{"id":12403,"date":"2019-12-18T18:09:53","date_gmt":"2019-12-18T17:09:53","guid":{"rendered":"https:\/\/acent.de\/cyber-security\/"},"modified":"2025-12-15T12:10:41","modified_gmt":"2025-12-15T11:10:41","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/acent.de\/en\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"image-header-full-width\">\n\t\t\t<div class=\"header-image-full-width\">\n\t\t\t\t<div class=\"header-image-media\">\n\t\t\t\t\t<div id=\"wp-header-image\" class=\"wp-header-image\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/acent.de\/wp-content\/uploads\/2019\/12\/Header-schmal-Kompetenzen-Cyber-Securtity.jpg\" alt=\"\">\n\t\t\t\t\t\t<div class=\"opacity-mask\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"header-image-full-width-text\">\n\t\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<h3>Cyber Security<\/h3>\n<h1>Resilience of your Business Processes against Cyber Risks<\/h1>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t<\/div>\n\n\t\t\t<div class=\"container wrapper wrapper-after-image\">\n\t\t<div class=\"row\">\n\t\t<div class=\"col-sm-12\">\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p class=\"p1\" style=\"text-align: justify;\">Cyber risks pose a significant threat to companies and organisations. Waves of ransomware attacks bring business processes or entire companies to a standstill. Data leaks lead to reputational damage and fines. Important know-how is drained by attacks by professionally organised hacker organisations.\u00a0\u00a0<\/p>\n<p class=\"p1\" style=\"text-align: justify;\">Digitisation increases the areas exposed to such attacks. Increasingly heterogeneous system landscapes with hybrid cloud architectures exacerbate the situation. It is becoming increasingly difficult for companies and organisations to defend their business processes and data efficiently against such attacks.\u00a0\u00a0<\/p>\n<p class=\"p1\" style=\"text-align: justify;\">We help you to find the right strategy for your company against these challenges. Here, the focus is on a risk-based process and the integration of a modern security-by-design approach. The early identification of attacks and effective defences are just as important as awareness measures for employees and management.\u00a0<\/p>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<style>.sprung {visibility: hidden; height: 0px !important; position: absolute; margin: -100px;}<\/style>\n<ul class=\"nav nav-tabs perfect-nav-tabs txt_standard\" id=\"tab-360085462\" role=\"tablist\">\n\t\t\t<li class=\"nav-item\">\n\t\t\t\t\t\t\t\t<div id=\"cyberstrategy-tab\" class=\"sprung\"><\/div>\n\t\t<a class=\"nav-link active\" data-toggle=\"tab\" href=\"#cyberstrategy\" role=\"tab\" aria-controls=\"cyberstrategy\" aria-selected=\"true\">Cyber Strategy<\/a>\n\t\t    <\/li>\n    \t\t\t<li class=\"nav-item\">\n\t\t\t\t\t\t\t\t<div id=\"riskassessment-tab\" class=\"sprung\"><\/div>\n\t\t<a class=\"nav-link\" data-toggle=\"tab\" href=\"#riskassessment\" role=\"tab\" aria-controls=\"riskassessment\" aria-selected=\"true\">Risk Assessment<\/a>\n\t\t    <\/li>\n    \t\t\t<li class=\"nav-item\">\n\t\t\t\t\t\t\t\t<div id=\"itcompliance-tab\" class=\"sprung\"><\/div>\n\t\t<a class=\"nav-link\" data-toggle=\"tab\" href=\"#itcompliance\" role=\"tab\" aria-controls=\"itcompliance\" aria-selected=\"true\">IT Compliance<\/a>\n\t\t    <\/li>\n    \t<\/ul>\n\n<style>@media screen and (min-width: 767px) {.tab-col-2{\n-moz-column-count: 2;\n-webkit-column-count: 2;\ncolumn-count: 2;}}<\/style><div class=\"tab-content txt_standard\" id=\"perfectTabContent\">\n\t\t\t\t\t\t<div class=\"tab-pane fade show active\" id=\"cyberstrategy\" role=\"tabpanel\" aria-labelledby=\"cyberstrategy-tab\">\n\t\t<div class=\"tab-col-2\">\n\t\t\t<p><b>Survival strategy for your company<\/b><br>Most companies are aware of the importance of cyber security. Without extensive protection and defence measures, successful cyber attacks acutely diminish a company\u2019s ability to survive. The question quickly arises of how much and what do you need to invest in order to ensure adequate protection for your own company? What risks can you take, and where should you tread particularly carefully?<\/p><p><b>Balance between investment and residual risk<\/b><br>These questions are key when developing a cyber security strategy. The aim is to achieve a good balance between investment in cyber security and the remaining risks. External requirements such as the IT Security Act or the GDPR must be included, as well as your company\u2019s risk profile.