{"id":5783,"date":"2019-09-10T15:32:49","date_gmt":"2019-09-10T13:32:49","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=5783"},"modified":"2019-09-10T15:32:49","modified_gmt":"2019-09-10T13:32:49","slug":"diese-sechs-mythen-gefaehrden-die-applikationssicherheit","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/en\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/","title":{"rendered":"These six myths put application security at risk"},"content":{"rendered":"<figure id=\"attachment_5784\" aria-describedby=\"caption-attachment-5784\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5784\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg\" alt=\"\" width=\"680\" height=\"453\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg 680w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator-16x12.jpg 16w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator-263x175.jpg 263w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator-525x350.jpg 525w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator-300x200.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-5784\" class=\"wp-caption-text\">Application security is essential for businesses. (Image: Pixabay.com)<\/figcaption><\/figure>\n<p>The threat situation for IT is becoming increasingly severe and has also become more complex. If an attack occurs, companies can usually prevent greater damage with existing protective measures. However, the following six myths will explain how they can significantly increase the security of their applications.<\/p>\n<h2><strong>Myth 1: Cybercriminals attack the infrastructure, applications are hardly in focus <\/strong><\/h2>\n<p>This myth is unfortunately a widespread misconception. <a href=\"http:\/\/www.nttsecurity.com\/GTIR2019-DE\">Investigations<\/a> have shown that more than half of all attacks occur via the application layer. However, the seventh OSI layer, the application layer, is not protected at all by classic firewalls. It is recommended that critical business applications be protected by an application firewall that controls input, output and access to external services and, if necessary, blocks them if they do not comply with the policy configured in the application firewall.<\/p>\n<p>Application security, however, starts with the development of the software. Application programmers should follow best practices and stop using proven insecure code and vulnerability-prone programming constructs to prevent vulnerabilities from occurring in the first place. Timely patch management also plays a very important role throughout the application lifecycle (see Myth 5).<\/p>\n<h2><strong>Myth 2: Penetration testing is enough, the application is secure <\/strong><\/h2>\n<p>Most IT specialists believe that a successfully completed penetration test almost guarantees the security of an application. This is true for simple apps, but not for complex applications that contain a lot of business and process logic. Complex applications with many stakeholders cannot even be fully tested by penetration testing. Development, procurement or release processes involving multiple business units should therefore definitely go through additional security measures. NTT Security recommends using software maturity models, such as OpenSAMM, to help organizations build a security strategy for business-critical applications that is aligned with their business model.<\/p>\n<p>Self-developed applications require special attention. One example: More than 70 percent of SAP functionalities are programmed by customers themselves. However, the manufacturer does not provide any security guarantee for in-house developments. The security measures established with the help of maturity models such as OpenSAMM are therefore particularly important for in-house software for which the customer is responsible.<\/p>\n<h2><strong>Myth 3: Security tools do the job, then cyber attackers don't stand a chance <\/strong><\/h2>\n<p>Many companies rely too much on their security tools, for example patching or configuration management. Tools are important, but only half the battle. In IT today, everything is networked with everything else. But the individual business units don't talk to each other enough. Security experts who pay attention to a holistic security strategy should be at the table for every new implementation and every important decision. Otherwise, each department will use its own tools in an uncoordinated manner, and in the end there will be many disappointed faces when a security incident occurs.<\/p>\n<h2><strong>Myth 4: Every employee is responsible for their own safety <\/strong><\/h2>\n<p>The most dangerous weak point in companies is their own employees, security experts emphasize. It is therefore important to create risk awareness among employees through regular training and to inform them about the current attack vectors. Training does not rule out the possibility of cybercriminals gaining access to sensitive data through social engineering techniques such as personalized phishing emails, but it does increase awareness and reduce risk. The key is to think twice about every click on a mail attachment and use common sense.