{"id":2685,"date":"2023-12-20T13:56:00","date_gmt":"2023-12-20T13:56:00","guid":{"rendered":"https:\/\/cyber-curriculum.com\/?page_id=2685"},"modified":"2024-04-22T06:12:36","modified_gmt":"2024-04-22T06:12:36","slug":"it-audit","status":"publish","type":"page","link":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/","title":{"rendered":"IT Audit"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:120px;--awb-background-image:linear-gradient(180deg, rgba(35,199,172,0.44) 0%,rgba(255,255,255,0) 100%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p><span style=\"color: #ffffff;\">We provide you with an overview<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-no-small-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:rgb(35,199,172);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\"><span style=\"color: #23c7ac;\">CYBER<\/span> CURRICULUM<span class=\"registered\">\u00ae<br \/><\/span>IT Security Audit<\/h3><\/div><div class=\"fusion-title title fusion-title-2 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">CYBER CURRICULUM\u00ae IT CYBER SECURITY AUDIT<\/h4><\/div><div class=\"fusion-text fusion-text-2 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p>Our cyber security audit solution supports you in evaluating and optimizing IT security in your company regardless of your IT infrastructure and minimizing risks &#8211; whether on-premises, hybrid or pure cloud. Our audit is based on proven best practices and recommendations that can be implemented in your IT structure to ensure the highest level of security.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element fusion-no-small-visibility\" style=\"text-align:center;--awb-max-width:440px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"z-index:2;\"><img decoding=\"async\" width=\"2176\" height=\"1692\" title=\"cc-it-audit-hero\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cc-it-audit-hero.png\" alt class=\"img-responsive wp-image-3368\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cc-it-audit-hero-200x156.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cc-it-audit-hero-400x311.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cc-it-audit-hero-600x467.png 600w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cc-it-audit-hero-800x622.png 800w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cc-it-audit-hero-1200x933.png 1200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cc-it-audit-hero.png 2176w\" sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:0px;--awb-padding-top-medium:51px;--awb-padding-top-small:30px;--awb-padding-bottom-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:80px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:9.6%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:9.6%;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3 fusion-no-small-visibility fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p style=\"font-size: 18px;\" data-fusion-font=\"true\">Why us?<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Why You Should Choose the CYBER CURRICULUM<span class=\"registered\">\u00ae<\/span> IT Security Audit<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:80px;--awb-padding-bottom-small:50px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-space-evenly fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-padding-top-small:35px;--awb-padding-right-small:35px;--awb-padding-bottom-small:35px;--awb-padding-left-small:35px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:95%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:95%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Benefits of Our CYBER CURRICULUM<span class=\"registered\">\u00ae<\/span> IT Security Audit<\/h4><\/div><div class=\"fusion-text fusion-text-4 sm-text-align-center fusion-text-no-margin\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>The growing number of cyber attacks is increasingly threatening companies. Many companies are not aware of their current IT security situation and are faced with the challenge of making smart and necessary investments in order to protect themselves effectively. This makes them vulnerable to attacks. With us as your partner, you gain strong advantages for your security and can use the audit to correct weaknesses.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"accordian fusion-accordian\" style=\"--awb-padding-bottom:10px;--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:rgba(0,0,0,0);--awb-divider-hover-color:var(--awb-color8);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color8);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color4);--awb-toggle-active-accent-color:var(--awb-color4);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:22px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-2685-1\"><div class=\"fusion-panel panel-default panel-a587c0dd6b9127e26 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a587c0dd6b9127e26\"><a aria-expanded=\"false\" aria-controls=\"a587c0dd6b9127e26\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2685-1\" data-target=\"#a587c0dd6b9127e26\" href=\"#a587c0dd6b9127e26\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Security gain<\/span><\/a><\/h4><\/div><div id=\"a587c0dd6b9127e26\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a587c0dd6b9127e26\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span style=\"color: #ffffff;\">IT audits help to identify and close security gaps, thereby strengthening data integrity and confidentiality.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-adc8ebac44b839b49 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_adc8ebac44b839b49\"><a aria-expanded=\"false\" aria-controls=\"adc8ebac44b839b49\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2685-1\" data-target=\"#adc8ebac44b839b49\" href=\"#adc8ebac44b839b49\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Compliance<\/span><\/a><\/h4><\/div><div id=\"adc8ebac44b839b49\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_adc8ebac44b839b49\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p style=\"color: rgb(255, 255, 255);\">Companies can ensure that they comply with all legal regulations and industry standards, which minimizes legal and financial risks.