Strategic IT Security
Tailored Solutions for Long-Term Protection Against Cyber Threats. From IT consulting and incident response to legally compliant risk mitigation — we offer comprehensive protection for your business.
Strategic IT Security Consulting
Long-term cybersecurity requires a well-planned strategy. Our experts analyze your existing IT infrastructure, identify vulnerabilities, and work closely with you to develop customized protective measures. With tailored security concepts, we ensure the sustainable safeguarding of your systems and processes — effectively protecting your organization against both current and emerging cyber threats.
Incident Response Management
A cyberattack can cause significant damage within seconds — we respond within minutes. Our dedicated incident response team is available 24/7 to detect, contain, and remediate threats, restoring your systems quickly and securely. We collect and preserve digital evidence and support your communication with law enforcement and insurance providers. Minimize downtime through fast, professional, and coordinated action.
Legally Compliant IT Law Advisory
Cybercrime involves not only technical but also complex legal challenges. Our legal experts provide guidance in data protection, IT contract law, criminal prosecution, as well as cyber extortion and ransom demands. We help you assert your rights and ensure your response to incidents is legally sound. This includes cryptocurrency tracking and coordination with prosecutors and investigative authorities. With us, you’re always on the legally safe side.
Prevent Security Incidents, Detect Cyberattacks Early
From emergency planning to 24/7 monitoring – protect your business with proactive security solutions.
Incident Response Readiness
A well-prepared incident response strategy is key to defending against cyberattacks quickly and effectively. We develop custom emergency plans tailored to your organization, define clear response protocols, and conduct hands-on simulations. This ensures your team knows exactly what to do in the event of an attack. Solid preparation reduces risks and prevents costly damage.
SOC-Service – Security Operations Center
Your organization is under constant threat – our SOC has your back around the clock. Using advanced analytics tools and seasoned cybersecurity professionals, we monitor your systems in real time. This allows us to detect threats early and stop potential damage before it occurs. Let us handle your digital defense so you can focus on what matters most: your core business.
SIEM Implementation with Elastic
Modern cyber defense relies on intelligent security insights. With Elastic SIEM, we implement a powerful system that automatically detects threats, correlates attacks, and enables targeted countermeasures. Our experts handle the entire setup and customize it to fit your IT environment perfectly. The result: an effective, scalable solution for identifying and mitigating cyber threats.
Securing Digital Evidence, Uncovering Cyber Threats
IT Forensics & Darknet Monitoring for Maximum Security. From legally admissible evidence preservation to threat analysis in the Darknet – protect your business with expert knowledge.
Legally Admissible Evidence Preservation & Expert Reports
Digital traces are often crucial in solving IT security incidents. Our forensic experts secure and analyze IT systems to extract and document legally admissible evidence. We provide expert reports for criminal and civil proceedings and assist in investigations. Rely on our expertise to secure digital evidence professionally and comprehensively.
The Detective
Even in the digital world, there are many connections to the physical reality. Whether it’s personal protection, surveillance, or asset protection – our network partner is a recognized professional in their field. With their experience and expertise, they form an essential pillar in our overall service offering.
Darknet Monitoring & Threat Intelligence
Your data may already be circulating in the Darknet – we help you find out. Using the latest analytical tools, we scour the Darknet for stolen company information, compromised credentials, or illegal offers. Our detailed situational report gives you clarity on potential threats and enables targeted countermeasures. Stay one step ahead and proactively protect your business from cyber risks.
Oliver Hietz
Founder, owner, and keynote speaker at Agentur Cyberschutz. Oliver Hietz served in the Austrian police from 1999 to 2024, primarily in criminal investigations. He is recognized as a leading expert in criminal analysis and cyber fraud.
Michael Meixner, CISSP
Incident Response Manager and Computer Forensics Expert. Court-certified and officially sworn expert for IT systems, IT security, and digital forensics. CEO of Tems Security Services GmbH and Computerforensic & more GmbH. Lecturer at FH Campus Wien.
Mag. Roman Taudes
Attorney at law and co-founder of Vienna-based law firm ATB.LAW. Certified Data Protection Officer (Austrian Standards) and Certified Cryptocurrency Investigator (Blockchain Intelligence Group). A trusted advisor for victims of cybercrime, Roman Taudes is one of Austria’s leading experts in crypto asset tracing, recognized in the Trend 2022 Legal Rankings for top specialists in the cryptocurrency field (Trend Anwaltsranking 2022 – Die Top-Spezialisten im KRYPTO-Bereich).
