{"id":35323,"date":"2019-10-31T09:54:28","date_gmt":"2019-10-31T09:54:28","guid":{"rendered":"https:\/\/staging.consileon.de\/was-passiert-eigentlich-wenn-was-passiert\/"},"modified":"2022-06-08T14:42:21","modified_gmt":"2022-06-08T14:42:21","slug":"what-happens-actually-when-what-happens","status":"publish","type":"post","link":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/","title":{"rendered":"What actually happens when something happens?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-it-risks-at-a-glance\">IT risks at a glance<\/h2>\n\n\n\n<p>With increasing digitization and networking, the number of nodes through which hackers could invade and cause damage is multiplying. With special tools, hackers find simple technical vulnerabilities automatically. Employees themselves are also a major security risk if they respond to phishing mails or fail to observe important security standards.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-loss-of-data-and-industry-secrets\">Loss of data and industry secrets<\/h3>\n\n\n\n<p>In addition to the theft of intellectual property such as design and production data, stolen personnel and customer data can also become a problem or cause major reputational damage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-loss-of-production\">Loss of production&nbsp;<\/h3>\n\n\n\n<p>It also becomes expensive if an attack stops production. Last but not least, manipulated machines can even endanger the safety of employees.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ransomware-and-phishing-mails-common-traps-for-employees\">Ransomware and phishing mails &#8211; common traps for employees&nbsp;<\/h3>\n\n\n\n<p>The attackers get into the system through phishing mails or ransomware.&nbsp;<\/p>\n\n\n\n<p>Ransomware is malware that directly attacks the system and prevents the computer owner from accessing data, using it, or the entire computer system. (Ransom, English for &#8220;ransom&#8221;). The hackers take advantage of the employee&#8217;s ignorance and trick him, e.g. with good texts, into clicking on a message, opening something and thus letting the virus &#8220;into the house&#8221;. In &#8220;phishing&#8221;, the hacker tries to obtain the user&#8217;s personal data using fake email addresses or websites.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-undetected-burglaries-have-a-long-lasting-effect\">Undetected burglaries have a long lasting effect<\/h3>\n\n\n\n<p>Some companies have already fallen victim to a hacker without realizing it. The manipulations only come to light much later, through complaints from customers or suppliers. If an infiltrated system is not misused to distribute spam or malware, it can take an average of 300 days before the intrusion is discovered!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With increasing digitization and networking, the number of nodes through which hackers could invade and cause damage is multiplying. <\/p>\n","protected":false},"author":3,"featured_media":2692,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"_acf_changed":false,"footnotes":""},"categories":[71],"tags":[],"class_list":["post-35323","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-it-security-en","post_format-post-format-image"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What actually happens when something happens? | IT Security | Consileon<\/title>\n<meta name=\"description\" content=\"With increasing digitization and networking, the number of nodes through which hackers invade is multiplying.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What actually happens when something happens?\" \/>\n<meta property=\"og:description\" content=\"With increasing digitization and networking, the number of nodes through which hackers invade is multiplying.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/\" \/>\n<meta property=\"og:site_name\" content=\"Consileon Business Consultancy GmbH | Management- und IT-Beratung\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-31T09:54:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-08T14:42:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.consileon.de\/wp-content\/uploads\/2019\/10\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2048\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tobias Leibach\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tobias Leibach\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/\"},\"author\":{\"name\":\"Tobias Leibach\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#\\\/schema\\\/person\\\/d0f45c7153ec976f636528785665458c\"},\"headline\":\"What actually happens when something happens?\",\"datePublished\":\"2019-10-31T09:54:28+00:00\",\"dateModified\":\"2022-06-08T14:42:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/\"},\"wordCount\":280,\"image\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/\",\"url\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/\",\"name\":\"What actually happens when something happens? | IT Security | Consileon\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg\",\"datePublished\":\"2019-10-31T09:54:28+00:00\",\"dateModified\":\"2022-06-08T14:42:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#\\\/schema\\\/person\\\/d0f45c7153ec976f636528785665458c\"},\"description\":\"With increasing digitization and networking, the number of nodes through which hackers invade is multiplying.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg\",\"width\":2560,\"height\":2048,\"caption\":\"Mann mit einer Maske und Sonnebrille sitzt im dunklen Raum und kodiert\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2019\\\/10\\\/31\\\/what-happens-actually-when-what-happens\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What actually happens when something happens?