{"id":2631,"date":"2021-10-21T16:28:33","date_gmt":"2021-10-21T14:28:33","guid":{"rendered":"https:\/\/ur4-tia.com\/cyber-security\/information-security\/"},"modified":"2022-03-02T15:55:05","modified_gmt":"2022-03-02T14:55:05","slug":"information-security","status":"publish","type":"page","link":"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2631\" class=\"elementor elementor-2631 elementor-377\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eecba20 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eecba20\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;e3344d0&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-92d2a33\" data-id=\"92d2a33\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c04e276 elementor-widget elementor-widget-heading\" data-id=\"c04e276\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security and IT Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ccaf10d elementor-widget elementor-widget-heading\" data-id=\"ccaf10d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Relevance of information security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95a1fc7 elementor-widget elementor-widget-text-editor\" data-id=\"95a1fc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhy is\u00a0<strong>information security<\/strong>\u00a0important?\u00a0Whether in business or in the public sector &#8211; organizations have never been more concerned with collecting, managing, using, interpreting and publishing information.\u00a0And organizations have never been more willing to make purely fact-based decisions, to subordinate other decision-making criteria and values \u200b\u200bto the information base.\r\n\r\nInformation sovereignty means power.\u00a0Information security ensures a stable and correct power base.\u00a0Incorrect information, on the other hand &#8211; incorrectly collected, misinterpreted, maliciously foisted on or disseminated in public &#8211; can quickly lead to real or PR disasters for the organizations concerned.\r\n\r\nWhere information management wants to lay the foundation for good decisions, the discipline of information security should reduce wrong decisions due to incorrect or insufficient information.\u00a0Because never before have the amount, timeliness and, above all, the correctness of available information had such an effect on serious strategic and operational action as it does today &#8211; leaving the special area &#8220;fake news&#8221; out of the picture.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-805da82 elementor-widget elementor-widget-heading\" data-id=\"805da82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Definition and core values of information security<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bacc7a3 elementor-widget elementor-widget-text-editor\" data-id=\"bacc7a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tInformation security has a\u00a0<strong>general definition<\/strong>: making the complete, correct information base available to your organization in a timely manner and keeping it free from false\/incorrect information.\u00a0In operational practice, however, there are often adapted implementations: In many organizations, information security is interpreted individually and charged with specific priorities.\u00a0It is particularly often mixed up mentally with the actual sub-disciplines of IT security or cyber security or is completely equated with them.\r\n\r\nFirst and foremost, however, information security is about ensuring the protection goals or protection classes of confidentiality, integrity and availability for ALL types of data and information (see below).\r\n\r\nIt describes both a status and the processes with which sensitive data is secured against unauthorized access and changes.\u00a0For this purpose, the\u00a0<strong>process model of information security<\/strong>\u00a0defines\u00a0organization-specific,\r\n<ul>\r\n \t<li>the way in which existing or emerging threats are assessed both outside and within an organization<\/li>\r\n \t<li>how specific existing and future vulnerabilities are identified and protected, and<\/li>\r\n \t<li>how your own organization reacts to attacks \u2013 unsuccessful and successful.<\/li>\r\n<\/ul>\r\n&nbsp;\r\n\r\nThe\u00a0<strong>state\u00a0of information security<\/strong>\u00a0is achieved when the risk situation is secured and checked regularly to such an extent that the targets and routes of attack are known and monitored, appropriate responses to attacks are made and, ultimately, the risk of an incident in connection with the stated protection targets is assessed as acceptable overall will.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-807a742 elementor-widget elementor-widget-heading\" data-id=\"807a742\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information security - a delimitation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80cc75f elementor-widget elementor-widget-text-editor\" data-id=\"80cc75f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn general,\u00a0<strong>information security is an overarching term<\/strong>\u00a0that summarizes a wide variety of (sub)disciplines \u2013 today primarily IT.\u00a0These include IT security (in both forms IT safety and IT security), cyber security, IT governance.\r\n\r\nIn a narrower sense, information security differs in content from the above disciplines, but has many interfaces and overlaps with them, or one discipline intensively influences the other.\r\n\r\nHowever, there are different focal points that justify separate consideration: While IT security and cybersecurity tend to focus on IT systems and networks, information security generally focuses on content &#8211; i.e. information &#8211; and how it is handled.\r\n\r\nSure, a large part of relevant information is now available in digital form.\u00a0They are stored, transported, and processed.\u00a0However, there are also many types of information that fall outside of the above disciplines:\r\n\r\nInformation that is exclusively or additionally available on classic storage media, in explicit form e.g. on all types of paper or e.g. blackboards and whiteboards, or implicitly in the heads of the employees, exchanged in direct conversations at meetings, in the coffee kitchen or with the partner at home.\u00a0In addition to digitized data and information, all of these are also part of information security.