{"id":112338,"date":"2022-04-07T08:30:00","date_gmt":"2022-04-07T06:30:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=112338"},"modified":"2024-01-19T14:47:53","modified_gmt":"2024-01-19T13:47:53","slug":"one-in-five-companies-poorly-prepared-for-attack","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/jedes-fuenfte-unternehmen-schlecht-auf-angriffe-vorbereitet\/","title":{"rendered":"One in five companies ill-prepared for attacks"},"content":{"rendered":"<p>More than one-fifth (21 percent) of all participants surveyed at the \"Handelsblatt Annual Conference on Cybersecurity 2021\" stated that their own company was \"rather poorly\" prepared for a targeted cyberattack. The survey was conducted during the event by the Handelsblatt Research Institute on behalf of TeamViewer among the approximately 200 high-profile IT decision-makers in attendance.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Increased attack surface<\/h3>\n\n\n\n<p>Almost half (45 percent) of respondents said their company had had to respond to a cyberattack in the last 24 months. 52 percent also see an increased need for action due to the shift to hybrid working models and the associated greatly or very greatly increased attack surface for cyberattacks, for example when employees work outside the company network.<\/p><div id=\"great-1731263540\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>In the view of IT decision-makers, employees remain the most important gateway overall: 81 percent of respondents named social engineering as the most relevant access route for cyberattacks. Particularly with regard to remote work models, it is therefore becoming even more important for companies to protect their own infrastructure and corporate resources against such attacks - for example, by assigning separate roles and rights - in addition to regular employee training.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"334\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/02\/2203-Grafik-2-Welche-sind-aus-Ihrer-Sicht-die-relevantesten-Zugangswege-fur-Cyberangriffe-auf-Ihr-Unternehmen_cmyk.jpg\" alt=\"\" class=\"wp-image-112339\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2022\/02\/2203-Grafik-2-Welche-sind-aus-Ihrer-Sicht-die-relevantesten-Zugangswege-fur-Cyberangriffe-auf-Ihr-Unternehmen_cmyk.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/02\/2203-Grafik-2-Welche-sind-aus-Ihrer-Sicht-die-relevantesten-Zugangswege-fur-Cyberangriffe-auf-Ihr-Unternehmen_cmyk-768x321.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/02\/2203-Grafik-2-Welche-sind-aus-Ihrer-Sicht-die-relevantesten-Zugangswege-fur-Cyberangriffe-auf-Ihr-Unternehmen_cmyk-100x42.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/02\/2203-Grafik-2-Welche-sind-aus-Ihrer-Sicht-die-relevantesten-Zugangswege-fur-Cyberangriffe-auf-Ihr-Unternehmen_cmyk-480x200.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/02\/2203-Grafik-2-Welche-sind-aus-Ihrer-Sicht-die-relevantesten-Zugangswege-fur-Cyberangriffe-auf-Ihr-Unternehmen_cmyk-640x267.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2022\/02\/2203-Grafik-2-Welche-sind-aus-Ihrer-Sicht-die-relevantesten-Zugangswege-fur-Cyberangriffe-auf-Ihr-Unternehmen_cmyk-720x301.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption><em>In your view, what are the most relevant access routes for cyberattacks on your company<\/em>.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Great importance<\/h3>\n\n\n\n<p>Despite these challenges, security experts remain optimistic. Nine out of ten (91 percent) survey participants say that the level of cybersecurity in their company has improved over the last year. Mike Eissele, CTO at TeamViewer, comments, \"The survey shows the importance of cybersecurity across industries, and that innovations in this environment must also take into account the users at the devices. IT and product security are part of our TeamViewer DNA. In product development, we follow a security-by-design approach where remote connectivity and cybersecurity are always thought of together. With our end-to-end encrypted connections and comprehensive security features such as conditional access, companies can centrally manage the access rights of their employees and are at the same time armed against attacks from outside.\"<\/p>","protected":false},"excerpt":{"rendered":"<p>A considerable proportion of IT executives in German-speaking countries believe their own companies are inadequately armed against cyberattacks.<\/p>","protected":false},"author":38,"featured_media":112341,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,40469,161],"tags":[8405,20346,39829,224],"coauthors":[19920],"class_list":["post-112338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-22-03","category-szene","tag-cyberangriffe","tag-cybersecurity","tag-szene","tag-umfrage","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2022\/04\/shutterstock_2100631906-NicoElNino-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Ein betr\u00e4chtlicher Teil des IT-F\u00fchrungspersonals im deutschsprachigen Raum sieht das eigene Unternehmen nur unzureichend gegen Cyberangriffe gewappnet.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-22-03\/\" rel=\"category tag\">Mag 22-03<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/szene\/\" rel=\"category tag\">Szene<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/112338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=112338"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/112338\/revisions"}],"predecessor-version":[{"id":137766,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/112338\/revisions\/137766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/112341"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=112338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=112338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=112338"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=112338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}