Daniel Pöchhacker, BSc
Licensed private investigator and owner of Pöchhacker KG Detective Agency. Certified Security Manager (ISM) in accordance with ÖNORM S2415-2, Information Security Manager (CIS) according to ISO 27001, and certified Risk Manager (ONR 49000 ff).
Philip Berger
With years of experience in the analysis, prevention, and resolution of security incidents, I help organizations build resilient, efficient, and future-ready IT infrastructures. My focus is on blending innovative technologies with proven security strategies to ensure both peak performance and maximum protection.
Ing. Alexander Kuchelbacher
Specialist in data center infrastructure and virtualization. Possesses holistic IT expertise and a strong ability to identify complex interconnections. With decades of experience across diverse systems, I adapt quickly and navigate even complex IT environments with ease.
PMO
Case Handler
AD
O365
Storage
AD-CA
Exchange
Forensic
Negotiator
Network
EDR
Firewall
SIEM
LINUX
Backup
DataCenter
Darknet Monitoring
Kryptowährung Nachverfolgung
Detektiv
DFIR TEAM Austria
Comprehensive Cybersecurity – from Prevention to Forensics and Legal Support
We are a coalition of four specialized companies covering IT security, system integration, IT law, and investigative services. Together, we provide end-to-end solutions — from proactive prevention and real-time incident response to digital forensics and legal protection.
Our mission: To effectively protect businesses and individuals from cyber threats and provide expert support and fast response in times of crisis.
Securing Digital Evidence
Protecting IT Systems & Fighting Cyberattacks Effectively
Cyber Forensics & Incident Response – Your Shield Against Digital Threats
Our digital forensics specialists assist in the analysis of digital traces and the secure preservation of evidence — either on-site or in our state-of-the-art forensics lab. We deliver court-admissible reports, conduct in-depth malware analyses, and support you in rapidly restoring your IT systems after an attack.
Through targeted hardening measures and the provision of temporary replacement hardware, we ensure a swift return to secure operations. Rely on our expertise to manage cyber incidents professionally and prevent future attacks.
Prevention & Preparedness
Before the Incident
Security Awareness for Employees
- Phishing and social engineering training (including regular testing and workshops)
- Recognizing suspicious activity and understanding internal reporting procedures
Technical Safeguards
- Network segmentation to limit damage
- Endpoint Detection & Response (EDR) and SIEM systems for rapid threat detection
- Backup strategies (offline backups, regular recovery testing)
- Emergency plans tailored for ransomware incidents
Incident Response Plan
- Development and regular testing of a custom emergency plan
- Clearly defined roles and responsibilities
- Crisis communication protocols for internal and external stakeholders
- Pre-coordination with insurers, legal counsel, and public authorities
Red Team / Blue Team Exercises
- Attack simulations (e.g., penetration testing, red teaming)
- Evaluation of detection and response capabilities under real-world conditions
Immediate Actions & Crisis Management
During the Incident
Initial Response & Isolation
- Identification of affected systems or networks
- Isolating infected systems (without powering them off!)
- Ensuring that logs and evidence are preserved
Forensic Analysis & Containment
- Identifying the attack vector and origin
- Securing and analyzing digital evidence
- Identifying compromised user accounts and credentials
Communication & Crisis Handling
- Internal and external communication strategy (press, customers, partners)
- Collaboration with data protection authorities and law enforcement
- Making informed decisions about ransom payments
Temporary Recovery Measures
- Deploying loan hardware to support critical business operations
- Restoring systems from clean, verified backups
Recovery & Improvement
After the Incident
Long-Term System Hardening
- Identifying and remediating security vulnerabilities
- Implementing Zero Trust principles
- Reviewing and adjusting access rights and privilege concepts
Lessons Learned & Strategic Enhancements
- Creating a detailed incident report for management and IT teams
- Adapting and strengthening the security strategy based on findings
- Increasing automation of security tools for improved detection
Insurance & Legal Follow-Up
- Supporting damage assessment and claims with cyber insurance providers
- If necessary: initiating legal action against attackers or third parties
Rebuilding Trust & Communication
- Targeted communication to reassure clients and partners
- PR strategies to limit reputational damage
- Reviewing and updating contractual and compliance requirements
Our Approach
- Initial Consultation with the Company – Identification of key contacts, emergency phone numbers, and hourly rates for crisis situations.
- Cybersecurity Assessment (1 Day) – Evaluation of the current IT security posture, accompanied by specific recommendations for action.
- On-Call Service – Our team is available 24/7 via phone.
- Experienced Partners – All participating companies are privately owned Austrian businesses with deep expertise in their respective fields.
Emergency assistance
Don’t wait until it’s too late! Request a consultation now and protect your business with the right security measures.