{"id":2159,"date":"2024-12-10T21:02:15","date_gmt":"2024-12-10T21:02:15","guid":{"rendered":"https:\/\/liquidqube.com\/?page_id=2159"},"modified":"2025-02-15T10:58:26","modified_gmt":"2025-02-15T10:58:26","slug":"cybersecurity-policy","status":"publish","type":"page","link":"https:\/\/www.liquidqube.com\/de\/cybersecurity-policy\/","title":{"rendered":"Cybersecurity-Politik"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2159\" class=\"elementor elementor-2159\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3effd26 e-flex e-con-boxed e-con e-parent\" data-id=\"3effd26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70b728f e-flex e-con-boxed e-con e-parent\" data-id=\"70b728f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-57f31a2 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"57f31a2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-afd95f9 animated-fast elementor-widget elementor-widget-heading\" data-id=\"afd95f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa7a96a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"aa7a96a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bca9db7 elementor-widget elementor-widget-text-editor\" data-id=\"bca9db7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Introduction<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2108266 elementor-widget elementor-widget-text-editor\" data-id=\"2108266\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LiquidQube is committed to maintaining a secure and resilient digital environment to protect our systems, data, and operations. This Cybersecurity Policy outlines the principles and practices we follow to safeguard against cyber threats, ensure compliance with applicable legal and regulatory requirements, and uphold the trust of our customers, employees, and partners.<\/p><p>This policy is aligned with internationally recognised cybersecurity standards and best practices, ensuring a robust approach to identifying, mitigating, and managing security risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c05f60 elementor-widget elementor-widget-text-editor\" data-id=\"9c05f60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Scope<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8052a67 elementor-widget elementor-widget-text-editor\" data-id=\"8052a67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This policy applies to all employees, contractors, suppliers, partners, and stakeholders who interact with LiquidQube\u2019s systems, data, and digital infrastructure. It governs all aspects of cybersecurity, including the use, management, and protection of information systems, software, hardware, and data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b388bb5 elementor-widget elementor-widget-text-editor\" data-id=\"b388bb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Objectives<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a553a72 elementor-widget elementor-widget-text-editor\" data-id=\"a553a72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The objectives of this policy are to:<\/p><p>Protect LiquidQube\u2019s digital assets and sensitive information from unauthorised access, disclosure, alteration, or destruction.<\/p><p>Establish clear roles and responsibilities for cybersecurity within the organisation.<\/p><p>Promote awareness and accountability for cybersecurity among all employees and stakeholders.<\/p><p>Ensure compliance with applicable cybersecurity laws, regulations, and standards.<\/p><p>Provide a framework for responding to and recovering from cybersecurity incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-434c28a elementor-widget elementor-widget-text-editor\" data-id=\"434c28a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Key Principles<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-287d439 elementor-widget elementor-widget-text-editor\" data-id=\"287d439\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Risk Management<\/strong><\/p><p>Conduct regular risk assessments to identify, evaluate, and mitigate cybersecurity risks.<\/p><p>Implement risk-based controls to address identified vulnerabilities.<\/p><p><strong>Access Control<\/strong><\/p><p>Restrict access to systems and data based on the principle of least privilege.<\/p><p>Enforce strong authentication measures, including multi-factor authentication (MFA), where applicable.<\/p><p>Regularly review and update user access rights.<\/p><p><strong>Data Protection<\/strong><\/p><p>Encrypt sensitive data at rest and in transit.<\/p><p>Ensure secure storage and transmission of personal and business data.<\/p><p>Implement data loss prevention (DLP) measures to protect against accidental or malicious data breaches.<\/p><p><strong>System and Network Security<\/strong><\/p><p>Maintain a secure network architecture with firewalls, intrusion detection\/prevention systems (IDS\/IPS), and segmentation.<\/p><p>Regularly update and patch software, hardware, and applications to address security vulnerabilities.<\/p><p>Conduct penetration testing and vulnerability scans periodically.<\/p><p><strong>Endpoint Security<\/strong><\/p><p>Deploy endpoint protection solutions, including antivirus, anti-malware, and endpoint detection and response (EDR) tools.<\/p><p>Ensure secure configurations for all devices, including laptops, desktops, and mobile devices.