<\/p>\n<h2><strong>Myth 5: Security patches take hours to apply and systems are unusable <\/strong><\/h2>\n<p>On average, vulnerable, unpatched applications remain online for several hundred days, even though vulnerabilities are known and cybercriminals could launch an attack at any time. The biggest security leak for applications is unpatched libraries, according to the <a href=\"https:\/\/info.whitehatsec.com\/Content-2018StatsReport_LP.html?utm_source=website&amp;utm_medium=Website-Content-Ongoing-2018StatsReport\">Application Security Statistics Report 2018 (Vol. 13)<\/a> by WhiteHat, a subsidiary of NTT Security. The reason for this negligent behavior is the common misconception in many companies that IT systems fail and are unusable when security patches are applied: Customers may not be able to access ordering systems, employees are twiddling their thumbs, and the company loses revenue as a result.<\/p>\n<p>This assumption is wrong. Today, security patches can either be applied during operation or only require individual components to be shut down for a short time. Another alternative is to use the nightly maintenance window for the patches.<\/p>\n<h2><strong>Myth 6: Once you've been hacked, there's nothing you can do about it <\/strong><\/h2>\n<p>Easier said than done: In the event of an attack, companies should definitely remain calm and not cause more damage through ill-considered knee-jerk reactions. There are companies that have pulled the power plug after an attack and thus destroyed the hard disk controllers. It was no longer possible for forensic experts to reconstruct the attack and identify the attack vectors in retrospect. The goal should be to gather as much evidence and data as possible and seek the help of professional security experts as soon as possible.<\/p>\n<h2>Conclusion: Safety depends on many factors<\/h2>\n<p>A single, successfully completed penetration test is not enough to ensure application security. This is a negligent misconception. To my knowledge, there is no penetration test that does not reveal one or two critical vulnerabilities. It is therefore recommended to use maturity models for application security such as OpenSAMM as a guideline. Often, security patches are not applied because then supposedly business-critical systems such as production or sales are down for a certain time. Companies thus take an incalculably high risk. However, patches can also be applied during operation. Many of our customers do this, avoid the downtime and it works very well.<\/p>\n<p><em><strong>Author:<\/strong><br \/>\n<\/em><em>Ren\u00e9 Bader is Lead Consultant Secure Business Applications EMEA at <a href=\"http:\/\/www.hello.global.ntt\">NTT Security<\/a>. <\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Die Gef\u00e4hrdungslage der IT versch\u00e4rft sich zunehmend und ist zudem vielschichtiger geworden. Erfolgt ein Angriff, verhindern Unternehmen mit bestehenden Schutzmassnahmen zwar meist einen gr\u00f6sseren Schaden. Wie sie die Sicherheit ihrer Applikationen aber weiter signifikant erh\u00f6hen k\u00f6nnen, soll anhand der folgenden sechs Mythen erl\u00e4utert werden. Mythos 1: Cyberkriminelle attackieren die Infrastruktur, Applikationen stehen kaum im Fokus [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":5784,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Applikationssicherheit","_yoast_wpseo_metadesc":"Nichts ist wichtiger als die Applikationssicherheit. Trotzdem ergreifen Manager und IT-Verantwortliche nicht die n\u00f6tigen Sicherheitsmassnahmen.","articlekey":"","footnotes":""},"categories":[27],"tags":[115,142,260,286],"class_list":["post-5783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-checklisten","tag-cyber-crime","tag-ict-sicherheit","tag-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Diese sechs Mythen gef\u00e4hrden die Applikationssicherheit - Organisator<\/title>\n<meta name=\"description\" content=\"Nichts ist wichtiger als die Applikationssicherheit. Trotzdem ergreifen Manager und IT-Verantwortliche nicht die n\u00f6tigen Sicherheitsmassnahmen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/en\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Diese sechs Mythen gef\u00e4hrden die Applikationssicherheit\" \/>\n<meta property=\"og:description\" content=\"Nichts ist wichtiger als die Applikationssicherheit. Trotzdem ergreifen Manager und IT-Verantwortliche nicht die n\u00f6tigen Sicherheitsmassnahmen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/en\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-10T13:32:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"453\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thomas.berner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Diese sechs Mythen gef\u00e4hrden die #Applikationssicherheit\" \/>\n<meta name=\"twitter:description\" content=\"Nichts ist wichtiger als die #Applikationssicherheit. Trotzdem ergreifen Manager und IT-Verantwortliche nicht die n\u00f6tigen #Sicherheitsmassnahmen.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gef\u00e4hrden-die-Applikationssicherheit_Organisator.