\r\n\r\nIrrespective of the nature of the information: if it leaks out unintentionally, is falsified or is suddenly no longer available and processable, this has at least annoying and often even critical effects for companies.\u00a0For this reason, it is worthwhile for every company to give serious thought to information security.\u00a0And that goes beyond the usual DIN, ISO and BSI specifications.\r\n\r\nUltimately, information security is roughly at the level of corporate governance and shares some concepts and goals with it, although the perspectives on them differ.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1286202 elementor-widget elementor-widget-heading\" data-id=\"1286202\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The primary goal of information security: reliability<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94ec44e elementor-widget elementor-widget-text-editor\" data-id=\"94ec44e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>The reliable availability<\/strong>\u00a0of correct information for authorized persons: this is ultimately the central point of information security.\u00a0This is also and above all a matter of the processes related to information: How and where is information created, how and where is it stored, processed, shared, deleted?\u00a0How is it ensured that only desired and error-free changes take place, that they are within the framework of the law, and that the outflow of information is also avoided?\u00a0On the other hand, information should be available correctly and as needed.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d14316 elementor-widget elementor-widget-heading\" data-id=\"2d14316\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protection goals of information security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7e7828 elementor-widget elementor-widget-text-editor\" data-id=\"a7e7828\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo ensure reliability, derived\u00a0<strong>protection goals of information security<\/strong>\u00a0have primarily been established in three technical dimensions:\r\n<ul>\r\n \t<li>Confidentiality: Data and information should only be accessible and changeable for people who have a legitimate interest in them to optimally carry out their internal company tasks.\r\nThis reduces, for example, the risk of data leakage through personally known information.<\/li>\r\n \t<li>Integrity: data and information must be complete; data origin and data changes should be clearly marked.<\/li>\r\n \t<li>Availability: Data and information should be available in a timely and appropriate manner.\u00a0In addition to general access options and suitable authorization concepts, this also includes disaster prevention with defined recovery times after physical (local or large-scale system failures) or logical incidents (faulty data changes or deletions).\r\nLikewise, when planning availability, the people who make the handling of this data possible in the first place must not be forgotten.<\/li>\r\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4785602 elementor-widget elementor-widget-image\" data-id=\"4785602\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"307\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-1-1024x393.png\" class=\"attachment-large size-large wp-image-2509\" alt=\"Basic values of information security\" srcset=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-1-1024x393.png 1024w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-1-300x115.png 300w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-1-768x294.png 768w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-1.png 1226w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec004d1 elementor-widget elementor-widget-text-editor\" data-id=\"ec004d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFigure 1: Basic values of information security\r\n\r\nSource: https:\/\/www.shd-online.de\/leistungsprofil\/it-security\/ or https:\/\/conjamo.de\/beratung\/it-security-und-informationssicherheit\/\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30e30d5 elementor-widget elementor-widget-image\" data-id=\"30e30d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"480\" height=\"393\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/11\/schutzziele-informationssicherheit.png\" class=\"attachment-large size-large wp-image-2510\" alt=\"Information security objectives\" srcset=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/11\/schutzziele-informationssicherheit.png 480w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/11\/schutzziele-informationssicherheit-300x246.png 300w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4159509 elementor-widget elementor-widget-text-editor\" data-id=\"4159509\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFigure 2: Pillars of information security\r\n\r\nSource: https:\/\/www.fabasoft.com\/de\/news\/blog\/sicher-die-cloud-wie-das-geht\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db406db elementor-widget elementor-widget-text-editor\" data-id=\"db406db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEspecially in connection with the highly complex data structures and authorization concepts in SAP environments, which play a critical role in many commercial companies, these three dimensions are of central importance: in many companies, SAP systems are considered the leading systems for the sustainable storage, processing and distribution of data and information.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abf6b33 elementor-widget elementor-widget-heading\" data-id=\"abf6b33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Structure of information security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1343782 elementor-widget elementor-widget-text-editor\" data-id=\"1343782\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tInformation security includes a whole complex of general structures and concrete measures, often referred to as information security management system (ISMS).\r\n\r\nIrrespective of whether such a system is set up voluntarily or clearly prescribed according to the standards mentioned below or follows purely individual approaches,\u00a0<strong>certain components<\/strong>\u00a0should or must be present:\r\n<ul>\r\n \t<li>Clearly named information security officers (ISB)<\/li>\r\n \t<li>Binding and transparent targets<\/li>\r\n \t<li>Clearly formulated guidelines<\/li>\r\n \t<li>Employee qualification for all employees according to their role<\/li>\r\n \t<li>Regular review and adjustment processes<\/li>\r\n \t<li>Continuous Improvement<\/li>\r\n \t<li>Specific measures for concrete incidents, but also general measures for previously unknown dangers.