<\/p><p><strong>Awareness and Training<\/strong><\/p><p>Provide regular cybersecurity training and awareness programmes for all employees and contractors.<\/p><p>Educate users on recognising and responding to phishing, social engineering, and other cyber threats.<\/p><p><strong>Incident Response and Recovery<\/strong><\/p><p>Maintain an Incident Response Plan (IRP) to detect, respond to, and recover from cybersecurity incidents.<\/p><p>Conduct regular incident response simulations to ensure preparedness.<\/p><p>Ensure timely reporting and escalation of cybersecurity incidents to relevant stakeholders.<\/p><p><strong>Third-Party and Supply Chain Security<\/strong><\/p><p>Conduct due diligence on third-party vendors and partners to ensure they meet LiquidQube\u2019s cybersecurity requirements.<\/p><p>Include cybersecurity clauses in contracts with suppliers and partners to ensure accountability.<\/p><p><strong>Monitoring and Logging<\/strong><\/p><p>Implement continuous monitoring of systems, networks, and applications for suspicious activity.<\/p><p>Maintain comprehensive logs of system activities to support forensic investigations and compliance requirements.<\/p><p><strong>Compliance<\/strong><\/p><p>Ensure adherence to applicable cybersecurity laws, regulations, and standards in all regions where LiquidQube operates.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7749f1 elementor-widget elementor-widget-text-editor\" data-id=\"e7749f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Responsibilities<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7ec183 elementor-widget elementor-widget-text-editor\" data-id=\"d7ec183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Leadership<\/strong><\/p><p>Ensure the implementation and enforcement of this policy across the organisation.<\/p><p>Allocate resources for cybersecurity initiatives, training, and tools.<\/p><p><strong>Employees<\/strong><\/p><p>Follow security best practices and report any suspicious activity or potential breaches immediately.<\/p><p>Participate in cybersecurity training and adhere to company policies.<\/p><p><strong>IT and Security Teams<\/strong><\/p><p>Develop, implement, and manage technical controls to safeguard LiquidQube\u2019s systems and data.<\/p><p>Monitor the threat landscape and adjust security measures accordingly.<\/p><p>Respond to and investigate cybersecurity incidents promptly.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fd9aad elementor-widget elementor-widget-text-editor\" data-id=\"5fd9aad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Incident Reporting<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f00ada elementor-widget elementor-widget-text-editor\" data-id=\"5f00ada\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>All employees and stakeholders are required to report any suspected cybersecurity incidents immediately to the IT Security Team at <strong>data@liquidqubegroup.com<\/strong>. Examples of incidents include:<\/p><p>Unauthorised access to systems or data.<\/p><p>Malware infections or phishing attempts.<\/p><p>Data breaches or leaks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ba83e9 elementor-widget elementor-widget-text-editor\" data-id=\"4ba83e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Review and Updates<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eface3f elementor-widget elementor-widget-text-editor\" data-id=\"eface3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This policy will be reviewed annually or as needed to reflect changes in the threat landscape, technology, or legal and regulatory requirements. Updates will be communicated to all relevant parties.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95b2866 elementor-widget elementor-widget-text-editor\" data-id=\"95b2866\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Contact Information<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e3fd40 elementor-widget elementor-widget-text-editor\" data-id=\"7e3fd40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For questions or concerns regarding this policy, please contact<strong> data@liquidqubegroup.com<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Introduction LiquidQube is committed to maintaining a secure and resilient digital environment to protect our systems, data, and operations. This Cybersecurity Policy outlines the principles and practices we follow to safeguard against cyber threats, ensure compliance with applicable legal and regulatory requirements, and uphold the trust of our customers, employees, and partners. This policy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-2159","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.liquidqube.com\/de\/wp-json\/wp\/v2\/pages\/2159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.liquidqube.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.liquidqube.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.liquidqube.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.liquidqube.com\/de\/wp-json\/wp\/v2\/comments?post=2159"}],"version-history":[{"count":0,"href":"https:\/\/www.liquidqube.com\/de\/wp-json\/wp\/v2\/pages\/2159\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.liquidqube.com\/de\/wp-json\/wp\/v2\/media?parent=2159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}