{"id":13078,"date":"2024-07-02T10:02:11","date_gmt":"2024-07-02T10:02:11","guid":{"rendered":"https:\/\/terrera.my-new.page\/?page_id=13078"},"modified":"2025-02-07T13:28:39","modified_gmt":"2025-02-07T13:28:39","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/terrera.my-new.page\/en\/consulting\/strategy\/cyber-security\/","title":{"rendered":"Cyber Security\u00a0"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"13078\" class=\"elementor elementor-13078\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ac3748 e-con-full e-flex e-con e-parent\" data-id=\"6ac3748\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d8c57a0 e-con-full e-flex e-con e-child\" data-id=\"d8c57a0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f0cb588 e-flex e-con-boxed e-con e-child\" data-id=\"f0cb588\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-475edcd elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"475edcd\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-13c1414 e-con-full element e-flex e-con e-child\" data-id=\"13c1414\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-babb61e elementor-widget__width-initial elementor-absolute elementor-widget elementor-widget-spacer\" data-id=\"babb61e\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8644e3 elementor-widget__width-initial elementor-absolute elementor-widget elementor-widget-spacer\" data-id=\"f8644e3\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ded910c e-con-full e-flex e-con e-parent\" data-id=\"ded910c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f9d52d0 e-flex e-con-boxed e-con e-child\" data-id=\"f9d52d0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-51d3549 e-con-full e-flex e-con e-child\" data-id=\"51d3549\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-796d6ec gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"796d6ec\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security \u2013 your security boost in your company! <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7acfb2 elementor-widget elementor-widget-text-editor\" data-id=\"c7acfb2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Are you already actively protecting your company&#039;s IT from damage and third-party interference? In times of digitalization, cyber security has become one of the most important tasks for your company. Here at Terrera, we take the associated challenges seriously and offer you the complete package you want at any time. From a comprehensive analysis of your existing situation to new approaches and IT mechanisms, we keep an eye on your cyber security. Together with our team, you will remain protected despite digital risks and rely on innovative IT solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9b154b btnDark elementor-align-left elementor-widget elementor-widget-button\" data-id=\"a9b154b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get advice now!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44a72d6 e-con-full e-flex e-con e-child\" data-id=\"44a72d6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3680a9b elementor-widget elementor-widget-image\" data-id=\"3680a9b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"673\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/cyber-security-1.png\" class=\"attachment-large size-large wp-image-13706\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/cyber-security-1.png 872w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/cyber-security-1-300x253.png 300w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/cyber-security-1-768x646.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c1dfd7 e-con-full e-flex e-con e-parent\" data-id=\"7c1dfd7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-032c7c7 bgoverlay e-flex e-con-boxed e-con e-child\" data-id=\"032c7c7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ab645fa e-con-full e-flex e-con e-child\" data-id=\"ab645fa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed02428 gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"ed02428\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What does our continuous cyber security include? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07f4a88 elementor-widget elementor-widget-image\" data-id=\"07f4a88\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"673\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/What-does-our-continuous-cyber-security-include.png\" class=\"attachment-large size-large wp-image-13708\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/What-does-our-continuous-cyber-security-include.png 872w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/What-does-our-continuous-cyber-security-include-300x253.png 300w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/What-does-our-continuous-cyber-security-include-768x646.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43d4755 e-con-full e-flex e-con e-child\" data-id=\"43d4755\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-80b1b98 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"80b1b98\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With our cyber security strategy, you can expect a wide range of services designed to protect your company from increasingly complex cyber threats. At the forefront of our offering is the continuous monitoring and analysis of your network and systems. We use smart detection technologies to identify suspicious activities in advance and close potential security gaps before they become exploitable.<\/p><p>In addition, our service includes regular security assessments and risk analyses to continuously improve your cyber strategies. We adapt our IT strategies to the specific needs and requirements of your company, taking into account both industry-specific and global compliance standards. Training and awareness programs for your employees are another part of our cyber security service. By combining technical expertise and a focus on active prevention, we help you move forward.