{"id":138661,"date":"2024-01-24T14:25:49","date_gmt":"2024-01-24T13:25:49","guid":{"rendered":"http:\/\/e3mag.com\/?p=138661"},"modified":"2024-01-24T14:25:50","modified_gmt":"2024-01-24T13:25:50","slug":"protection-against-hacker-attacks","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/schutz-vor-hackerangriffen\/","title":{"rendered":"Protection Against Hacker Attacks"},"content":{"rendered":"<p>Companies without professional data management have no effective protection against crises and are exposed to an increased risk of hacker attacks. Almost 70 percent of companies have recognized this and are significantly increasing their investments in the development and expansion of data management over the next five years. However, only just under 20 percent have fully implemented data management to date, according to a new BearingPoint study. The management and technology consultancy BearingPoint surveyed more than 200 specialists and managers from the automotive, supplier and mechanical engineering sectors on the topic of data management.<\/p>\n\n\n\n<p>For over 70% of respondents, data management is also an essential prerequisite for cybersecurity and strengthening their company's resilience. However, only around 20 percent of the companies surveyed have fully established data management across all dimensions.<\/p><div id=\"great-554390859\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6Ja0zaCg0ss\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_bdc_2026_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<p>Overall, the study concludes that companies have certainly recognized the benefits of data management: 69 percent of all companies surveyed and over 70 percent of vehicle manufacturers and suppliers intend to significantly increase their investments in data management over the next five years.<\/p>\n\n\n\n<p>At the same time, according to the experts at BearingPoint, a lack of resources and insufficient expertise within the company have emerged as the biggest hurdles to implementing data management.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bearingpoint.com\/de-de\/\" target=\"_blank\" rel=\"noreferrer noopener\">bearingpoint.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Digital data management is essential, but only 20 percent of companies have implemented it already. All other companies are at risk of falling victim to a hacker attack.<\/p>","protected":false},"author":2368,"featured_media":138679,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2],"tags":[26082],"coauthors":[39720],"class_list":["post-138661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","tag-cybersicherheit","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Digitales Datenmanagement ist unverzichtbar, aber nur 20 Prozent der Unternehmen haben es schon implementiert. Alle anderen Unternehmen sind in Gefahr, Opfer eines Hackerangriffs zu werden.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e3_magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/138661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=138661"}],"version-history":[{"count":2,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/138661\/revisions"}],"predecessor-version":[{"id":138699,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/138661\/revisions\/138699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/138679"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=138661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=138661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=138661"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=138661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}