{"id":71056,"date":"2023-03-28T09:27:00","date_gmt":"2023-03-28T07:27:00","guid":{"rendered":"https:\/\/staging.consileon.de\/it-sicherheit\/"},"modified":"2024-10-25T10:25:51","modified_gmt":"2024-10-25T08:25:51","slug":"it-security-2","status":"publish","type":"post","link":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/","title":{"rendered":"Cybersecurity Webinar: Is your company IT-secure?\u00a0"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Why security measures often fail in the face of current cyber threats<\/h2>\n\n\n\n<p>Cyber attacks are at top of the list of criminal and terrorist threats. Never before has the <a href=\"https:\/\/www.bsi.bund.de\/EN\/Home\/home_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">Federal Office for Information Security (BSI)<\/a> considered the situation as dangerous as it is at present. Never before have so many vulnerabilities been detected in software products. Never before have there been so many cybercrime incidents as last year.<\/p>\n\n\n\n<p>And yet many CEOs and department heads consider their companies too small or insignificant for an attack. Even large entrepreneurs and company bosses are often falsely lulled into a sense of security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cybercriminals-are-becoming-more-professional\">Cybercriminals are becoming more professional<\/h3>\n\n\n\n<p>&#8220;Like the real economy, cybercriminals rely on the division of labor, a growing service character, and close networking across national and industry boundaries. With the concept of \u2018cybercrime-as-a-service,\u2019 cybercriminals are becoming increasingly professional, as specializing in certain services enables them to develop and deploy their \u2018services\u2019 in a targeted manner,&#8221; writes the BSI in its <a href=\"https:\/\/www.bsi.bund.de\/DE\/Service-Navi\/Publikationen\/Lagebericht\/lagebericht_node.html\" target=\"_blank\" rel=\"noreferrer noopener\">report on the state of IT security<\/a> in Germany in 2023.<\/p>\n\n\n\n<p>The fact is that wherever people work with computers, smartphones and tablets, there is a threat. At a time when hackers and IT experts are vying for the latest technologies, many security systems often no longer offer sufficient protection.<\/p>\n\n\n\n<p>The consequences are often devastating and extremely costly: loss of data, loss of competitive advantage, enormous damage to image, usually accompanied by high costs due to fines, production downtime and\/or unprepared reinstatement of systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-consileon-relies-on-contechnet\">Consileon relies on CONTECHNET<\/h3>\n\n\n\n<p>Consileon Business Consultancy is not a pure software house itself, but maintains various partnerships. The aim is always to offer customers the best possible current solutions and to be able to advise them on technical, professional and organisational issues in the field of cyber security.<\/p>\n\n\n\n<p>&#8220;In order to keep the security standards in companies permanently high, we need professional solutions from our customers!&#8221; knows Andreas Grau, Head of Cyber Security at Consileon. &#8220;One of these is the CONTECHNET Suite for Information Security.&#8221;<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.contechnet.de\/produkte\/ctn-software-suite\/warum-contechnet-suite\" target=\"_blank\" rel=\"noreferrer noopener\">CONTECHNET Suite<\/a> is a sustainable solution for the implementation of common security standards, legal data protection requirements and reliable IT emergency management.<\/p>\n\n\n\n<p>The common safety standards:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IT security catalogue<\/li>\n\n\n\n<li>BSI-Standard 200-1, 200-2, 200-3<\/li>\n\n\n\n<li>ISO 27001, ISO 27701, ISO 27019<\/li>\n\n\n\n<li>ISO 14001, 50001<\/li>\n\n\n\n<li>ISO 9001<\/li>\n\n\n\n<li>B3S Health<\/li>\n\n\n\n<li>BAIT, VAIT, KAIT<\/li>\n\n\n\n<li>VDA-ISA (TISAX)<\/li>\n\n\n\n<li>VdS 10000<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-free-webinar-on-the-current-it-security-situation\"><strong>Free webinar on the current IT security situation<\/strong><\/h3>\n\n\n\n<p>&#8220;In discussions with entrepreneurs, IT experts, managing directors, department heads and others who are concerned about cyber security, we come across the same questions again and again,&#8221; says cyber security expert Andreas Grau. That&#8217;s why he wants to start holding free webinars on a regular basis to provide information about the current threat situation and possible countermeasures. He agrees with the BSI&#8217;s opinion in this regard:<\/p>\n\n\n\n<p>&#8220;Because the past year has shown that unforeseen events can raise the threat situation to a new level and collateral damage from cyber attacks in neighbouring countries can also have a direct impact on Germany.