{"id":144416,"date":"2024-08-23T07:00:00","date_gmt":"2024-08-23T05:00:00","guid":{"rendered":"http:\/\/e3mag.com\/?p=144416"},"modified":"2024-08-12T11:26:22","modified_gmt":"2024-08-12T09:26:22","slug":"knowledge-deficits-with-far-reaching-consequences","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/knowledge-deficits-with-far-reaching-consequences\/","title":{"rendered":"Knowledge deficits with far-reaching consequences"},"content":{"rendered":"<p>A new survey published by cybersecurity provider Hornetsecurity reveals significant gaps in IT security training, with 26% of organizations still not providing training to their end users. In a rapidly evolving cybersecurity landscape, where threat actors are constantly finding new ways to infiltrate and harm organizations, this can become a problem. <\/p>\n\n\n\n<p>Employees should be at the heart of every company's cyber security strategy. Unfortunately, the study showed that not only are there gaps in employee training, but also that any initiatives are seen as ineffective. 39 percent of respondents stated that training does not adequately address current or AI-powered cyber threats. In a world where AI is accelerating and increasing the scale and effectiveness of attacks, this can become alarming.<\/p><div id=\"great-1464629826\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk.jpg\" alt=\"\" class=\"wp-image-144417\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-400x209.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-768x402.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-100x52.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-480x251.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-640x335.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-720x377.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-960x502.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-1168x611.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-18x9.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2024\/08\/240604_ISec_Survey_Fehlende-Sicherheitsschulungen_DE_Hornetsecurity_cmyk-600x314.jpg 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/hornetsecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">hornetsecurity.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>New study by Hornetsecurity shows that 26 percent of companies do not use IT security training for end users.<\/p>","protected":false},"author":2368,"featured_media":143197,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,43978],"tags":[],"coauthors":[39720],"class_list":["post-144416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-24-07-08","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/06\/2406-16-ThreatReport-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Neue Studie von Hornetsecurity zeigt, dass 26 Prozent der Unternehmen keine IT-Sicherheitsschulungen f\u00fcr Endanwender nutzen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/sap-news\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-24-07-08\/\" rel=\"category tag\">MAG 24-07 \/ 08<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e3_magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/144416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=144416"}],"version-history":[{"count":2,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/144416\/revisions"}],"predecessor-version":[{"id":144421,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/144416\/revisions\/144421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/143197"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=144416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=144416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=144416"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=144416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}