{"id":2179,"date":"2021-09-15T00:11:33","date_gmt":"2021-09-14T22:11:33","guid":{"rendered":"https:\/\/swissitmanagement.com\/?page_id=2179"},"modified":"2026-02-19T07:01:17","modified_gmt":"2026-02-19T06:01:17","slug":"cyber-security-check-gemeinde-light","status":"publish","type":"page","link":"https:\/\/swissitmanagement.com\/en\/cyber-security-check-gemeinde-light\/","title":{"rendered":"Security Check Gemeinde light"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2179\" class=\"elementor elementor-2179\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-da9ec98 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"da9ec98\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-250179c\" data-id=\"250179c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-071824d elementor-hidden-phone eael-dual-header-content-align-center elementor-widget elementor-widget-eael-dual-color-header\" data-id=\"071824d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-dual-color-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"eael-dual-header\">\n\t\t\t\t\t\t\t\t\t<span class=\"eael-dch-svg-icon\"><i aria-hidden=\"true\" class=\"icon icon-padlock-1\"><\/i><\/span>\t\t\t\t\t\t\t\t<h1 class=\"title eael-dch-title\"><span class=\"eael-dch-title-text eael-dch-title-lead lead solid-color\">Security Check <\/span> <span class=\"eael-dch-title-text\">Pentest light<\/span><\/h1><div class=\"eael-dch-separator-wrap\"><span class=\"separator-one\"><\/span>\n\t\t\t<span class=\"separator-two\"><\/span><\/div>\t\t\t\t<span class=\"subtext\"><p><strong>Der Cyber Security Check light von Swiss IT Management ist speziell auf die Bed\u00fcrfnisse<br \/>der Gemeinden ausgelegt und gibt den Gemeindeverantwortlichen schnell und umfassend<br \/>einen \u00dcberblick \u00fcber die Gefahrensituation. Daraus abgeleitet bieten wir Ihnen s\u00e4mtliche Massnahmen,<br \/>um Computer, Server, Mobilger\u00e4te, elektronische Systeme, Netzwerke und Daten gegen<br \/>b\u00f6swillige Angriffe zu verteidigen und machen Ihre Mitarbeitenden fit gegen Cyberattacken.<\/strong><\/p><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43c6484 elementor-hidden-desktop elementor-hidden-tablet eael-dual-header-content-align-center elementor-widget elementor-widget-eael-dual-color-header\" data-id=\"43c6484\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-dual-color-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"eael-dual-header\">\n\t\t\t\t\t\t\t\t\t<span class=\"eael-dch-svg-icon\"><i aria-hidden=\"true\" class=\"icon icon-padlock-1\"><\/i><\/span>\t\t\t\t\t\t\t\t<h1 class=\"title eael-dch-title\"><span class=\"eael-dch-title-text eael-dch-title-lead lead solid-color\">Security Check<\/span> <span class=\"eael-dch-title-text\">Pentest light<\/span><\/h1><div class=\"eael-dch-separator-wrap\"><span class=\"separator-one\"><\/span>\n\t\t\t<span class=\"separator-two\"><\/span><\/div>\t\t\t\t<span class=\"subtext\"><p><strong>Der Cyber Security Check light von Swiss IT Management ist speziell auf die Bed\u00fcrfnisse der Gemeinden ausgelegt und gibt den Gemeindeverantwortlichen schnell und umfassend einen \u00dcberblick \u00fcber die Gefahrensituation. Daraus abgeleitet bieten wir Ihnen s\u00e4mtliche Massnahmen, um Computer, Server, Mobilger\u00e4te, elektronische Systeme, Netzwerke und Daten gegen b\u00f6swillige Angriffe zu verteidigen und machen Ihre Mitarbeitenden fit gegen Cyberattacken.<\/strong><\/p><\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0777216 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0777216\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0f0b09b\" data-id=\"0f0b09b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7745f53 elementor-widget elementor-widget-heading\" data-id=\"7745f53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Check: Pentest light<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d6d094 elementor-widget elementor-widget-text-editor\" data-id=\"0d6d094\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Der speziell auf die Bed\u00fcrfnisse von Gemeinden ausgerichtete Pentest \u00fcberpr\u00fcft die wesentlichen Risiken.<\/p><p>Wir ber\u00fccksichtigen dabei die g\u00e4ngigen Angriffsvektoren und \u00fcblichen Schwachstellen.<\/p><p>Der <a href=\"https:\/\/de.wikipedia.org\/wiki\/Penetrationstest_(Informatik)\" target=\"_blank\" rel=\"noopener\">Penetrationstest<\/a> wird als Kombination aus automatisierten und manuellen Tests durchgef\u00fchrt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5c10593\" data-id=\"5c10593\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0b4974 elementor-hidden-mobile premium-lottie-svg elementor-widget elementor-widget-premium-lottie\" data-id=\"d0b4974\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-lottie-animation\" data-lottie-url=\"https:\/\/assets5.lottiefiles.com\/packages\/lf20_cxplj7td.json\" data-lottie-loop=\"true\" data-lottie-reverse=\"\" data-lottie-hover=\"\" data-lottie-speed=\"1\" data-lottie-render=\"svg\" data-lottie-delay=\"\">\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8efdb72 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8efdb72\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4ba7ca8\" data-id=\"4ba7ca8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e27e8f