{"id":116871,"date":"2022-08-12T10:25:00","date_gmt":"2022-08-12T08:25:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=116871"},"modified":"2022-08-04T16:12:34","modified_gmt":"2022-08-04T14:12:34","slug":"zwischen-illusion-und-realitaet","status":"publish","type":"post","link":"https:\/\/e3mag.com\/de\/zwischen-illusion-und-realitaet\/","title":{"rendered":"Zwischen Illusion und Realit\u00e4t"},"content":{"rendered":"\n<p>Gleichzeitig wird Cybersecurity als Wertsch\u00f6pfungsfaktor angesehen und r\u00fcckt st\u00e4rker in den Fokus bei der Entwicklung neuer Produkte, Services und Gesch\u00e4ftsmodelle sowie der Digitalisierung im Allgemeinen. Der Trend zur Cloud-Nutzung soll dabei aus Sicht vieler CIOs und CISOs das IT-Security-Niveau erh\u00f6hen, erfordert aber auch einen Umbau der Security-Architektur und st\u00e4rkere Investitionen. Budgets f\u00fcr die Pr\u00e4vention, die Erkennung von Angriffen und auch Recovery-Ma\u00dfnahmen werden daher in den kommenden Jahren teilweise ansteigen. Als h\u00e4ufigste Folge eines stattgefundenen Cyberangriffs erwarten 87 Prozent der Studienteilnehmenden hohe Image- und Reputationssch\u00e4den. 75 Prozent bef\u00fcrchten ebenso einen Abfluss von Kundendaten, 73 Prozent einen Abfluss kritischer Unternehmensdaten. <\/p>\n\n\n\n<p>Das Risiko von L\u00f6segeldforderungen bewerten 58 Prozent der Unternehmen als hoch. Trotz dieser gro\u00dfen Bedrohungslage stimmen 47 Prozent der CIOs und CISOs der Aussage voll zu, dass sie in der Lage sind, mit den technischen Entwicklungen rund um Cybersecurity und Methoden der Hacker Schritt zu halten. Die Resilienz der IT-Security auf Basis von KPIs messen im Gegensatz dazu aber nur 67 Prozent; weitere 24 Prozent sind jedoch in der Planung, entsprechende Prozesse einzuf\u00fchren. Dies sind Ergebnisse der neuen L\u00fcnendonk-Studie 2022 \u201eVon Cybersecurity zur Cyberresilience \u2013 mehr Digitalisierung, mehr Cyberbedrohung?\u201c, die in Zusammenarbeit mit KPMG erstellt wurde.<\/p><div class=\"great-fullsize-content-de great-entity-placement\" style=\"float: left;\" id=\"great-3342329298\"><div id=\"great-3555926858\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyberangriffe werden als akute Gefahr gesehen. Der zunehmende Digitalisierungsgrad erm\u00f6glicht neue Einfallstore.<\/p>\n","protected":false},"author":38,"featured_media":116872,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,40957],"tags":[8405,20346,26082,38439],"coauthors":[19920],"class_list":["post-116871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-07","tag-cyberangriffe","tag-cybersecurity","tag-cybersicherheit","tag-luenendonk-2","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/08\/shutterstock_1916424809_SWKStock-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Cyberangriffe werden als akute Gefahr gesehen. Der zunehmende Digitalisierungsgrad erm\u00f6glicht neue Einfallstore.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/de\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/de\/category\/mag-22-07\/\" rel=\"category tag\">Mag 22-07<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3mag.com\/de\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/116871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/comments?post=116871"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/posts\/116871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media\/116872"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/media?parent=116871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/categories?post=116871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/tags?post=116871"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/de\/wp-json\/wp\/v2\/coauthors?post=116871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}