Graham Miranda logo
Graham MirandaNetwork
Security Mindset · Graham Miranda Network

Sicherheitsorientierte Infrastruktur-Bereitschaft

Security readiness at Graham Miranda is the conservative, defensible foundation work: backups that work, identity that is provable, devices that are encrypted, and a written incident-response plan. It is not penetration testing or "cyber" jargon.

security readiness · infrastructure hygiene · backup planning · secure-minded IT
Sicherheitsorientierte Infrastruktur-Bereitschaft Graham Miranda service overview
Überblick

Was diese Seite abdeckt

Ein konservativer, sicherheitsorientierter Überblick über praktische Infrastruktur-Hygiene, Zugriffsbewusstsein, Backup-Denken und verantwortlichen technischen Betrieb.

  • Asset inventory: what data, where, who has access
  • Identity hygiene: MFA enforcement, password manager, admin separation
  • Backup discipline: documented schedule, off-site copy, restore tested
  • Endpoint baseline: encryption, patching, antimalware where appropriate
  • Written incident-response plan suitable for €50–250-staff companies
So arbeiten wir

So arbeiten wir

Ein transparentes Engagement-Modell mit klaren Meilensteinen.

01

Assess

Honest review of current backups, identity, devices, data flows and contracts. Identify the few things that, if they failed, would actually hurt.

02

Lift

Focused work over 4–8 weeks to bring the basics in line. Most of the value lives here.

03

Drill

Lightweight tabletop exercise of the incident-response plan. Document gaps; iterate.

Ergebnisse, die Sie erwarten können

Ergebnisse, die Sie erwarten können

Praktische, ehrliche Erwartungen — keine übertriebenen Versprechen.

Recoverable

Backups actually work in a real restore.

Provable identity

MFA enforced; admin and user accounts separated.

Encrypted devices

Lost laptops are not a breach.

A plan

A written incident-response plan exists, has been read, and has been drilled.

FAQ

Häufige Fragen

Kurze Antworten für Besucher, die Graham-Miranda-Servicebereiche vergleichen.

Do you do penetration testing?

No — we focus on the foundational hygiene that determines whether a pentest finding actually hurts. We can refer to reputable pentest partners when appropriate.

Are you ISO 27001 / SOC 2 auditors?

No, we are not auditors. We help prepare an organisation for audit if certification is the goal.

Is GDPR included?

Operational practices align with GDPR (data inventory, processor agreements, breach notification process). Legal advice on specific scenarios is a lawyer matter.

What about phishing simulation?

Yes, lightweight phishing awareness exercises included in readiness work. Aimed at building habits, not catching individuals.

Do you handle incidents?

Yes — incident-response support is available, with realistic scope: containment, communications, written post-incident review.

Will you sell us security tools?

No commissions. Where a tool is recommended (e.g. password manager, endpoint protection), we name it and explain why; you buy directly.

Nächster Schritt

Sicherheitsorientierte Infrastruktur-Bereitschaft

Ein konservativer, sicherheitsorientierter Überblick über praktische Infrastruktur-Hygiene, Zugriffsbewusstsein, Backup-Denken und verantwortlichen technischen Betrieb.