Security Audit
IT infrastructure and digital practices assessment, vulnerability identification, and concrete recommendations to improve the security level.
Expertise and support in cybersecurity, data protection, and IT infrastructure.
Tailor-made solutions for professionals, associations, and individuals in Geneva and surrounding areas.
Stefan ANTUN - IT & Cybersecurity Specialist
Email: stefan@antun.ch
Phone: +41 22 567 01 05
Interventions in Geneva and surrounding areas.
Download my contact cardI assist my clients in strengthening their system security, improving their infrastructure resilience, and adopting tools better suited to their requirements for confidentiality, continuity, and operational control.
IT infrastructure and digital practices assessment, vulnerability identification, and concrete recommendations to improve the security level.
Implementation of backup, recovery, and data protection strategies to limit the impact of a technical incident or cyberattack.
Deployment and administration of virtualized environments (Hyper-V, Proxmox) and resilient storage solutions for critical services.
Modernization of IT environments through task automation (Ansible, PowerShell) and container technologies (Docker, Podman).
Design, optimization, and hardening of local networks, Wi-Fi, VPNs, and mesh environments to improve performance and access control.
Intervention after a failure, compromise, or major incident, with system restoration and support to reduce the risk of recurrence.
Many organizations today want to better understand where their data resides, how their services operate, and to what extent they can change tools or providers without excessive dependence.
The goal is not to replace everything, but to make coherent, progressive, and sustainable technical choices.
A professional or personal email address based on your own domain name, for more freedom in choosing or changing providers.
An email address linked to your domain offers more continuity and freedom of choice.
Configuration of Android phones compatible with a more demanding approach to privacy and security (e.g., GrapheneOS).
A controlled mobile environment helps limit the unnecessary exposure of personal data.
Installation and configuration of a Linux environment for people wanting a more transparent, stable, or customizable system.
The transition can be done progressively, according to your usage and operational constraints.
Deployment of services hosted locally or on an infrastructure chosen by the client, for more control over the digital environment.
Each solution is scaled according to needs and availability requirements.