<\/p><p><b>Bespoke cyber security strategy<\/b><br>We help you to answer these questions, and thus develop an up-to-date cyber security strategy. This provides the framework from which you can derive the specific protection and defence measures for your various business processes.<\/p>\t\t<\/div>\n    <\/div>\n    \t\t\t\t\t\t\t<div class=\"tab-pane fade\" id=\"riskassessment\" role=\"tabpanel\" aria-labelledby=\"riskassessment-tab\">\n\t\t<div class=\"tab-col-2\">\n\t\t\t<p><b>Identifying Areas of Attack<\/b><br>Using this cyber security risk assessment, we identify and analyse potential weak points in processes, in employee awareness or in IT assets with regard to potential threats to your critical business processes.<\/p><p><b>Risk-based Analysis<\/b><br>In methodological terms, this means: starting from business critical processes, we identify weak points in digitised business processes and their supporting assets in a risk-based analysis.<\/p><p><b>Prioritisation of Mitigation measures<\/b><br>We then jointly analyse, evaluate and prioritise the costs and benefits of potential mitigation measures for the identified risks.<\/p><p><b>Stability even in the Event of an Attack<\/b><br>In addition to immediate mitigation measures, we develop proposals to further develop your critical business processes and IT services in such a way that, in the event of disruptions, major processes continue to function in a stable manner at a minimal acceptable level by means of appropriate strategies and measures.<\/p>\t\t<\/div>\n    <\/div>\n    \t\t\t\t\t\t\t<div class=\"tab-pane fade\" id=\"itcompliance\" role=\"tabpanel\" aria-labelledby=\"itcompliance-tab\">\n\t\t<div class=\"tab-col-2\">\n\t\t\t<p><b>Implementing Statutory Requirements<\/b><br>IT compliance includes all of the measures, structures and processes established within your company that ensure your IT is legally compliant with internal, external or statutory requirements.<\/p><p><b>Secure and Certify<\/b><br>In particular, external statutory requirements which can also have an indirect impact on your company via your customers present a major challenge. It is important here to secure critical business processes in the shortest possible time, and if necessary, to have them certified.<\/p><p><b>Compiling a Requirements Catalogue<\/b><br>We support you in identifying critical business processes, analysing the current status and comparing their level of maturity against an internal and external catalogue of requirements.<\/p><p><b>Protecting your Business Processes and Services<\/b><br>Building on this, we then jointly develop recommendations on how you can protect your critical business processes and IT services so that you comply with the internal and external requirements.<\/p>\t\t<\/div>\n    <\/div>\n    \t\t<\/div>\n\n\n\n\t<div class=\"row mt-4\">\n\t\t<div class=\"col-sm-12\">\n\t \t\t<div class=\"heading\"><h2>Contact<\/h2><\/div>\n\t \t<\/div>\n\t<\/div>\n\t\t<div class=\"row mb-5 ansprechpartner justify-content-md-center\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-sm-6 col-md-4\">\n\t\t\t\t\t<div class=\"row text-center\">\n\t\t\t\t\t\t<div class=\"col-sm-10 offset-md-1\">\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"txt\"><a href=\"https:\/\/acent.de\/en\/partner\/hermann-leucker\/\" title=\"Hermann Leucker\" class=\"partner_img\"\"><img decoding=\"async\" src=\"https:\/\/acent.de\/wp-content\/uploads\/2016\/07\/Hermann-Leucker-ACENT-400x297.png\" class=\"attachment-img400 size-img400 wp-post-image\" alt=\"\" srcset=\"https:\/\/acent.de\/wp-content\/uploads\/2016\/07\/Hermann-Leucker-ACENT-400x297.png 400w, https:\/\/acent.de\/wp-content\/uploads\/2016\/07\/Hermann-Leucker-ACENT-600x446.png 600w, https:\/\/acent.de\/wp-content\/uploads\/2016\/07\/Hermann-Leucker-ACENT.png 686w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><h4><a href=\"https:\/\/acent.de\/en\/partner\/hermann-leucker\/\" title=\"Hermann Leucker\">Dr. Hermann Leucker<\/a><\/h4><div class=\"partner\"><a href=\"https:\/\/acent.de\/en\/partner\/hermann-leucker\/\" title=\"Partner\">Partner<\/a><\/div><\/div><div class=\"contact-social mt-3 text-center\"><a href=\"javascript:secureDecryptAndNavigate('6TAnnWGghJer9H6cWXql0i8NFaIPcjwBeRd\/ukfB7PeARJm+BmAiwqBQMmfQknHDWj+FMJ6jAsSOnIUpoUFikC0sxLgzXkUsZA==', 'da1ce663fbe302b6dc71a22fc457b416da9d774363e1dcb503d03f8cd55d8c00')\"><i class=\"fa fa-envelope-o\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/in\/dr-hermann-leucker-1a437447\/\" target=\"_blank\"><i class=\"fa fa-linkedin\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-sm-6 col-md-4\">\n\t\t\t\t\t<div class=\"row text-center\">\n\t\t\t\t\t\t<div class=\"col-sm-10 offset-md-1\">\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"txt\"><a href=\"https:\/\/acent.de\/en\/partner\/roland-von-gehlen\/\" title=\"Roland