

DoS attacks

Denial of Service attacks (or DoS attacks) are more malicious attacks that aim to flood a system, server or / and network with traffic in order to disable its

Read more "
Girl summarizing online article
GDPR

What is a processor (Art. 28)?

A processor is a natural or legal person, public authority, agency or other body that processes personal data on behalf of the controller. Commissioned processing - examples:

Read more "
yellow circle

FAQ

Frequently asked questions

Do we need a seal for legal reasons?

This is not required by law, but it increases your customers' confidence that their data is in good hands.

Is the software hosted in Europe?

The CI platform is hosted in Europe in a data protection compliant manner.

How long does it take from a risk assessment to a recommendation for action?

After answering the basic questions, you will receive the risk assessment and recommendations for action directly afterwards.

Without time-consuming or manual evaluation by you or third parties.

At what point do costs arise?

The basic product is free of charge. Costs are only incurred if additional services are booked, such as the award or training material.

Do I need any additional third-party software?

To achieve a high level of security, it is necessary to use third-party products, such as a firewall.  

yellow circle
yellow circle

Contact

Available for you at any time

If you have any questions or a general request, please contact us directly. We will answer your enquiry immediately and get back to you as soon as possible.

Start now free of charge

The first step is often the hardest? Not with us. You can easily start for free - without hurdles, without barriers - and without financial risk.