{"id":4074,"date":"2018-08-15T15:31:11","date_gmt":"2018-08-15T13:31:11","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=4074"},"modified":"2018-08-15T15:31:11","modified_gmt":"2018-08-15T13:31:11","slug":"weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/en\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/","title":{"rendered":"Why SMEs are often overburdened with technical IT security tools"},"content":{"rendered":"<figure id=\"attachment_4075\" aria-describedby=\"caption-attachment-4075\" style=\"width: 480px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4075\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg\" alt=\"\" width=\"480\" height=\"480\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg 480w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-150x150.jpg 150w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-12x12.jpg 12w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-175x175.jpg 175w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-350x350.jpg 350w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-250x250.jpg 250w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-300x300.jpg 300w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-100x100.jpg 100w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><figcaption id=\"caption-attachment-4075\" class=\"wp-caption-text\">Technical IT security tools abound. However, many SMEs are overwhelmed by the variety and thus put their security at risk. (Image: Fotolia.com)<\/figcaption><\/figure>\n<p>Over the past decade, there has been a growing understanding that IT spending is a critical item. Now, the only thing that needs to grow is the understanding that IT security unfortunately does not come free of charge, but that much can be made more secure even with a small budget.<\/p>\n<h2>Risk awareness in place, but contingency plan not...<\/h2>\n<p>As part of his CAS certificate thesis, Christian Heimann evaluated various methods and approaches for an \"Affordable Digital Security Audit of SMEs\" and found that SMEs are very aware of the digital transformation. However, it is worrying that many small companies are overwhelmed by the multitude of technical IT security tools available on the market. For this reason, they often neither budget for nor do anything about IT security. If something is done, they are mainly concerned with the technical aspects. They are aware of the value of their data, but they forget the human component. Employees are not trained or insufficiently trained and sensitized, which increases the risk of a successful attack. Only just under one-third of small companies have an emergency plan; in the event of a successful attack, such a plan would defuse the associated crisis situation by not wasting any time.<\/p>\n<h2>New devices - new points of attack<\/h2>\n<p>Among the two-thirds of SMEs for which IT security is highly important, only 20 percent have reviewed their IT security to date. This gives pause for thought. According to leading research and consulting firm Gartner (2017), the number of IoT devices will increase to 20,000,000,000 by 2020! IoT devices are not only attack targets, but can also become attackers themselves (e.g. misuse as part of a botnet). Therefore, protecting IoT is not only about your own security, but also about the security of the general public. Gartner projects that by 2020, 25% of all identifiable cyber attacks on enterprises will have an IoT component, but less than 10% of IT security budgets will be invested in IoT.<\/p>\n<h2>Vulnerability Management<\/h2>\n<p>Over the past decade, there has been a growing understanding that IT spending is a crucial item. Now the understanding that IT security is unfortunately not free, but that a lot can be made more secure with a small budget, has to grow. A key element is to know your inventory so that you always have an overview of your systems (network, devices, access rights, cloud services).<\/p>\n<figure id=\"attachment_4076\" aria-describedby=\"caption-attachment-4076\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4076\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-2.png\" alt=\"\" width=\"640\" height=\"361\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-2.png 640w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-2-16x9.png 16w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-2-310x175.png 310w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-2-620x350.png 620w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator-2-300x169.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-4076\" class=\"wp-caption-text\">Added value of regular IT security audits (Graphic: First Security Technology AG)<\/figcaption><\/figure>\n<p>Christian Heimann talked to Pascal Mittner, CEO of First Security Technology AG, about their vulnerability management solution. Vulnerability Scan or Automated Testing is the detection of vulnerabilities by analyzing endpoints. A good vulnerability management solution not only provides indications of the vulnerabilities, but also direct recommendations for action to eliminate the vulnerabilities. Pascal Mittner clarified in the interview that vulnerability management should function as an early warning system and provide for the analysis of the assigned area. Measures cannot and should not be implemented by the same system. The principle of \"separation of powers\" is to be observed.