{"id":1551,"date":"2021-02-07T21:59:24","date_gmt":"2021-02-07T21:59:24","guid":{"rendered":"http:\/\/hkm-consulting.de\/whitepapers\/"},"modified":"2021-02-17T11:47:44","modified_gmt":"2021-02-17T11:47:44","slug":"whitepapers","status":"publish","type":"page","link":"https:\/\/hkm-consulting.de\/en\/whitepapers\/","title":{"rendered":"Whitepapers"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;1540&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Information Management &#8211; Legal Entity, Partners &amp; Prospects<\/h3>\n<p>Data Leakage Prevention<\/p>\n<p>Date: January 2019<\/p>\n<p>Information management is becoming increasingly important in an ever more closely interlinked, digital world. Sharing sensitive data within the company, but also between partners and interested parties, can be seen as one of the most significant challenges of the digital age.<br \/>\nThis analysis shows how this challenge can be countered through the use of modern communications technology.[\/vc_column_text][vc_btn title=&#8221;Herunterladen&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fen%2Fwhitepaper_01%2F|title:Herunterladen&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;1544&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Risk Management &#8211; ISO 2700x Controls<\/h3>\n<p>Enterprise Integrity Management<\/p>\n<p>Date: April 2020<\/p>\n<p>Many companies have already prioritized the implementation of ISO 27000. Certification on the basis of this internationally recognized standard for information security is also being aimed.<br \/>\nHowever, the technological proof of compliance with ISO 2700x controls is often overlooked. Integrity management can provide this proof on a permanent basis.[\/vc_column_text][vc_btn title=&#8221;Herunterladen&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fen%2Fwhitepaper_02%2F|title:Herunterladen&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;1542&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h3>Integrity Management &#8211; Ransomware Detection<\/h3>\n<p>Enterprise Integrity Management<\/p>\n<p>Date: August 2020<\/p>\n<p>The WannaCry ransomware attack was a global cyberattack in May 2017. Huge economic damage was caused worldwide by this encryption Trojan that attacked computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the cryptocurrency Bitcoin.<\/p>\n<p>Comprehensive integrity management can prevent such threats.[\/vc_column_text][vc_btn title=&#8221;Herunterladen&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#4b609f&#8221; outline_custom_hover_background=&#8221;#666666&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; align=&#8221;left&#8221; link=&#8221;url:http%3A%2F%2Fhkm-consulting.de%2Fen%2Fwhitepaper_03%2F|title:Herunterladen&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;1540&#8243; img_size=&#8221;medium&#8221;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text] Information Management &#8211; Legal Entity, Partners &amp; Prospects Data Leakage Prevention Date: January 2019 Information management is becoming increasingly important in an ever more closely interlinked, digital world. Sharing sensitive data within the company, but also between partners and interested parties, can be seen as one of the most significant&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1551","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=1551"}],"version-history":[{"count":13,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1551\/revisions"}],"predecessor-version":[{"id":1589,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1551\/revisions\/1589"}],"wp:attachment":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=1551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}