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-272016f2a2e73e55f fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_272016f2a2e73e55f\"><a aria-expanded=\"false\" aria-controls=\"272016f2a2e73e55f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2685-1\" data-target=\"#272016f2a2e73e55f\" href=\"#272016f2a2e73e55f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Increased efficiency<\/span><\/a><\/h4><\/div><div id=\"272016f2a2e73e55f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_272016f2a2e73e55f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>\n\t\t<span style=\"color: rgb(255, 255, 255);\">IT audits identify inefficient processes and resources, leading to cost savings and better use of resources.<\/span>\n\t<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-39b17252417583bfd fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_39b17252417583bfd\"><a aria-expanded=\"false\" aria-controls=\"39b17252417583bfd\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2685-1\" data-target=\"#39b17252417583bfd\" href=\"#39b17252417583bfd\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Risk minimization<\/span><\/a><\/h4><\/div><div id=\"39b17252417583bfd\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_39b17252417583bfd\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>\n\t\t<span style=\"color: rgb(255, 255, 255);\">Weak points are identified and evaluated, which helps to reduce potential risks and minimize downtime.<\/span>\n\t<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-f33f44fd204ff9b81 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_f33f44fd204ff9b81\"><a aria-expanded=\"false\" aria-controls=\"f33f44fd204ff9b81\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2685-1\" data-target=\"#f33f44fd204ff9b81\" href=\"#f33f44fd204ff9b81\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Quality control<\/span><\/a><\/h4><\/div><div id=\"f33f44fd204ff9b81\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_f33f44fd204ff9b81\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>\n\t\t<span style=\"color: rgb(255, 255, 255);\">IT audits promote consistent quality in the IT infrastructure and processes, which has a positive impact on service quality.<\/span>\n\t<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-5d557cc21a5cf9118 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_5d557cc21a5cf9118\"><a aria-expanded=\"false\" aria-controls=\"5d557cc21a5cf9118\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2685-1\" data-target=\"#5d557cc21a5cf9118\" href=\"#5d557cc21a5cf9118\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Gaining confidence<\/span><\/a><\/h4><\/div><div id=\"5d557cc21a5cf9118\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_5d557cc21a5cf9118\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>\n\t\t<span style=\"color: rgb(255, 255, 255);\">The results of an IT audit can strengthen the trust of customers, partners and stakeholders, as they prove the security and reliability of the IT systems.<\/span>\n\t<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:0px;--awb-padding-top-medium:0px;--awb-padding-top-small:30px;--awb-padding-bottom-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:80px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:9.6%;--awb-width-medium:100%;--awb-order-medium:0;--awb-margin-top-medium:0px;--awb-spacing-right-medium:9.6%;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5 fusion-no-small-visibility fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p style=\"font-size: 18px;\" data-fusion-font=\"true\">4 steps to your audit<\/p>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Process of Our IT Security Audit<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-padding-top-medium:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:50px;--awb-margin-top-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-top-medium:20px;--awb-padding-right-medium:20px;--awb-padding-bottom-medium:20px;--awb-padding-left-medium:20px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">1.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Comprehensive initial consultation and detailed scope clarification<\/h4><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;  \">Our experts will discuss with you to determine the scope of the upcoming IT Security Audit. We ask that you provide us with a specific contact person who will serve as a point of contact throughout the audit process. This person will provide us with valuable insight into your IT environment and ensure that all your concerns are addressed appropriately during the audit.<\/p>\n<p style=\"text-align: left;  \">During the initial meeting, your contact person will give us a rough overview of the structure of your IT infrastructure. We then jointly define the time frame in which the audit will be carried out. This careful planning and preparation forms the basis for a successful audit process.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-top-medium:20px;--awb-padding-right-medium:20px;--awb-padding-bottom-medium:20px;--awb-padding-left-medium:20px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">2.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Implementation of the defined measures &amp; review<\/h4><\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">Our experienced auditors are now ready to carry out the actual audit of your IT infrastructure and processes. We carefully analyze all relevant elements of your IT, including hardware, software, networks and databases. We place a special focus on reviewing your IT security measures in order to identify and evaluate potential vulnerabilities.  <\/p>\n<p style=\"text-align: left;\">This also includes analyzing data integrity and availability as well as your data backup and recovery strategies. We also check whether your organization meets the applicable compliance guidelines and legal regulations. Our aim is to provide you with a comprehensive insight into the status of your IT environment.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-top-medium:20px;--awb-padding-right-medium:20px;--awb-padding-bottom-medium:20px;--awb-padding-left-medium:20px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">3.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Detailed documentation and transparent reporting<\/h4><\/div><div class=\"fusion-text fusion-text-11\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;  \">Once the audit is complete, we carefully document all results. This includes recording all identified weaknesses, risks and recommendations for improvement. The results are summarized in a final report, which contains the main audit report, a clear summary of the results and clear recommendations.<\/p>\n<p style=\"text-align: left;  \">This report serves as the basis for communicating the results to your management and other relevant stakeholders. Reporting is an important step, as it forms the basis for future measures and decisions.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-top-medium:20px;--awb-padding-right-medium:20px;--awb-padding-bottom-medium:20px;--awb-padding-left-medium:20px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">4.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Follow-up and implementation of recommendations<\/h4><\/div><div class=\"fusion-text fusion-text-13\" style=\"--awb-content-alignment:center;--awb-text-color:#ffffff;--awb-margin-top:20px;\"><p style=\"text-align: left;\">After receiving the final report, we will continue to be at your side. Based on the recommendations identified, we work with you to develop an action plan to eliminate the weaknesses and implement the recommended measures. Our experts monitor and track the implementation to ensure that the necessary improvements are made promptly.  <\/p>\n<p style=\"text-align: left;\">We recommend regular reviews and updates of your IT strategy and security policies based on the results of the audit.  <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-padding-top-medium:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:14px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-margin-top-medium:0px;--awb-spacing-right-medium:0%;--awb-margin-bottom-medium:0px;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:1;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-1 fusion-no-small-visibility\" data-id=\"1\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/15.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-bottom-small:60px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:1;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:25px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-14 sm-text-align-center fusion-text-no-margin\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p style=\"font-size: 18px;\" data-fusion-font=\"true\">Cyber security for your company<\/p>\n<\/div><div class=\"fusion-title title fusion-title-10 fusion-no-small-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Maximum security for your data<\/h3><\/div><div class=\"fusion-title title fusion-title-11 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">MAXIMUM SECURITY FOR YOUR DATA<\/h4><\/div><div class=\"fusion-lottie fusion-lottie-2 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"2\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/15.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-text fusion-text-15 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p>Our cyber security experts work around the clock to protect your company from cyber threats. The IT audit is the first step towards cyber security. With state-of-the-art technologies and proven security strategies, we ensure that your data and digital assets are always secure.  <\/p>\n<\/div><ul style=\"--awb-margin-bottom:30px;--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Advanced detection<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Training &amp; awareness<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Customized solutions<\/p>\n<\/div><\/li><\/ul><div class=\"sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-padding-top-medium:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:14px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-bottom-small:60px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-16 sm-text-align-center fusion-text-no-margin\" style=\"--awb-content-alignment:left;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p style=\"font-size: 18px;\" data-fusion-font=\"true\">Cloud services<\/p>\n<\/div><div class=\"fusion-title title fusion-title-12 fusion-no-small-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Efficient cloud computing for your company<\/h3><\/div><div class=\"fusion-title title fusion-title-13 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">EFFICIENT CLOUD COMPUTING FOR YOUR COMPANY<\/h4><\/div><div class=\"fusion-lottie fusion-lottie-3 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"3\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/6-3.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-text fusion-text-17 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p>Our team of cloud experts offers you tailor-made solutions to optimize your IT infrastructure and reduce costs. Find out in a free initial consultation how you can become more flexible, scalable and productive.