Do you know if your website
is really secure?
A professional security audit uncovers vulnerabilities before hackers find them. Prevention is cheaper than damage control.
What happens when you get hacked?
Data Loss
Customer data, orders, years of work – all gone or encrypted.
Reputation Damage
Customers lose trust. Google warns about your site. Press reports.
Financial Damage
Lost revenue, recovery, legal costs, possibly GDPR fines.
Weeks of Downtime
Your website is offline. Customers cannot order. Competitors benefit.
What I check
Systematic analysis according to proven security standards

Your contact for website security
I am Vincent Kilchherr, independent web developer with over 16 years of experience – many of them in website security.
I have been conducting security audits for years. I know the typical vulnerabilities and understand where hackers start. My audits are thorough, clearly documented and practice-oriented.
- Hundreds of websites checked
- Direct contact – no ticket system
- Understandable reports instead of jargon
Vulnerability Scan
I check your website for the most common and dangerous security vulnerabilities – the same ones that hackers look for.
- SQL Injection – Can attackers manipulate your database?
- XSS (Cross-Site Scripting) – Can malicious code be injected?
- Broken Authentication – Are login and sessions secure?
- Security Misconfiguration – Are server and CMS properly configured?

Software & Plugins
Outdated software is the number 1 attack vector. I check all components for known security vulnerabilities.
- CMS Version – WordPress, TYPO3, Joomla up to date?
- Plugin Check – Outdated or insecure extensions?
- PHP Version – Still running an EOL version?
- Libraries – JavaScript, Frameworks with CVEs?

Server & Infrastructure
The most secure application is useless if the server is misconfigured.
- SSL/TLS – Is the encryption correct?
- HTTP Headers – CSP, HSTS, X-Frame-Options?
- Directory Protection – Are sensitive files protected?
- Backup Check – Do backups exist and are they usable?

Access & Permissions
Who has access to what? Often there are too many users with too many rights.
- Admin Accounts – Are there abandoned or test users?
- Password Policies – Are the passwords secure?
- 2FA – Is two-factor authentication active?
- FTP/SSH – Who has server access?

What you get
Detailed Report
All findings documented with risk assessment (critical, high, medium, low) and explanations.
Action Plan
Concrete recommendations, prioritized by urgency. You know exactly what to do.
Discussion
Personal meeting (on-site or video) to clarify all questions and plan next steps.
How an audit works
Pre-meeting
We clarify scope, accesses and timeline. Quote.
Analysis
Automated scans + manual review. Takes 2-5 days depending on scope.
Report
You receive the report with all findings and recommendations.
Discussion
Joint review. If needed, implementation of the measures.
Vincent conducted a security audit for us and found vulnerabilities that our existing IT had missed. Particularly valuable was the prioritized action plan – we immediately knew what to tackle first. Had we done this earlier, we would have saved ourselves some sleepless nights.
Questions about the Security Audit
Security starts with knowledge.
Let us find out where your website stands. Non-binding consultation.