von Gehlen\" class=\"partner_img\"\"><img decoding=\"async\" src=\"https:\/\/acent.de\/wp-content\/uploads\/2016\/07\/Roland-von-Gehlen-ACENT-400x297.png\" class=\"attachment-img400 size-img400 wp-post-image\" alt=\"\" srcset=\"https:\/\/acent.de\/wp-content\/uploads\/2016\/07\/Roland-von-Gehlen-ACENT-400x297.png 400w, https:\/\/acent.de\/wp-content\/uploads\/2016\/07\/Roland-von-Gehlen-ACENT-600x446.png 600w, https:\/\/acent.de\/wp-content\/uploads\/2016\/07\/Roland-von-Gehlen-ACENT.png 686w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><h4><a href=\"https:\/\/acent.de\/en\/partner\/roland-von-gehlen\/\" title=\"Roland von Gehlen\"> Roland von Gehlen<\/a><\/h4><div class=\"partner\"><a href=\"https:\/\/acent.de\/en\/partner\/roland-von-gehlen\/\" title=\"Partner\">Partner<\/a><\/div><\/div><div class=\"contact-social mt-3 text-center\"><a href=\"javascript:secureDecryptAndNavigate('q4JYknlkl9EScXcKh1NTVMOyaeoq2Jy6EOmA\/UtOPXOpHe5BYKjiVz36j267DrCjhJ1ox9RTPqXBowCXN+Jsi2g9o3MdZhWt1Q==', 'da1ce663fbe302b6dc71a22fc457b416da9d774363e1dcb503d03f8cd55d8c00')\"><i class=\"fa fa-envelope-o\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/in\/roland-von-gehlen-28780668\/\" target=\"_blank\"><i class=\"fa fa-linkedin\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-sm-6 col-md-4\">\n\t\t\t\t\t<div class=\"row text-center\">\n\t\t\t\t\t\t<div class=\"col-sm-10 offset-md-1\">\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"txt\"><a href=\"https:\/\/acent.de\/en\/partner\/ralf-ehren\/\" title=\"Ralf Ehren\" class=\"partner_img\"\"><img decoding=\"async\" src=\"https:\/\/acent.de\/wp-content\/uploads\/2019\/04\/Ralf-Ehren-ACENT-400x297.png\" class=\"attachment-img400 size-img400 wp-post-image\" alt=\"\" srcset=\"https:\/\/acent.de\/wp-content\/uploads\/2019\/04\/Ralf-Ehren-ACENT-400x297.png 400w, https:\/\/acent.de\/wp-content\/uploads\/2019\/04\/Ralf-Ehren-ACENT-600x446.png 600w, https:\/\/acent.de\/wp-content\/uploads\/2019\/04\/Ralf-Ehren-ACENT.png 686w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><h4><a href=\"https:\/\/acent.de\/en\/partner\/ralf-ehren\/\" title=\"Ralf Ehren\"> Ralf Ehren<\/a><\/h4><div class=\"partner\"><a href=\"https:\/\/acent.de\/en\/partner\/ralf-ehren\/\" title=\"Partner\">Partner<\/a><\/div><\/div><div class=\"contact-social mt-3 text-center\"><a href=\"javascript:secureDecryptAndNavigate('X7jYJTN8xyaDrVChIZsa23vVa6AwKyMyH3PT6hH3NWeaIfZJOS4OqSXikydvJLWUHiebDnR8GYf2vHIPEgVe8\/m4wSrI0Wc=', 'da1ce663fbe302b6dc71a22fc457b416da9d774363e1dcb503d03f8cd55d8c00')\"><i class=\"fa fa-envelope-o\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/in\/ralf-ehren-2b6734120\/\" target=\"_blank\"><i class=\"fa fa-linkedin\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div>\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber risks pose a significant threat to companies and organisations. Waves of ransomware attacks bring business processes or entire companies to a standstill. Data leaks lead to reputational damage and fines. Important know-how is drained by attacks by professionally organised hacker organisations.\u00a0\u00a0 Digitisation increases the areas exposed to such attacks. Increasingly heterogeneous system landscapes with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11119,"parent":0,"menu_order":20,"comment_status":"closed","ping_status":"closed","template":"templates\/kompetenzen-child.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-12403","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security - ACENT AG<\/title>\n<meta name=\"description\" content=\"ACENT AG - Cyber risks pose a significant threat to companies and organisations. Waves of ransomware attacks bring business processes or entire companies to a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acent.de\/en\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - ACENT AG\" \/>\n<meta property=\"og:description\" content=\"ACENT AG - Cyber risks pose a significant threat to companies and organisations. Waves of ransomware attacks bring business processes or entire companies to a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acent.de\/en\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ACENT AG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T11:10:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acent.de\/wp-content\/uploads\/2019\/12\/Slider-Kompetenzen-Cyber-Securtity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1375\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/cyber-security\\\/\",\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/cyber-security\\\/\",\"name\":\"Cyber Security - ACENT AG\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Slider-Kompetenzen-Cyber-Securtity.jpg\",\"datePublished\":\"2019-12-18T17:09:53+00:00\",\"dateModified\":\"2025-12-15T11:10:41+00:00\",\"description\":\"ACENT AG - Cyber risks pose a significant threat to companies and organisations. Waves of ransomware attacks bring business processes or entire companies to a\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acent.de\\\/en\\\/cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Slider-Kompetenzen-Cyber-Securtity.jpg\",\"contentUrl\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/Slider-Kompetenzen-Cyber-Securtity.jpg\",\"width\":1375,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/acent.