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#website\",\"url\":\"https:\\\/\\\/www.consileon.de\\\/\",\"name\":\"Consileon Business Consultancy GmbH | Management- und IT-Beratung\",\"description\":\"Consileon ist eine Management- und IT-Beratung, die mit rund 450 Mitarbeitern Unternehmen aller Branchen, von lokalen Organisationen bis DAX-Konzernen, ber\u00e4t.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.consileon.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#\\\/schema\\\/person\\\/d0f45c7153ec976f636528785665458c\",\"name\":\"Tobias Leibach\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d50be0e2ef1b22637a41e7c5c32b1d85c64ff0b88bc9608cd8a61c0ac35eecef?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d50be0e2ef1b22637a41e7c5c32b1d85c64ff0b88bc9608cd8a61c0ac35eecef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d50be0e2ef1b22637a41e7c5c32b1d85c64ff0b88bc9608cd8a61c0ac35eecef?s=96&d=mm&r=g\",\"caption\":\"Tobias Leibach\"},\"sameAs\":[\"https:\\\/\\\/www.consileon.de\\\/\"],\"url\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/author\\\/tobias-leibach\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What actually happens when something happens? | IT Security | Consileon","description":"With increasing digitization and networking, the number of nodes through which hackers invade is multiplying.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/","og_locale":"en_US","og_type":"article","og_title":"What actually happens when something happens?","og_description":"With increasing digitization and networking, the number of nodes through which hackers invade is multiplying.","og_url":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/","og_site_name":"Consileon Business Consultancy GmbH | Management- und IT-Beratung","article_published_time":"2019-10-31T09:54:28+00:00","article_modified_time":"2022-06-08T14:42:21+00:00","og_image":[{"width":2560,"height":2048,"url":"https:\/\/www.consileon.de\/wp-content\/uploads\/2019\/10\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg","type":"image\/jpeg"}],"author":"Tobias Leibach","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tobias Leibach","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/#article","isPartOf":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/"},"author":{"name":"Tobias Leibach","@id":"https:\/\/www.consileon.de\/#\/schema\/person\/d0f45c7153ec976f636528785665458c"},"headline":"What actually happens when something happens?","datePublished":"2019-10-31T09:54:28+00:00","dateModified":"2022-06-08T14:42:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/"},"wordCount":280,"image":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/#primaryimage"},"thumbnailUrl":"https:\/\/www.consileon.de\/wp-content\/uploads\/2019\/10\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg","articleSection":["IT Security"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/www.consileon.de\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/","url":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/","name":"What actually happens when something happens? | IT Security | Consileon","isPartOf":{"@id":"https:\/\/www.consileon.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/#primaryimage"},"image":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/#primaryimage"},"thumbnailUrl":"https:\/\/www.consileon.de\/wp-content\/uploads\/2019\/10\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg","datePublished":"2019-10-31T09:54:28+00:00","dateModified":"2022-06-08T14:42:21+00:00","author":{"@id":"https:\/\/www.consileon.de\/#\/schema\/person\/d0f45c7153ec976f636528785665458c"},"description":"With increasing digitization and networking, the number of nodes through which hackers invade is multiplying.","breadcrumb":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/#primaryimage","url":"https:\/\/www.consileon.de\/wp-content\/uploads\/2019\/10\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg","contentUrl":"https:\/\/www.consileon.de\/wp-content\/uploads\/2019\/10\/nahel-abdul-hadi-flha0KwRrRc-unsplash.jpg","width":2560,"height":2048,"caption":"Mann mit einer Maske und Sonnebrille sitzt im dunklen Raum und kodiert"},{"@type":"BreadcrumbList","@id":"https:\/\/www.consileon.de\/en\/blog\/2019\/10\/31\/what-happens-actually-when-what-happens\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.consileon.de\/en\/"},{"@type":"ListItem","position":2,"name":"What actually happens when something happens?"}]},{"@type":"WebSite","@id":"https:\/\/www.consileon.de\/#website","url":"https:\/\/www.consileon.de\/","name":"Consileon Business Consultancy GmbH | Management- und IT-Beratung","description":"Consileon ist eine Management- und IT-Beratung, die mit rund 450 Mitarbeitern Unternehmen aller Branchen, von lokalen Organisationen bis DAX-Konzernen, ber\u00e4t.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.consileon.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.consileon.de\/#\/schema\/person\/d0f45c7153ec976f636528785665458c","name":"Tobias Leibach","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d50be0e2ef1b22637a41e7c5c32b1d85c64ff0b88bc9608cd8a61c0ac35eecef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d50be0e2ef1b22637a41e7c5c32b1d85c64ff0b88bc9608cd8a61c0ac35eecef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d50be0e2ef1b22637a41e7c5c32b1d85c64ff0b88bc9608cd8a61c0ac35eecef?s=96&d=mm&r=g","caption":"Tobias Leibach"},"sameAs":["https:\/\/www.consileon.de\/"],"url":"https:\/\/www.consileon.de\/en\/blog\/author\/tobias-leibach\/"}]}},"_links":{"self":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts\/35323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/comments?post=35323"}],"version-history":[{"count":0,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts\/35323\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/media\/2692"}],"wp:attachment":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/media?parent=35323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/categories?post=35323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/tags?post=35323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}