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/\"},\"author\":{\"name\":\"thomas.berner\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\"},\"headline\":\"Diese sechs Mythen gef\u00e4hrden die Applikationssicherheit\",\"datePublished\":\"2019-09-10T13:32:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/\"},\"wordCount\":888,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg\",\"keywords\":[\"Checklisten\",\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/\",\"name\":\"Diese sechs Mythen gef\u00e4hrden die Applikationssicherheit - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg\",\"datePublished\":\"2019-09-10T13:32:49+00:00\",\"description\":\"Nichts ist wichtiger als die Applikationssicherheit. Trotzdem ergreifen Manager und IT-Verantwortliche nicht die n\u00f6tigen Sicherheitsmassnahmen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg\",\"width\":680,\"height\":453,\"caption\":\"Applikationssicherheit ist f\u00fcr Unternehmen unverzichtbar. (Bild: Pixabay.com)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2019-09-10\\\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Diese sechs Mythen gef\u00e4hrden die Applikationssicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/6f650f90b2842cd4c0cc334b4e36f67e\",\"name\":\"thomas.berner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g\",\"caption\":\"thomas.berner\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/en\\\/author\\\/thomas-berner\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"These six myths put application security at risk - Organizer","description":"Nothing is more important than application security. Despite this, managers and IT officers do not take the necessary security measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/en\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/","og_locale":"en_US","og_type":"article","og_title":"Diese sechs Mythen gef\u00e4hrden die Applikationssicherheit","og_description":"Nichts ist wichtiger als die Applikationssicherheit. Trotzdem ergreifen Manager und IT-Verantwortliche nicht die n\u00f6tigen Sicherheitsmassnahmen.","og_url":"https:\/\/www.organisator.ch\/en\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2019-09-10T13:32:49+00:00","og_image":[{"width":680,"height":453,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg","type":"image\/jpeg"}],"author":"thomas.berner","twitter_card":"summary_large_image","twitter_title":"Diese sechs Mythen gef\u00e4hrden die #Applikationssicherheit","twitter_description":"Nichts ist wichtiger als die #Applikationssicherheit. Trotzdem ergreifen Manager und IT-Verantwortliche nicht die n\u00f6tigen #Sicherheitsmassnahmen.","twitter_image":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gef\u00e4hrden-die-Applikationssicherheit_Organisator.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/"},"author":{"name":"thomas.berner","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e"},"headline":"Diese sechs Mythen gef\u00e4hrden die Applikationssicherheit","datePublished":"2019-09-10T13:32:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/"},"wordCount":888,"commentCount":0,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg","keywords":["Checklisten","Cyber-Crime","ICT-Sicherheit","IT"],"articleSection":["IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/","url":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/","name":"These six myths put application security at risk - Organizer","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg","datePublished":"2019-09-10T13:32:49+00:00","description":"Nothing is more important than application security. Despite this, managers and IT officers do not take the necessary security measures.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2019\/09\/Diese-sechs-Mythen-gefaehrden-die-Applikationssicherheit_Organisator.jpg","width":680,"height":453,"caption":"Applikationssicherheit ist f\u00fcr Unternehmen unverzichtbar. (Bild: Pixabay.com)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/management\/it\/2019-09-10\/diese-sechs-mythen-gefaehrden-die-applikationssicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Diese sechs Mythen gef\u00e4hrden die Applikationssicherheit"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organizer","description":"Competent. Practical. In 10 issues per year, ORGANISATOR presents the essential topics for managers of SMEs.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organizer","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/6f650f90b2842cd4c0cc334b4e36f67e","name":"thomas.berner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac5001d2a36cb6c6cd3e50789007ffca834b477b74a2144564522e944eabff61?s=96&d=mm&r=g","caption":"thomas.berner"},"url":"https:\/\/www.organisator.ch\/en\/author\/thomas-berner\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/5783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/comments?post=5783"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/5783\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media\/5784"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media?parent=5783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/categories?post=5783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/tags?post=5783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}