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/\",\"name\":\"ACENT AG\",\"description\":\"Wir beraten CIOs\",\"publisher\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acent.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#organization\",\"name\":\"ACENT AG\",\"url\":\"https:\\\/\\\/acent.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/1507_Acent-Logo-neu_OK.jpg\",\"contentUrl\":\"https:\\\/\\\/acent.de\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/1507_Acent-Logo-neu_OK.jpg\",\"width\":354,\"height\":63,\"caption\":\"ACENT AG\"},\"image\":{\"@id\":\"https:\\\/\\\/acent.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - ACENT AG","description":"ACENT AG - Cyber risks pose a significant threat to companies and organisations. Waves of ransomware attacks bring business processes or entire companies to a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acent.de\/en\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - ACENT AG","og_description":"ACENT AG - Cyber risks pose a significant threat to companies and organisations. Waves of ransomware attacks bring business processes or entire companies to a","og_url":"https:\/\/acent.de\/en\/cyber-security\/","og_site_name":"ACENT AG","article_modified_time":"2025-12-15T11:10:41+00:00","og_image":[{"width":1375,"height":720,"url":"https:\/\/acent.de\/wp-content\/uploads\/2019\/12\/Slider-Kompetenzen-Cyber-Securtity.jpg","type":"image\/jpeg"}],"twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acent.de\/en\/cyber-security\/","url":"https:\/\/acent.de\/en\/cyber-security\/","name":"Cyber Security - ACENT AG","isPartOf":{"@id":"https:\/\/acent.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acent.de\/en\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/acent.de\/en\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/acent.de\/wp-content\/uploads\/2019\/12\/Slider-Kompetenzen-Cyber-Securtity.jpg","datePublished":"2019-12-18T17:09:53+00:00","dateModified":"2025-12-15T11:10:41+00:00","description":"ACENT AG - Cyber risks pose a significant threat to companies and organisations. Waves of ransomware attacks bring business processes or entire companies to a","breadcrumb":{"@id":"https:\/\/acent.de\/en\/cyber-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acent.de\/en\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/acent.de\/en\/cyber-security\/#primaryimage","url":"https:\/\/acent.de\/wp-content\/uploads\/2019\/12\/Slider-Kompetenzen-Cyber-Securtity.jpg","contentUrl":"https:\/\/acent.de\/wp-content\/uploads\/2019\/12\/Slider-Kompetenzen-Cyber-Securtity.jpg","width":1375,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/acent.de\/en\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/acent.de\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/acent.de\/en\/#website","url":"https:\/\/acent.de\/en\/","name":"ACENT AG","description":"Wir beraten CIOs","publisher":{"@id":"https:\/\/acent.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acent.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/acent.de\/en\/#organization","name":"ACENT AG","url":"https:\/\/acent.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/acent.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/acent.de\/wp-content\/uploads\/2017\/05\/1507_Acent-Logo-neu_OK.jpg","contentUrl":"https:\/\/acent.de\/wp-content\/uploads\/2017\/05\/1507_Acent-Logo-neu_OK.jpg","width":354,"height":63,"caption":"ACENT AG"},"image":{"@id":"https:\/\/acent.de\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/pages\/12403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/comments?post=12403"}],"version-history":[{"count":2,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/pages\/12403\/revisions"}],"predecessor-version":[{"id":24332,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/pages\/12403\/revisions\/24332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/media\/11119"}],"wp:attachment":[{"href":"https:\/\/acent.de\/en\/wp-json\/wp\/v2\/media?parent=12403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}