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a735ad btnLight elementor-align-left elementor-widget elementor-widget-button\" data-id=\"3a735ad\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-768dec0 e-con-full e-flex e-con e-parent\" data-id=\"768dec0\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2e7655b e-con-full e-flex e-con e-child\" data-id=\"2e7655b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-8a018fa e-flex e-con-boxed e-con e-child\" data-id=\"8a018fa\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0155774 gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0155774\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The benefits of our cyber security in ongoing business\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e23e7e elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7e23e7e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementing our cyber security services offers your company numerous benefits that go far beyond simply defending against cyber attacks. A key aspect is strengthening your business operations by ensuring a secure and trustworthy IT environment. But beyond that, as part of our consulting on your new cyber security strategy, we also offer a variety of practical advantages from which you can benefit in your company:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff34370 e-grid e-con-full visContainerCard  e-con e-child\" data-id=\"ff34370\" data-element_type=\"container\">\n\t\t<a class=\"elementor-element elementor-element-462e838 e-con-full spcontainer e-flex e-con e-child\" data-id=\"462e838\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f172bf9 elementor-widget__width-auto s-img elementor-widget elementor-widget-image\" data-id=\"f172bf9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"467\" height=\"461\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Improved-operational-reliability.png\" class=\"attachment-large size-large wp-image-15440\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Improved-operational-reliability.png 467w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Improved-operational-reliability-300x296.png 300w\" sizes=\"(max-width: 467px) 100vw, 467px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b57c65 scontainer e-con-full e-flex e-con e-child\" data-id=\"4b57c65\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bced65a elementor-widget elementor-widget-heading\" data-id=\"bced65a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Improved operational reliability\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-149795c mytext innContainer elementor-widget elementor-widget-text-editor\" data-id=\"149795c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>By continuously monitoring and analyzing your network and systems, potential threats are identified and repelled early, keeping your operations smooth and downtime to a minimum. A stable IT environment allows your company to focus on its core business without having to worry about security concerns. This helps to increase the trust of your customers, as they can rest assured that their data is also handled securely in every department.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-a8362e0 e-con-full spcontainer e-flex e-con e-child\" data-id=\"a8362e0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-371e278 elementor-widget__width-auto s-img elementor-widget elementor-widget-image\" data-id=\"371e278\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"467\" height=\"461\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/IT-skills-of-your-employees.png\" class=\"attachment-large size-large wp-image-15441\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/IT-skills-of-your-employees.png 467w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/IT-skills-of-your-employees-300x296.png 300w\" sizes=\"(max-width: 467px) 100vw, 467px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-231e1a8 scontainer e-con-full e-flex e-con e-child\" data-id=\"231e1a8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2635ad9 elementor-widget elementor-widget-heading\" data-id=\"2635ad9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Increasing the IT competence of your employees\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a2aa61 mytext innContainer elementor-widget elementor-widget-text-editor\" data-id=\"0a2aa61\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Tailored training programs raise your employees&#039; awareness of cyber security risks. A well-informed workforce can better respond to potential threats and prevent them from developing into serious security incidents. Employees learn how to recognize phishing attempts and how to handle sensitive data safely. This reduces the risk of data leaks or security breaches caused by human error and also enables a strong security culture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-551df2f e-con-full spcontainer e-flex e-con e-child\" data-id=\"551df2f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c461b47 elementor-widget__width-auto s-img elementor-widget elementor-widget-image\" data-id=\"c461b47\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"467\" height=\"461\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Reducing-the-overall-cost-of-IT-security.png\" class=\"attachment-large size-large wp-image-15439\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Reducing-the-overall-cost-of-IT-security.png 467w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Reducing-the-overall-cost-of-IT-security-300x296.png 300w\" sizes=\"(max-width: 467px) 100vw, 467px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-474865f scontainer e-con-full e-flex e-con e-child\" data-id=\"474865f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-280cfd0 elementor-widget elementor-widget-heading\" data-id=\"280cfd0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reducing the overall cost of IT security\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2450e29 mytext innContainer elementor-widget elementor-widget-text-editor\" data-id=\"2450e29\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>By integrating our comprehensive cyber security services, you can realize significant cost savings. By identifying and neutralizing potential security threats at an early stage, you can avoid costly security incidents and data breaches that can lead to reputational loss as well as direct financial damage. Investing in preventative security measures and continuous monitoring saves your company the long-term costs associated with fixing major security gaps.