{"id":138661,"date":"2024-01-24T14:25:49","date_gmt":"2024-01-24T13:25:49","guid":{"rendered":"http:\/\/e3mag.com\/?p=138661"},"modified":"2024-01-24T14:25:50","modified_gmt":"2024-01-24T13:25:50","slug":"proteccion-contra-los-ataques-ciberneticos","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/schutz-vor-hackerangriffen\/","title":{"rendered":"Protecci\u00f3n contra ataques cibern\u00e9ticos"},"content":{"rendered":"<p>Las empresas que carecen de una gesti\u00f3n profesional de los datos no disponen de una protecci\u00f3n eficaz contra las crisis y est\u00e1n expuestas a un mayor riesgo de ataques de piratas inform\u00e1ticos. Casi el 70% de las empresas lo han reconocido y est\u00e1n aumentando significativamente sus inversiones en el desarrollo y expansi\u00f3n de la gesti\u00f3n de datos en los pr\u00f3ximos cinco a\u00f1os. Sin embargo, s\u00f3lo algo menos del 20% ha implantado plenamente la gesti\u00f3n de datos hasta la fecha, seg\u00fan un nuevo estudio de BearingPoint. La consultora de gesti\u00f3n y tecnolog\u00eda BearingPoint encuest\u00f3 a m\u00e1s de 200 especialistas y directivos de los sectores de automoci\u00f3n, proveedores e ingenier\u00eda mec\u00e1nica sobre el tema de la gesti\u00f3n de datos.<\/p>\n\n\n\n<p>Para m\u00e1s del 70% de los encuestados, la gesti\u00f3n de datos es tambi\u00e9n un requisito previo esencial para la ciberseguridad y el refuerzo de la resistencia de su empresa. Sin embargo, solo alrededor del 20% de las empresas encuestadas han establecido plenamente la gesti\u00f3n de datos en todas las dimensiones.<\/p>\n\n\n\n<p>En general, el estudio concluye que las empresas han reconocido sin duda las ventajas de la gesti\u00f3n de datos: el 69% de todas las empresas encuestadas y m\u00e1s del 70% de los fabricantes y proveedores de veh\u00edculos tienen intenci\u00f3n de aumentar significativamente sus inversiones en gesti\u00f3n de datos en los pr\u00f3ximos cinco a\u00f1os.<\/p>\n\n\n\n<p>Al mismo tiempo, seg\u00fan los expertos de BearingPoint, la falta de recursos y la insuficiente experiencia dentro de la empresa se han revelado como los mayores obst\u00e1culos para implantar la gesti\u00f3n de datos.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bearingpoint.com\/de-de\/\" target=\"_blank\" rel=\"noreferrer noopener\">bearingpoint.com<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>La gesti\u00f3n digital de datos es esencial, pero s\u00f3lo el 20 por ciento de las empresas ya la han implantado. Todas las dem\u00e1s empresas corren el riesgo de ser v\u00edctimas de un ataque de hackers.<\/p>","protected":false},"author":2368,"featured_media":138679,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2],"tags":[26082],"coauthors":[39720],"class_list":["post-138661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","tag-cybersicherheit","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-400x180.jpg",400,180,true],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-18x8.jpg",18,8,true],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-600x270.jpg",600,270,true],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-600x450.jpg",600,450,true],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2024\/01\/schutz-vor-hackerangriffen-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Digitales Datenmanagement ist unverzichtbar, aber nur 20 Prozent der Unternehmen haben es schon implementiert. Alle anderen Unternehmen sind in Gefahr, Opfer eines Hackerangriffs zu werden.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/category\/sap-nachrichten\/\" rel=\"category tag\">Community Nachrichten<\/a>","author_info_v2":{"name":"E3 Magazine","url":"https:\/\/e3mag.com\/es\/author\/e3_magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/138661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/2368"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=138661"}],"version-history":[{"count":2,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/138661\/revisions"}],"predecessor-version":[{"id":138699,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/138661\/revisions\/138699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/138679"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=138661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=138661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=138661"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=138661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}