Whitehat hackers make you strong against cyberattacks: TV channel report on ProSec

After the radio station SWR3 and the Sat1 news program 17:30 had already invited our founder and CEO Tim as an expert on the hacking attack on the state administration of the Rhein-Pfalz district, the Landesschau Rheinland-Pfalz now shows insights into the work of the "ethical hackers" - or Whitehats - at ProSec.

In the post, Tim and Co-Founder Immanuel talk about our mission, their personal motivations, and why companies and government agencies shouldn't take hacking incidents for granted.

Table of contents

Cyberattacks should not be taken for granted

At the beginning of the article, Tim tells of a formative personal experience that makes the urgency of our mission clear: When his wife was ill with cancer, a treatment once could not be carried out as planned because the hospital in question had just been hacked. What Tim found most shocking was the matter-of-factness with which the attending physician accepted this incident.

As a result, Tim whitehatted his way into the hospital WLAN and left a message for the CEO: You can also do IT security right and actively protect yourself from such hacking attacks. This is where our mission comes from, which Immanuel sums up in a nutshell:

Immanuel Baer | CO-Founder ProSec

We use attackers' methods and technologies to do something good and save lives.

Tim and Immanuel describe the approach of our whitehat hackers figuratively: We hold our customers' IT system under water like a bicycle's inner tube and "look out to see where it's bubbling".
You want to make your IT strong against hacker attacks?
Our whitehats will find your company's vulnerabilities and
help you close them!
To the penetration test

Anyone can learn this - whitehats are not magicians

We cannot achieve our vision of a secure digital world alone. That's why an important part of our daily work is to share our knowledge and empower companies and government agencies to take action themselves in the fight against cybercrime.

Because Tim makes it clear: "Anyone can learn this!" Hacking and IT security are not witchcraft. With the right partner at their side, every company and administration can set up and secure their own IT systems properly. Even the simplest things, such as the right password policy, can often help: passwords should be as complex as possible and one password should not be used for all accounts and services.

Tim Schughart | CEO ProSec
We get 65% of passwords in every company - because they are so bad.

An important step for Tim is to improve training in the area of IT security away from the large certification landscape. We are working on this, for example, through our collaboration with the Chamber of Industry and Commerce and our training courses. At the same time, we are removing formal hurdles wherever possible on the way to our industry in order to open up opportunities for career changers with the right motivation.

ProSec is a family

Despite all the seriousness and urgency of the topic, it becomes clear in the article that one thing is never neglected at ProSec: a large portion of passion and joy in the work. Immanuel and Tim are amused to note that their collaboration is "like a marriage" and a true partnership.

I have two partners: one with a ring and one sitting here next to me!

There is a place in our ProSec family for anyone who is passionate about IT security, retains the joy of learning, and supports us in bringing that enthusiasm and our knowledge to our customers. Because only when a true collaboration with our customers is created, does it move us forward in our mission.

In the video report about ProSec in the Landesschau Rhineland-Palatinate you can take a look at our daily work and also get information about the latest hacking incidents in Rhineland-Palatinate:

Article about ProSec in the Landesschau Rhineland-Palatinate from 04.11.2022

With keyboard and know-how against cybercrime
Become a Whitehat at ProSec!
Family members wanted
ProSec Kerberos Attacks
Kerberos Attacks

Kerberos ist das überwiegend genutzte Authentifizierung-Protokoll im Microsoft Active Directory und hat dort in der alltäglichen Verwendung den New Technology

Read more "

Table of contents

Do you want to be part of our team?