\u202fAll this makes it clear that preventive IT security measures are the most effective IT security measures. Every computer system that cannot be hacked, every IT-based service that cannot be disrupted, is an elementary contribution to a functioning digitally networked society.&#8221;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The threat of cyber attacks has never been higher. Our cybersecurity expert Andreas Grau offers free webinars to inform about the current threat situation and countermeasures. <\/p>\n","protected":false},"author":37,"featured_media":68915,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"_acf_changed":false,"footnotes":""},"categories":[141,15],"tags":[],"class_list":["post-71056","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-cybersecurity-events","category-news","post_format-post-format-image"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Webinar: Is your company IT-secure?\u00a0 | News<\/title>\n<meta name=\"description\" content=\"Cyber attacks are at top of the list of criminal and terrorist threats. Consileon relies on CONTECHNET.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Webinar: Is your company IT-secure?\u00a0\" \/>\n<meta property=\"og:description\" content=\"Cyber attacks are at top of the list of criminal and terrorist threats. Consileon relies on CONTECHNET.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Consileon Business Consultancy GmbH | Management- und IT-Beratung\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-28T07:27:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-25T08:25:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.consileon.de\/wp-content\/uploads\/2023\/03\/cyber_security_webinar.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1460\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mareike Kluth\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mareike Kluth\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/\"},\"author\":{\"name\":\"Mareike Kluth\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#\\\/schema\\\/person\\\/196d427d193851345c1285e7a040a38e\"},\"headline\":\"Cybersecurity Webinar: Is your company IT-secure?\u00a0\",\"datePublished\":\"2023-03-28T07:27:00+00:00\",\"dateModified\":\"2024-10-25T08:25:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/\"},\"wordCount\":536,\"image\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cyber_security_webinar.jpg\",\"articleSection\":[\"Cybersecurity Events\",\"News\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/\",\"url\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/\",\"name\":\"Cybersecurity Webinar: Is your company IT-secure?\u00a0 | News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cyber_security_webinar.jpg\",\"datePublished\":\"2023-03-28T07:27:00+00:00\",\"dateModified\":\"2024-10-25T08:25:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#\\\/schema\\\/person\\\/196d427d193851345c1285e7a040a38e\"},\"description\":\"Cyber attacks are at top of the list of criminal and terrorist threats. Consileon relies on CONTECHNET.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cyber_security_webinar.jpg\",\"contentUrl\":\"https:\\\/\\\/www.consileon.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cyber_security_webinar.jpg\",\"width\":1460,\"height\":960,\"caption\":\"Cyber Security Webinar\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/2023\\\/03\\\/28\\\/it-security-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Webinar: Is your company IT-secure?\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#website\",\"url\":\"https:\\\/\\\/www.consileon.de\\\/\",\"name\":\"Consileon Business Consultancy GmbH | Management- und IT-Beratung\",\"description\":\"Consileon ist eine Management- und IT-Beratung, die mit rund 450 Mitarbeitern Unternehmen aller Branchen, von lokalen Organisationen bis DAX-Konzernen, ber\u00e4t.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.consileon.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.consileon.de\\\/#\\\/schema\\\/person\\\/196d427d193851345c1285e7a040a38e\",\"name\":\"Mareike Kluth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f6586c8519bf6ec43d544ce8828bb82a978ad4302672f90563fbec12132fac3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f6586c8519bf6ec43d544ce8828bb82a978ad4302672f90563fbec12132fac3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f6586c8519bf6ec43d544ce8828bb82a978ad4302672f90563fbec12132fac3?s=96&d=mm&r=g\",\"caption\":\"Mareike Kluth\"},\"sameAs\":[\"https:\\\/\\\/www.consileon.de\"],\"url\":\"https:\\\/\\\/www.consileon.de\\\/en\\\/blog\\\/author\\\/mareike-kluth\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Webinar: Is your company IT-secure?