<\/p>\n<\/div><ul style=\"--awb-margin-bottom:30px;--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Scalable &amp; flexible<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Cost-efficient<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Reliable &amp; safe<\/p>\n<\/div><\/li><\/ul><div class=\"sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:1;--awb-spacing-right-medium:0%;--awb-margin-bottom-medium:0px;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-4\" data-id=\"4\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/6-3.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-padding-top-medium:0px;--awb-padding-top-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion-flex-column fusion-animated borderhover2\" style=\"--awb-padding-top:100px;--awb-padding-right:80px;--awb-padding-bottom:100px;--awb-padding-left:80px;--awb-padding-right-medium:40px;--awb-padding-bottom-medium:80px;--awb-padding-left-medium:40px;--awb-padding-top-small:40px;--awb-padding-right-small:30px;--awb-padding-bottom-small:40px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-top:0px;--awb-border-right:0px;--awb-border-bottom:0px;--awb-border-left:0px;--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:100%;--awb-margin-top-large:40px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:6px;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-18 md-text-align-center sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p style=\"color: var(--awb-color1); font-size: 18px;\" data-fusion-font=\"true\">Lead your company securely into the digital future!<\/p>\n<\/div><div class=\"fusion-title title fusion-title-14 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">Your IT Security Audit by CYBER CURRICULUM<span class=\"registered\">\u00ae<\/span><\/h2><\/div><div class=\"fusion-text fusion-text-19 md-text-align-center sm-text-align-center\"><p style=\"color: rgb(255, 255, 255);\">Our team of experts is ready to analyze and strengthen your IT infrastructure. Find out how you can optimize your information technology and minimize risks. Get in touch with us today!<\/p>\n<\/div><div class=\"md-text-align-center sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_3 1_3 fusion-flex-column\" style=\"--awb-padding-right-medium:100px;--awb-padding-left-medium:100px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:50px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-5 fusion-no-small-visibility\" data-id=\"5\" style=\"--awb-margin-top:-90px;--awb-margin-right:-70px;--awb-margin-bottom:-150px;--awb-margin-left:-70px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"viewport\" data-start_point=\"0\" data-end_point=\"100\" data-animationoffset=\"top-into-view\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-lottie fusion-lottie-6 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"6\" style=\"--awb-margin-top:-70px;--awb-margin-right:-100px;--awb-margin-bottom:-50px;--awb-margin-left:-100px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":0,"parent":2668,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2685","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Audit - CyberCurriculum<\/title>\n<meta name=\"description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Audit - CyberCurriculum\" \/>\n<meta property=\"og:description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberCurriculum\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T06:12:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"51 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/it-audit\\\/\",\"url\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/it-audit\\\/\",\"name\":\"IT Audit - CyberCurriculum\",\"isPartOf\":{\"@id\":\"\\\/#website\"},\"datePublished\":\"2023-12-20T13:56:00+00:00\",\"dateModified\":\"2024-04-22T06:12:36+00:00\",\"description\":\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/it-audit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/it-audit\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/it-audit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security &amp; Compliance\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"\\\/#website\",\"url\":\"\\\/\",\"name\":\"CyberCurriculum\",\"description\":\"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Audit - CyberCurriculum","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/","og_locale":"en_US","og_type":"article","og_title":"IT Audit - CyberCurriculum","og_description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","og_url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/","og_site_name":"CyberCurriculum","article_modified_time":"2024-04-22T06:12:36+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"51 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/","url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/","name":"IT Audit - CyberCurriculum","isPartOf":{"@id":"\/#website"},"datePublished":"2023-12-20T13:56:00+00:00","dateModified":"2024-04-22T06:12:36+00:00","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","breadcrumb":{"@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/it-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cyber-curriculum.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"IT Security &amp; Compliance","item":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/"},{"@type":"ListItem","position":3,"name":"IT Audit"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"CyberCurriculum","description":"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/comments?post=2685"}],"version-history":[{"count":19,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2685\/revisions"}],"predecessor-version":[{"id":3976,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2685\/revisions\/3976"}],"up":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2668"}],"wp:attachment":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/media?parent=2685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}