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a642605 e-con-full e-flex e-con e-parent\" data-id=\"a642605\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-c6daccd e-flex e-con-boxed e-con e-child\" data-id=\"c6daccd\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a6ddfb8 e-con-full e-flex e-con e-child\" data-id=\"a6ddfb8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5e5732 gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f5e5732\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Holistic and safe with our full service <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8755dd elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"b8755dd\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our full-service offering in the area of cyber security includes a holistic view and protection of your IT infrastructure. We address the individual requirements of your business and support you from the first risk assessment. This comprehensive approach ensures that no aspects of your cyber security are neglected and that you always benefit from a robust and up-to-date defense. After many years of practical experience, we provide you with a flexible and scalable system that records and continuously improves existing security strategies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca183ff btnLight elementor-align-left elementor-widget elementor-widget-button\" data-id=\"ca183ff\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b396edf e-con-full e-flex e-con e-child\" data-id=\"b396edf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b545ca0 elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"b545ca0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"976\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/safe-e1720188376166-839x1024.png\" class=\"attachment-large size-large wp-image-13707\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/safe-e1720188376166-839x1024.png 839w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/safe-e1720188376166-246x300.png 246w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/safe-e1720188376166-768x938.png 768w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/safe-e1720188376166.png 851w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae82dfe e-con-full e-flex e-con e-parent\" data-id=\"ae82dfe\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a68fa11 e-flex e-con-boxed e-con e-child\" data-id=\"a68fa11\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8ec3e70 e-con-full e-flex e-con e-child\" data-id=\"8ec3e70\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75ba56b gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"75ba56b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The best choice for continuous improvement <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dab69a4 elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"dab69a4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"673\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/best-choice-for-continous-improvement.png\" class=\"attachment-large size-large wp-image-13710\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/best-choice-for-continous-improvement.png 872w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/best-choice-for-continous-improvement-300x253.png 300w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/best-choice-for-continous-improvement-768x646.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c248c8d e-con-full e-flex e-con e-child\" data-id=\"c248c8d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c857b7a elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"c857b7a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Continuous training enables us to take a fresh and innovative look at your IT. We are always on the lookout for the latest and most effective security technologies that can help you protect your company. We understand that the cyber threat landscape is dynamic and constantly evolving. That&#039;s why we use an agile approach that enables us to respond quickly to new threats and adapt security measures accordingly.<\/p><p>In addition, we offer detailed analyses of your company&#039;s security situation to give you a clear overview of the effectiveness of the measures implemented. This proactive approach enables us to identify and fix vulnerabilities before they can be exploited by attackers. Our Terrera IT experts work closely with your team to ensure that all new security measures can be seamlessly integrated into your existing business processes. This promotes smooth and secure business operations in the long term.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3ff269 btnDark elementor-align-left elementor-widget elementor-widget-button\" data-id=\"f3ff269\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3e9be3 e-con-full e-flex e-con e-parent\" data-id=\"d3e9be3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-93032bf e-flex e-con-boxed e-con e-child\" data-id=\"93032bf\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c458cf e-con-full e-flex e-con e-child\" data-id=\"3c458cf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb112ac gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"cb112ac\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Take advantage of our cyber security consulting at Terrera! <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20a971a elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"20a971a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here at Terrera, you can expect holistic and proactive cyber security consulting that focuses on protecting your IT. Our goal is not only to make your IT systems more resilient to cyber attacks, but also to ensure that your security measures support your business ambitions. With Terrera, you not only get protection against the latest cyber threats, but a real partner who ensures your digital security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41f4351 btnDark elementor-align-left elementor-widget elementor-widget-button\" data-id=\"41f4351\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get advice now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f65b5a3 e-con-full e-flex e-con e-child\" data-id=\"f65b5a3\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cyber Security \u2013 Ihr Sicherheitsboost im Unternehmen! Sch\u00fctzen Sie Ihre betriebliche IT bereits aktiv vor Sch\u00e4den und Fremdeingriffen? Die Cyber Security hat sich in Zeiten der Digitalisierung zu einer der tragenden Aufgaben f\u00fcr Ihr Unternehmen entwickelt. Hier bei Terrera nehmen wir die damit verbundenen Herausforderungen ernst und bieten Ihnen jederzeit das gew\u00fcnschte Komplettpaket. Von einer [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":13133,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13078","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages\/13078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/comments?post=13078"}],"version-history":[{"count":97,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages\/13078\/revisions"}],"predecessor-version":[{"id":19285,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages\/13078\/revisions\/19285"}],"up":[{"embeddable":true,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages\/13133"}],"wp:attachment":[{"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/media?parent=13078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}