premium-lottie-svg elementor-widget elementor-widget-premium-lottie\" data-id=\"8e27e8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;trigger&quot;:&quot;scroll&quot;}\" data-widget_type=\"premium-lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"premium-lottie-animation premium-lottie-scroll\" data-lottie-url=\"https:\/\/assets4.lottiefiles.com\/packages\/lf20_loc0lu9b.json\" data-lottie-loop=\"true\" data-lottie-reverse=\"\" data-lottie-hover=\"\" data-lottie-speed=\"0.6\" data-lottie-render=\"svg\" data-lottie-delay=\"\" data-lottie-scroll=\"true\" data-scroll-start=\"0\" data-scroll-end=\"100\" data-scroll-speed=\"4\">\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1fa140d\" data-id=\"1fa140d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15d44d7 elementor-widget elementor-widget-text-editor\" data-id=\"15d44d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Der Security Check &#8211; Pentest light findet typischerweise von Remote aus statt und umfasst folgende Leistungen:<\/strong><\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1605e32 elementor-widget elementor-widget-eael-feature-list\" data-id=\"1605e32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n\t\t\t<ul id=\"eael-feature-list-1605e32\" class=\"eael-feature-list-items square framed connector-type-classic eael-feature-list-vertical\" data-layout-tablet=\"vertical\" data-layout-mobile=\"vertical\">\n\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-84c4db8\">\n                                            <span class=\"connector\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-tablet\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-mobile\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\">\n\n\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Cyber Security Check<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Wir \u00fcberpr\u00fcfen \u00f6ffentliche Quellen auf sensitive Daten \u00fcber Ihr Unternehmen. Dies ist in der Regel der erste Schritt eines Angreifers.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-e417f3e\">\n                                            <span class=\"connector\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-tablet\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-mobile\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\">\n\n\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Leaked Information<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Wir pr\u00fcfen ob die Daten Ihrer Mitarbeiter wie z.B. Passw\u00f6rter oder Logins in bekannten Datenbanken enthalten sind.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-a04214a\">\n                                            <span class=\"connector\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-tablet\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-mobile\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\">\n\n\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">\u00d6ffentliche Infrastruktur<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Wir \u00fcberpr\u00fcfen \u00f6ffentlich erreichbare Endpunkte auf Schwachstellen und Angriffsm\u00f6glichkeiten wie bspw. offene Ports oder veraltete Software.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-cde7495\">\n                                            <span class=\"connector\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-tablet\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-mobile\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-3\">\n\n\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Interne Infrastruktur<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">In Ihrer internen Infrastruktur f\u00fchren wir einen vollst\u00e4ndigen Scan durch und \u00fcberpr\u00fcfen die gefundenen Schwachstellen.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-4322d1d\">\n                                            <span class=\"connector\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-tablet\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-mobile\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-4\">\n\n\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Active Directory<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Das AD ist in der Regel eine kritische Komponente der Infrastruktur. Wir \u00fcberpr\u00fcfen bspw. ob ein Angreifer administrative Rechte erlangen kann.\n<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-47d079d\">\n                                            <span class=\"connector\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-tablet\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                        <span class=\"connector connector-mobile\" style=\"right: calc(100% - 72px); left: 0;\"><\/span>\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-5\">\n\n\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h2 class=\"eael-feature-list-title\">Evil Employee<\/h2>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Wir pr\u00fcfen eine beispielhafte Client-Workstation Ihrer Mitarbeiter auf Konfigurationsfehler und Schwachstellen (Golden