Information security
Benefit now with ACM
Maximize your information security
Learn how to minimize risks and avoid economic damage.
Definition of information security, protection aspects, implementation strategies
You probably attach great importance to your privacy and data security, but did you know that it is also important to protect your information? Information security is becoming increasingly important in today's digital world. In a world where the company's data and personal data are regularly stolen or misused, it is essential to provide and minimize risks. There is no doubt that information security is important. However, it can be difficult to decide what action you should take. Fortunately, our experts are here to help you. With our advice, you can learn how to minimize risks and avoid economic damage.
Our team consists of experts with many years of experience in terms of information security and data protection. We understand the importance of a robust information security system for companies of all sizes and industries. Our consulting services include the development of cyber security strategies and the implementation of tools and technologies to improve the security of your systems and networks. Furthermore, we support you in improving your security awareness and developing guidelines and procedures for handling personal data. To meet the specific needs of your company, we also develop tailored solutions. If you would like to find out more about our consulting services or need help with the implementation, please contact us! With our expertise at your side, you can ensure that your information is safer than ever before – so you can head up for other things!
We ensure your security – information security management by professionals.
In order to ensure a sustainable level of protection for companies and managing directors and to minimize risks, the implementation of an information security management system (ISMS) is necessary. This ISMS must have an appropriate organisational structure to meet the constant requirements for security. To ensure the integrity of the company's data, regularly verified processes should be created and followed.
Where are there still weaknesses in information security?
What is your company's strength? In order to obtain the best possible assessment, you can use our service and carry out a review of the technical and organisational measures for information security. Are the existing safeguards mutually suffixed or are there any weaknesses to be resolved? We offer safety audits according to the VDA ISA catalogue, ISO 27001 or industry-specific security standards of the KRITIS industries. In addition, we also carry out technical safety checks such as vulnerability analyses or penetration tests. Why not use our service to find out how safe your business is?
Further information for you:
The international standard ISO/IEC 27001 describes minimum requirements for the setup, implementation, maintenance and continuous improvement of an information security management system (ISMS). The structure and structure of ISO 27001 is identical to the structure and structure of other management system standards such as ISO 9001, ISO 14001 or ISO 45001, which is why this standard is well suited for an integrated management system. The introduction and implementation of ISO 27001 can take place voluntarily, but is increasingly required by individual customers or other bodies.
Compliance with ISO 27001 is essential for any company that is active at international level to ensure that information security is ensured by globally recognised criteria.
According to the law, critical infrastructure operators are requested to implement the security of the relevant plants and services in accordance with the current state of the art and to have it examined by a qualified body. This examination is often based on industry-specific safety standards (B3S), which were usually developed by the associations and approved by the Federal Office for Information Security.
The VdS 10000 guidelines are based on the recognised ISO 27001 and BSI basic protection standards. Thus, the requirements of the VdS 10000 represent a subset of the basic IT protection scheme and form a good basis for the implementation of an ISMS according to IT basic protection or ISO 27001. As a result, certification according to VdS 10000 can also be the entry into the ISO 27000 series at any time, in which companies can also be supported by VdS. The VdS 10000 framework is complemented by the VdS 10020 guidelines, which provide a guide to interpreting and implementing the VdS 10000 for industrial automation systems.
TISAX®* stands for “Trusted Information Security Assessment Exchange”, which means freely translated means this “trustworthy exchange of information security assessments”. This is an industry-specific standard for the automotive industry, which is based on a platform. "Exchange") is available to the participants. The ISMS according to TISAX® is based on the ISA (Information Security Assessment) catalogue. The VDA (Association of the Automotive Industry Association) is supervised by TISAX®. The advantage of this standard, similar to certification, is that results of an evaluation of the ISMS are available to all customers across all companies and are recognised. The clients from the automotive industry demand an ISMS in their supply chain according to TISAX®, it can be assumed that further car manufacturers will join this.
Request: Information security
More customer satisfaction – thanks to TOP CONSULTING
In all consulting topics, both the service portfolio and the many years of expertise of the ACM can be completely convincing. With its wide range of know-how in the IT sector, ACM offers professional solutions for individual requirements. In-house or remote – according to customer requirements.