\u00a0 | News","description":"Cyber attacks are at top of the list of criminal and terrorist threats. Consileon relies on CONTECHNET.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Webinar: Is your company IT-secure?\u00a0","og_description":"Cyber attacks are at top of the list of criminal and terrorist threats. Consileon relies on CONTECHNET.","og_url":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/","og_site_name":"Consileon Business Consultancy GmbH | Management- und IT-Beratung","article_published_time":"2023-03-28T07:27:00+00:00","article_modified_time":"2024-10-25T08:25:51+00:00","og_image":[{"width":1460,"height":960,"url":"https:\/\/www.consileon.de\/wp-content\/uploads\/2023\/03\/cyber_security_webinar.jpg","type":"image\/jpeg"}],"author":"Mareike Kluth","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mareike Kluth","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/#article","isPartOf":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/"},"author":{"name":"Mareike Kluth","@id":"https:\/\/www.consileon.de\/#\/schema\/person\/196d427d193851345c1285e7a040a38e"},"headline":"Cybersecurity Webinar: Is your company IT-secure?\u00a0","datePublished":"2023-03-28T07:27:00+00:00","dateModified":"2024-10-25T08:25:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/"},"wordCount":536,"image":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.consileon.de\/wp-content\/uploads\/2023\/03\/cyber_security_webinar.jpg","articleSection":["Cybersecurity Events","News"],"inLanguage":"en-US","copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/www.consileon.de\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/","url":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/","name":"Cybersecurity Webinar: Is your company IT-secure?\u00a0 | News","isPartOf":{"@id":"https:\/\/www.consileon.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/#primaryimage"},"image":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.consileon.de\/wp-content\/uploads\/2023\/03\/cyber_security_webinar.jpg","datePublished":"2023-03-28T07:27:00+00:00","dateModified":"2024-10-25T08:25:51+00:00","author":{"@id":"https:\/\/www.consileon.de\/#\/schema\/person\/196d427d193851345c1285e7a040a38e"},"description":"Cyber attacks are at top of the list of criminal and terrorist threats. Consileon relies on CONTECHNET.","breadcrumb":{"@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/#primaryimage","url":"https:\/\/www.consileon.de\/wp-content\/uploads\/2023\/03\/cyber_security_webinar.jpg","contentUrl":"https:\/\/www.consileon.de\/wp-content\/uploads\/2023\/03\/cyber_security_webinar.jpg","width":1460,"height":960,"caption":"Cyber Security Webinar"},{"@type":"BreadcrumbList","@id":"https:\/\/www.consileon.de\/en\/blog\/2023\/03\/28\/it-security-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.consileon.de\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Webinar: Is your company IT-secure?\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.consileon.de\/#website","url":"https:\/\/www.consileon.de\/","name":"Consileon Business Consultancy GmbH | Management- und IT-Beratung","description":"Consileon ist eine Management- und IT-Beratung, die mit rund 450 Mitarbeitern Unternehmen aller Branchen, von lokalen Organisationen bis DAX-Konzernen, ber\u00e4t.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.consileon.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.consileon.de\/#\/schema\/person\/196d427d193851345c1285e7a040a38e","name":"Mareike Kluth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2f6586c8519bf6ec43d544ce8828bb82a978ad4302672f90563fbec12132fac3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2f6586c8519bf6ec43d544ce8828bb82a978ad4302672f90563fbec12132fac3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2f6586c8519bf6ec43d544ce8828bb82a978ad4302672f90563fbec12132fac3?s=96&d=mm&r=g","caption":"Mareike Kluth"},"sameAs":["https:\/\/www.consileon.de"],"url":"https:\/\/www.consileon.de\/en\/blog\/author\/mareike-kluth\/"}]}},"_links":{"self":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts\/71056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/comments?post=71056"}],"version-history":[{"count":7,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts\/71056\/revisions"}],"predecessor-version":[{"id":79809,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/posts\/71056\/revisions\/79809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/media\/68915"}],"wp:attachment":[{"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/media?parent=71056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/categories?post=71056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.consileon.de\/en\/wp-json\/wp\/v2\/tags?post=71056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}