<\/p>\n<h2><strong>38 new vulnerabilities per day<\/strong><\/h2>\n<p>In the field of cyber security, when people ask IT managers how often a security audit should take place, they often ask for an interval of between three and five years. They forget that the IT infrastructure is dynamic and even one year is far too long for a technical environment, plus there are 38 new vulnerabilities every day. Small companies also lose track of the systems that are on the network. Often devices like routers, switches, IoT or test systems are simply forgotten, missing from the inventory and therefore not integrated into the IT security concept. Pascal Mittner mentions that \"In addition to the documentation of the infrastructure, vulnerability management serves as a tool to detect problems at an early stage and to counteract them. This increases the efficiency and effectiveness of the company, frees up resources, helps prevent major damage and invests in the right measures.\"<\/p>\n<p>With FS Cyber Control - the Swiss Made vulnerability management solution for SMEs, the above mentioned steps are implemented among others. The IT infrastructure is inventoried, then the systems (IPs) are scanned and a report is generated with recommended measures to eliminate the vulnerabilities found. The reports are easy to understand, regardless of IT knowledge. \"Based on a traffic light system red, yellow, green, they can quickly see how their IT is doing and the solution is also affordable for SMEs,\" says Pascal Mittner and adds, \"FS Cyber Control is easy to integrate into the existing environment and fully automatic. In this sense, there is no longer any excuse for SMEs to neglect their cyber security due to excessive demands.\"<\/p>\n<p><em>More information: <a href=\"http:\/\/www.first-security.com\">First Security AG<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Im vergangenen Jahrzehnt wuchs das Verst\u00e4ndnis, dass IT-Ausgaben ein entscheidender Posten sind. Nun muss nur noch das Verst\u00e4ndnis wachsen, dass die IT-Sicherheit leider nicht kostenlos zu haben ist, jedoch bereits mit wenig Budget vieles sicherer werden kann. Risikobewusstsein vorhanden, Notfallplan aber nicht&#8230; Im Rahmen seiner CAS Zertifikatsarbeit evaluierte Christian Heimann diverse Methoden und Vorgehensweise f\u00fcr [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4075,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"IT-Sicherheits-Tools","_yoast_wpseo_metadesc":"Viele kleine Unternehmen sind \u00fcberfordert an der Vielzahl der am Markt angebotenen technischen IT-Sicherheits-Tools.","articlekey":"","footnotes":""},"categories":[27],"tags":[142,156,282,289,393],"class_list":["post-4074","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-cyber-crime","tag-digitalisierung","tag-internet-of-things","tag-it-sicherheit","tag-produkte"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Weshalb KMU mit technischen IT-Sicherheits-Tools oft \u00fcberfordert sind - Organisator<\/title>\n<meta name=\"description\" content=\"Viele kleine Unternehmen sind \u00fcberfordert an der Vielzahl der am Markt angebotenen technischen IT-Sicherheits-Tools.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/en\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weshalb KMU mit technischen IT-Sicherheits-Tools oft \u00fcberfordert sind\" \/>\n<meta property=\"og:description\" content=\"Viele kleine Unternehmen sind \u00fcberfordert an der Vielzahl der am Markt angebotenen technischen IT-Sicherheits-Tools.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/en\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-15T13:31:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thomas.berner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Weshalb KMU mit technischen #IT-Sicherheits-Tools oft \u00fcberfordert sind\" \/>\n<meta name=\"twitter:description\" content=\"Viele kleine Unternehmen sind \u00fcberfordert an der Vielzahl der am Markt angebotenen technischen IT-Sicherheits-Tools.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-\u00fcberfordert-sind_Organisator.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/\"},\"author\":{\"name\":\"thomas.berner\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\"},\"headline\":\"Weshalb KMU mit technischen IT-Sicherheits-Tools oft \u00fcberfordert sind\",\"datePublished\":\"2018-08-15T13:31:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/\"},\"wordCount\":811,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg\",\"keywords\":[\"Cyber-Crime\",\"Digitalisierung\",\"Internet of Things\",\"IT-Sicherheit\",\"Produkte\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/\",\"name\":\"Weshalb KMU mit technischen IT-Sicherheits-Tools oft \u00fcberfordert sind - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg\",\"datePublished\":\"2018-08-15T13:31:11+00:00\",\"description\":\"Viele kleine Unternehmen sind \u00fcberfordert an der Vielzahl der am Markt angebotenen technischen IT-Sicherheits-Tools.