How secure is my company?

How secure is my company?
Lirika Gojani
How can we support you with your IT project?

Lirika Gojani
Content Marketing Specialist

+41.. Show number

Medium-sized businesses are heavily targeted by cybercriminals these days because they have a lot of valuable data, but usually don’t have the same resources to protect it. But why is information security so essential in today’s world? And what are the essential steps companies must take to effectively protect themselves from cyber threats? In this interview, our information security expert Stephanie shares indispensable insights and valuable tips for a cybersecurity strategy that works.

The ISO/IEC 27001 certification occupies a significant position in this regard. As a leading international standard and authoritative certification in the field of cybersecurity, it provides guidelines for structuring, implementing, monitoring and improving information security measures.

5 questions for soxes security expert Stephanie DuMosch

What advice would you give to other companies regarding information security?  

Stephanie DuMosch: It is important to be aware of your security gaps and to invest in information security. A cyber attack can cost a company dearly. A good start is to increase employees’ awareness of this issue. Attackers often take advantage of employees’ ignorance to infiltrate malware – e.g. via a phishing email – into a company.

Which protective measures are particularly relevant for SMEs?  

The biggest risk factor for any company is and remains the human factor. Increasing employees’ awareness of cybercrime is therefore the first and most important measure in my view. Companies must recognise their individual points of attack, know their systems and ensure that someone takes responsibility for their updates.

Despite all caution, an attack cannot be ruled out. It is therefore advisable to have a Business Continuity Plan (BCP), which lists in detail which systems are indispensable and how the company must react in an emergency. To keep the consequences of an attack as low as possible, backups of the most important applications, which must be stored outside the company network, are always suitable.

The biggest risk factor for any company is the human itself.

Stephanie DuMosch. CISO soxes AG

What are your main tasks as Information Security Officer? 

I primarily maintain and expand our information security management system (ISMS). I support our departments with the following tasks:

  • Conduct risk analysis and define measures
  • Define and implement improvement targets
  • Regular performance reviews using defined KPIs
  • Regular communication with internal stakeholders regarding the status of the ISMS
  • Create training plans for employees
  • Regular updating of guidelines and process descriptions

This year, soxes has again been awarded ISO/IEC 27001 certification: What does this mean exactly?  

ISO/IEC 27001 certification is not a one-off exam that you pass and then forget about. Compliance with the requirements is checked annually by an external, accredited auditor. Particular attention is paid to continuous improvement, which is specifically required by ISO/IEC 27001. The beauty of this requirement is that you don’t have to start “perfect”. As a company, you make sure that all requirements are met, then gain experience in practical application and improve what turns out to be unsuitable or insufficient.

How well secured is soxes in dealing with cyber threats?  

ISO/IEC 27001 gives us a long list of reference measures. It provides a comprehensive and great framework for improving our own security. Thanks to the implementation of these and some other measures, we now feel very well secured. However, it is important not to just sit back and rest. We remain vigilant and keep ourselves informed about the latest, possible security gaps and threats.

How can we support you with your IT project?
Lirika Gojani

Lirika Gojani
Content Marketing Specialist

+41.. Show number

This might interest you

Interview with TESTEX: Successful partnership

In this interview, Carole Laimbacher gives us an insight into the succes...

Alexandra Mittmann

Alexandra Mittmann
Team Lead CSM

Artificial intelligence - hype or chance?

Everyone is talking about generative AI. Text and image generators are b...

Lirika Gojani

Lirika Gojani
Content Marketing Specialist

Software development Zürich

Our location in the greater Zurich area enables us to support customers ...

Patrick Büchler

Patrick Büchler
CEO, Partner

Your business software: top or flop?

Have you ever critically scrutinised your software quality? This article...

Robert Schmuck

Robert Schmuck
Head of Development

With KUBE-X: Efficiently developed payable module

An outstanding example of efficient customised solutions is the internal...

Anastasia Schmuck

Anastasia Schmuck
Project Manager

«Help, my software is stuck!»

Software maintenance is the foundation for reliable, secure and long-ter...

Alexandra Mittmann

Alexandra Mittmann
Team Lead CSM

What exactly does an AI developer do?

Artificial intelligence is a forward-looking technology that is shaping ...

Cédric Portmann

Cédric Portmann
Technical Program Manager

10 exciting software myths uncovered!

There are many myths and misconceptions surrounding customised software ...

Lirika Gojani

Lirika Gojani
Content Marketing Specialist

Innovative solutions, great successes

Lars Habermacher, athletics trainer and project manager at OYM AG, gives...

Lirika Gojani

Lirika Gojani
Content Marketing Specialist

Outdated software? And now?

Is your business software getting on in years and causing more problems ...

Patrick Büchler

Patrick Büchler
CEO, Partner

How much does the cloud cost?

Our expertise and experience help you understand the impact and opportun...

Roland Amacher

Roland Amacher
Senior Technical Consultant

How secure is my company?

Why is information security so essential in today's world? And what step...

Lirika Gojani

Lirika Gojani
Content Marketing Specialist

Native vs. Webapp

Native apps are developed for a specific operating system, such as Andro...

Simon Preuss

Simon Preuss
Project Manager

Infrastructure as Code

Infrastructure as Code is a concept that has become increasingly importa...

Cédric Portmann

Cédric Portmann
Technical Program Manager

Contact

Do you have any questions? Would you like to find out more about our services?
We look forward to your enquiry.

Contact us