<\/li>\r\n<\/ul>\r\n&nbsp;\r\n\r\nEspecially for the last point (measures) and not only since the public effective entry into force of the GDPR, there are some central elements in expert jargon such as the technical and organizational measures &#8211; in short: TOMs.\u00a0It is precisely in these that one of the overlaps with other disciplines takes place, because the TOMs also contain lists and measures in and for technical systems.\r\n\r\nThe degree of maturity of information security can be seen from the TOMs, as well as from the intensity of the exchange with the other relevant organizational and process units.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e6b192 elementor-widget elementor-widget-heading\" data-id=\"3e6b192\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Protection and Information Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4bb6b elementor-widget elementor-widget-text-editor\" data-id=\"5a4bb6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Information security requirements<\/strong>\u00a0can be found primarily\u00a0<strong>in \u200b\u200brisk management<\/strong>.\u00a0In addition to company-specific objectives, they come from many national and international standards and laws.\r\n\r\nThe German IT-Grundschutz of the BSI and the Federal Data Protection Act have defined general criteria for information protection almost independently for a long time.\u00a0With the German IT Security Act ITSiG, the KRITIS regulation and of course the European General Data Protection Regulation (GDPR) there has been a lot of movement and change in recent years &#8211; the latter in particular promises severe penalties as an additional motivation for non-compliance.\r\n\r\nMore specific approaches to information security can be found in the ISO\/IEC 27000 series.\u00a0International regulations such as the Sarbanes-Oxley Act (SOX) from 2002 also play an important role.\u00a0And especially with regard to Industry 4.0, IEC 62443 is also gaining in importance, especially for industrial companies.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c438e82 elementor-widget elementor-widget-heading\" data-id=\"c438e82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementation of Information Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b557ab9 elementor-widget elementor-widget-heading\" data-id=\"b557ab9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Measures<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bce4d3d elementor-widget elementor-widget-text-editor\" data-id=\"bce4d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn addition to\u00a0<strong>purely organizational measures<\/strong>\u00a0to implement information security such as\r\n<ul>\r\n \t<li>defined and above all documented processes for information management<\/li>\r\n \t<li>together with their permanent follow-up in day-to-day operations and public certification in the form of audits and certifications as well<\/li>\r\n \t<li>regular employee training to raise awareness of all those involved in handling data and information,<\/li>\r\n<\/ul>\r\n&nbsp;\r\n\r\n<strong>many technical measures<\/strong>\u00a0are\u00a0possible.\u00a0With regard to the dimensions or protection goals of information security already mentioned, these are usually:\r\n<ul>\r\n \t<li>Confidentiality: specific authorization management, physical (access control systems, etc.) and IT measures (user profiling in the IT infrastructure and in the applications)<\/li>\r\n \t<li>Integrity: (IT) governance structures, architecture management, IT development plans, etc. to support a functional interaction of all areas and components.<\/li>\r\n \t<li>Availability: Risk analysis, availability and disaster recovery measures covering all relevant risks.<\/li>\r\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56f0596 elementor-widget elementor-widget-image\" data-id=\"56f0596\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"484\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-3-1024x619.png\" class=\"attachment-large size-large wp-image-2511\" alt=\"Implementation of information security\" srcset=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-3-1024x619.png 1024w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-3-300x181.png 300w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-3-768x464.png 768w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-3-1536x928.png 1536w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-3-2048x1238.png 2048w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2022\/02\/InformationSecurity-3-1320x798.png 1320w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b515c0a elementor-widget elementor-widget-text-editor\" data-id=\"b515c0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAbbildung 3: Management der Informationssicherheit\r\n\r\nQuelle: <a href=\"https:\/\/www.it-daily.net\/images\/Bilder-ITS\/Onlineartikel_ISO27001_2013_Bild1.jpg\" target=\"_blank\" rel=\"noopener\">https:\/\/www.it-daily.net\/images\/Bilder-ITS\/Onlineartikel_ISO27001_2013_Bild1.jpg<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e28100 elementor-widget elementor-widget-text-editor\" data-id=\"7e28100\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAlone with a view to more or less complex SAP environments, a vast number of possibilities can be played through in the three protection goals mentioned above and implemented in almost any complexity: The SAP standard generally offers all the necessary software-technical possibilities.\u00a0In terms of (not only) information security, there is a whole range of third-party solutions.\u00a0From the point of view of existing skillsets and the daily operational effort, such extensions enable occasional, standard, and power users to make their work easier with a small one-off effort.