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg\",\"width\":480,\"height\":480,\"caption\":\"Technische IT-Sicherheits-Tools gibt es zuhauf. Doch viele KMUs zeigen sich mit der Vielfalt \u00fcberfordert und setzen damit ihre Sicherheit aufs Spiel. (Bild: Fotolia.com)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2018-08-15\\\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Weshalb KMU mit technischen IT-Sicherheits-Tools oft \u00fcberfordert sind\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\",\"name\":\"thomas.berner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"caption\":\"thomas.berner\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/en\\\/author\\\/thomas-berner\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why SMEs are often overwhelmed with technical IT security tools - Organizer","description":"Many small companies are overwhelmed by the multitude of technical IT security tools available on the market.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/en\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/","og_locale":"en_US","og_type":"article","og_title":"Weshalb KMU mit technischen IT-Sicherheits-Tools oft \u00fcberfordert sind","og_description":"Viele kleine Unternehmen sind \u00fcberfordert an der Vielzahl der am Markt angebotenen technischen IT-Sicherheits-Tools.","og_url":"https:\/\/www.organisator.ch\/en\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2018-08-15T13:31:11+00:00","og_image":[{"width":480,"height":480,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg","type":"image\/jpeg"}],"author":"thomas.berner","twitter_card":"summary_large_image","twitter_title":"Weshalb KMU mit technischen #IT-Sicherheits-Tools oft \u00fcberfordert sind","twitter_description":"Viele kleine Unternehmen sind \u00fcberfordert an der Vielzahl der am Markt angebotenen technischen IT-Sicherheits-Tools.","twitter_image":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-\u00fcberfordert-sind_Organisator.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/"},"author":{"name":"thomas.berner","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e"},"headline":"Weshalb KMU mit technischen IT-Sicherheits-Tools oft \u00fcberfordert sind","datePublished":"2018-08-15T13:31:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/"},"wordCount":811,"commentCount":0,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg","keywords":["Cyber-Crime","Digitalisierung","Internet of Things","IT-Sicherheit","Produkte"],"articleSection":["IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/","url":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/","name":"Why SMEs are often overwhelmed with technical IT security tools - Organizer","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg","datePublished":"2018-08-15T13:31:11+00:00","description":"Many small companies are overwhelmed by the multitude of technical IT security tools available on the market.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2018\/08\/Weshalb-KMU-mit-technischen-IT-Sicherheits-Tools-oft-ueberfordert-sind_Organisator.jpg","width":480,"height":480,"caption":"Technische IT-Sicherheits-Tools gibt es zuhauf. Doch viele KMUs zeigen sich mit der Vielfalt \u00fcberfordert und setzen damit ihre Sicherheit aufs Spiel. (Bild: Fotolia.com)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/management\/it\/2018-08-15\/weshalb-kmu-mit-technischen-it-sicherheits-tools-oft-ueberfordert-sind\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Weshalb KMU mit technischen IT-Sicherheits-Tools oft \u00fcberfordert sind"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organizer","description":"Competent. Practical. In 10 issues per year, ORGANISATOR presents the essential topics for managers of SMEs.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organizer","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e","name":"thomas.berner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","caption":"thomas.berner"},"url":"https:\/\/www.organisator.ch\/en\/author\/thomas-berner\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/4074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/comments?post=4074"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/4074\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media\/4075"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media?parent=4074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/categories?post=4074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/tags?post=4074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}