image)\n<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e0fb7c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e0fb7c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-88a6d54\" data-id=\"88a6d54\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7943ccb elementor-widget elementor-widget-spacer\" data-id=\"7943ccb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e42809 elementor-widget elementor-widget-text-editor\" data-id=\"9e42809\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Als Ergebnis erhalten sie einen detaillierten Bericht mit allen unseren Findings, \u00fcber die durchgef\u00fchrten Pr\u00fcfungen, die Ergebnisse und unsere Empfehlungen. Dieser Bericht umfasst folgende Inhalte:<\/p><h2>MANAGEMENT SUMMARY<\/h2><p>Unser Abschlussbericht umfasst eine nicht technische Zusammenfassung des Projekts und der identifizierten Feststellungen f\u00fcr die Management Ebene. Es werden alle kritischen Feststellungen pr\u00e4gnant zusammengefasst.<\/p><h2>VORGEHEN, SCOPE UND TOOLS<\/h2><p>Weiterhin beinhaltet unser Abschlussbericht eine umfassende Beschreibung der angewandten Testmethoden, dem analysierten Pr\u00fcfobjekt und Scope sowie die zum Einsatz gekommenen Tools und Skripten w\u00e4hrend des Penetrationstests.<\/p><h2>FESTSTELLUNGEN UND MASSNAHME<\/h2><p>Dar\u00fcber hinaus enth\u00e4lt unser Abschlussbericht eine detaillierte, technische Beschreibung aller identifizierten Feststellungen. Weiterhin erhalten Sie eine umfassende Empfehlung zur Behebung jeder einzelnen Schwachstelle, passend f\u00fcr technisches Personal wie Administratoren oder Entwickler.<\/p><h2>STANDARDISIERTE RISIKOBEWERTUNG<\/h2><p>Wir folgen bekannten Standards wie der OWASP Risikobewertungsmethode f\u00fcr die Einsch\u00e4tzung unserer Feststellungen w\u00e4hrend des Pentest-Projekts. Das Risiko einer Schwachstelle basiert hierbei auf der Eintrittswahrscheinlichkeit und Auswirkung.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-95025f8 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"95025f8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c348a2a\" data-id=\"c348a2a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f84f7df elementor-widget elementor-widget-image\" data-id=\"f84f7df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"390\" height=\"530\" src=\"https:\/\/swissitmanagement.com\/wp-content\/uploads\/2023\/11\/pack-secure-light-1.webp\" class=\"attachment-medium_large size-medium_large wp-image-3106\" alt=\"Security Check: Pentest light\" srcset=\"https:\/\/swissitmanagement.com\/wp-content\/uploads\/2023\/11\/pack-secure-light-1.webp 390w, https:\/\/swissitmanagement.com\/wp-content\/uploads\/2023\/11\/pack-secure-light-1-221x300.webp 221w, https:\/\/swissitmanagement.com\/wp-content\/uploads\/2023\/11\/pack-secure-light-1-9x12.webp 9w\" sizes=\"(max-width: 390px) 100vw, 390px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f1ef4dd\" data-id=\"f1ef4dd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fde5959 elementor-widget elementor-widget-text-editor\" data-id=\"fde5959\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Ihr Nutzen des Security Check: <strong>Pentest light<\/strong><\/h3><ul><li>Gesamtheitliche \u00dcbersicht \u00fcber die Gefahrensituation<\/li><li>Eindeutige Risikobeurteilung<\/li><li>Massnahmenplan<\/li><\/ul><p><br \/>Sie interessieren sich f\u00fcr den <strong>Pentest light<\/strong>? Oder ben\u00f6tigen Sie konkrete Unterst\u00fctzung? Melden Sie sich gerne bei uns! Kontaktieren Sie uns zum Thema <strong>Pentest light<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc293ed pa-icon-pos-before premium-lq__none elementor-widget elementor-widget-premium-addon-button\" data-id=\"cc293ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t<a class=\"premium-button premium-button-style7 premium-btn-lg premium-button-style7-left\" href=\"\/en\/kontakt\/\">\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"premium-drawable-icon premium-svg-nodraw icon icon-envelope\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\tKontakt\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/a>\n\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Security Check Pentest light Der Cyber Security Check light von Swiss IT Management ist speziell auf die Bed\u00fcrfnisseder Gemeinden ausgelegt und gibt den Gemeindeverantwortlichen schnell und umfassendeinen \u00dcberblick \u00fcber die Gefahrensituation. Daraus abgeleitet bieten wir&hellip;<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2179","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/swissitmanagement.com\/en\/wp-json\/wp\/v2\/pages\/2179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swissitmanagement.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/swissitmanagement.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/swissitmanagement.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/swissitmanagement.com\/en\/wp-json\/wp\/v2\/comments?post=2179"}],"version-history":[{"count":3,"href":"https:\/\/swissitmanagement.com\/en\/wp-json\/wp\/v2\/pages\/2179\/revisions"}],"predecessor-version":[{"id":3387,"href":"https:\/\/swissitmanagement.com\/en\/wp-json\/wp\/v2\/pages\/2179\/revisions\/3387"}],"wp:attachment":[{"href":"https:\/\/swissitmanagement.com\/en\/wp-json\/wp\/v2\/media?parent=2179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}