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d06ad21 elementor-widget elementor-widget-heading\" data-id=\"d06ad21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Information security and consulting in SMEs<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ffb23c elementor-widget elementor-widget-text-editor\" data-id=\"3ffb23c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn view of the increasing complexity and the ever-advancing technical progress, it makes\u00a0<strong>sense for medium-sized companies<\/strong>\u00a0to involve appropriately\u00a0<strong>experienced external experts<\/strong>. They look at the risks and measures in a company-specific manner and under best-practice aspects. Otherwise, information security and related disciplines can quickly be brought into an unsuitable cost-benefit ratio.\r\n\r\nIn the past, the consultants from Firnkorn and Stortz have already shown, as competent consultants, which weak points open up in the environment of information security in a company.\u00a0Concrete recommendations for action on how to deal with these gaps and the overall context of the company are also\u00a0part of the\u00a0<strong>advice and support for information security.<\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1c05bc9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c05bc9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;6dfe797&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1908cbf\" data-id=\"1908cbf\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd0041b no-index elementor-widget elementor-widget-heading\" data-id=\"dd0041b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Also, read more on related topics<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c97b45 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5c97b45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/it-security-concept\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">IT security concept<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/data-protection-and-data-security\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Data protection and data security<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/fail-safe\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fail-safe<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ur4-tia.com\/en\/guide-information\/cyber-security\/high-availability-definition-classes-and-implementation\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">High availability<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60b3113 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60b3113\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9316129&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f026334\" data-id=\"f026334\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73228fc elementor-widget elementor-widget-heading\" data-id=\"73228fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your contact at Firnkorn &amp; Stortz on the subject of information security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae44445 elementor-widget elementor-widget-template\" data-id=\"ae44445\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"2670\" class=\"elementor elementor-2670 elementor-802 elementor-802\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c315173 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c315173\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;8d63371&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d5c2653\" data-id=\"d5c2653\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2991e4e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2991e4e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c890c66&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-292ce79\" data-id=\"292ce79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-781dd28 elementor-widget elementor-widget-image\" data-id=\"781dd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"933\" src=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-878x1024.jpg\" class=\"attachment-large size-large wp-image-2496\" alt=\"\" srcset=\"https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-878x1024.jpg 878w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-257x300.jpg 257w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-768x895.jpg 768w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-1318x1536.jpg 1318w, https:\/\/ur4-tia.com\/wp-content\/uploads\/2021\/09\/Thomas-Firnkorn-1757x2048.jpg 1757w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a2a2ca8\" data-id=\"a2a2ca8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fcd87a2 elementor-widget elementor-widget-heading\" data-id=\"6fcd87a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Firnkorn + Stortz GmbH<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7488ebdd elementor-widget elementor-widget-heading\" data-id=\"7488ebdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Thomas Firnkorn<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-576c9278 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"576c9278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+4963239819011\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-phone\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+49 6323 9819011<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+4915146736468\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-mobile-alt\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+49 151 46736468<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:thomas.firnkorn@ur4-tia.com\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-at\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">thomas.firnkorn@ur4-tia.com<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Security and IT Security Relevance of information security Why is\u00a0information security\u00a0important?\u00a0Whether in business or in the public sector &#8211; organizations have never been more concerned with collecting, managing, using, interpreting and publishing information.\u00a0And organizations have never been more willing to make purely fact-based decisions, to subordinate other decision-making criteria and values \u200b\u200bto the information [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2629,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2631","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/comments?post=2631"}],"version-history":[{"count":5,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2631\/revisions"}],"predecessor-version":[{"id":2736,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2631\/revisions\/2736"}],"up":[{"embeddable":true,"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/pages\/2629"}],"wp:attachment":[{"href":"https:\/\/ur4-tia.com\/en\/wp-json\/wp\/v2\/media?parent=2631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}