We are involved in a variety of projects that include both commercial objectives and voluntary initiatives. Our portfolio reflects our broad range of interests and our commitment to making a positive contribution to society through our work. While our commercial projects are geared towards promoting the growth and success of our company, the voluntary initiatives offer us the opportunity to use our expertise and resources for the common good. Below you will find a detailed list of our projects, which includes both our commercial activities and our voluntary commitments.

Logging out properly can have various advantages. This step is strongly recommended when working on public computers. When you call up the “” project, the links of known services are called up, which log you out.


Registering with a service is quick and easy. However, the regular deletion of accounts is strongly recommended. After all, deleted data can no longer be stolen. But how easy is it to unsubscribe from services? Cybercare clarifies and categorizes numerous services into four categories.

You are currently viewing a placeholder content from Default. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.

More Information

Cyber Team Challenge

The IT fails, the ransomware spreads – nothing works anymore. This scenario is a nightmare for any company. This exceptional situation can be experienced with the Cyber Team Challenge. Without real consequences for the company. The mobile Cyber Security Escape Room.


The Healbox is a joint project of the Institute for Internet Security (ifis), the BSI and the State Office of Criminal Investigation of Lower Saxony. A minicomputer is used to retrieve e-mails. The operating system is hardened and malware cannot be successfully executed. This allows you to check emails without the risk of falling victim to a cyber attack.


Publicly available sources on the Internet are a potential threat to private individuals and organizations of all kinds. The fully automated collection and presentation of hundreds of sources is realized by AWARE7 GmbH with RISKREX – Digital Risk Management.

Make up a

Dealing with passwords is not easy. New passwords have to be thought up all the time. They should also be changed and a personal reference should also be avoided. Anyone can download a password key card from This allows simple words to be encoded.


Criminals are causing confusion with long and unusual websites. enables users to insert their website to be checked. The address is then divided into its components. This makes it immediately clear which website the link actually leads to.

Second factor

The combination of user names and passwords can be made considerably more secure by adding a second factor in addition to the password. Criminals then also need your smartphone, for example. explains which website offers which second factor.