One Study – Two Perspectives: Do energy suppliers know their customers?

IT security in companies is becoming increasingly important. Hacker attacks and the feared blackout should push an IT security concept to the top of your to-do list. A protection zone concept is part of a comprehensive safety plan.

Here we will explain to you which six steps you need to follow in order to create such a protection zone concept:

1st step: Inventory

Take stock of your processes, tools and IT infrastructure. The most important questions: Which data is collected? Which employees will have access to which data?

2nd step: Priority list and risk analysis

Classify the data into different risk levels. Most important question: To what level should the data be protected? This will result in an onion skin model with two to four protection zones.

3rd step: Protective measures

Define suitable protective measures. A dual vendor strategy is recommended. Two firewalls from different manufacturers will provide better protection.

4th step: Revise processes

Identify the affected processes and revise them to comply with the new security policy.

5th step: Edcation and training

You can't do it without it: sensitise your employees to the subject of security. Training should familiarise your employees with the new security measures - and fit for the new processes.

6th step: Check cooperation with external parties

Don't forget the IT service providers you work with. Evaluate contracts and modify them to match new processes and requirements.


Use framework agreements. Within these framework agreements, smaller individual orders can run separately. This makes it easier to manage risks. If any occur, they only affect individual areas but do not run through the entire project.

Read more about IT strategy and IT security here.

As consultants for transformation projects and IT strategy, IT security is a main topic at AXXCON. Do you have any questions or do you need support? We will be pleased to help you.



+49 6196 9549376

AXXCON Outsourcing

IT outsourcing: Identifying the right provider – what you should pay attention to

Have you decided to outsource? Then it’s about which external (IT) service provider to consider and what you need to do in order to prepare for outsourcing. In this article, I will give you a few hints which points you should be aware of.

Pros and cons of outsourcing: When does outsourcing pay off?

There are good reasons for outsourcing. It helps to do things efficiently, to save costs, to increase turnover and much more. If used and implemented correctly, outsourcing can generate numerous advantages for you. But for which tasks does outsourcing make sense?