{"id":348651,"date":"2025-11-02T09:56:12","date_gmt":"2025-11-02T08:56:12","guid":{"rendered":"https:\/\/sauldie.org\/de\/cybersecurity-risiken-erkennen-bewerten-minimieren\/"},"modified":"2026-03-14T13:20:23","modified_gmt":"2026-03-14T12:20:23","slug":"recognise-assess-and-minimise-cybersecurity-risks","status":"publish","type":"post","link":"https:\/\/risawave.org\/en\/cybersecurity-risiken-erkennen-bewerten-minimieren\/","title":{"rendered":"Cybersecurity Risks: How Decision-Makers Stop Cybercrime"},"content":{"rendered":"<p style=\"font-family:verdana;text-align:left;\">Cybersecurity risks are a central issue for companies of all sizes and industries today. Decision-makers face the challenge of protecting their organisations from digital threats. Clients often report feeling unsure when it comes to identifying and defending against cyber attacks. However, awareness of cybersecurity risks is the first step towards developing effective protective measures. The right guidance can provide impetus and support companies on their journey.<\/p>\n<h2 style=\"font-family:verdana;text-align:left;\">Why cybersecurity risks must not be underestimated<\/h2>\n<p style=\"font-family:verdana;text-align:left;\">Cybersecurity risks arise from targeted attacks on IT systems and data. These attacks can lead to data loss, operational disruptions, or even the loss of trade secrets. Many companies underestimate the danger because they believe only large corporations are affected. However, small and medium-sized enterprises are also frequent targets of cybercriminals.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">A real-world example: A medium-sized engineering company received an email that looked like a harmless invoice. An employee opened the attachment, and the malware was already in the network. Within a few hours, important production data was encrypted. The result: production downtime and high costs.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">Another example: a craft business fell victim to data theft through a phishing attack. The attackers used the stolen credentials to infiltrate further systems. The damage was not only financial but also noticeable in terms of the company's image.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">A third example: An e-commerce start-up was crippled by a DDoS attack. The website was unavailable for days, and sales plummeted. Customers lost confidence in the company.<\/p>\n<h2 style=\"font-family:verdana;text-align:left;\">Recognising and assessing cybersecurity risks<\/h2>\n<h3 style=\"font-family:verdana;text-align:left;\">Cybersecurity risks can arise from various sources. These include malicious actors attempting to gain unauthorised access to systems, often for financial gain or to disrupt operations. Human error is another significant factor; mistakes like clicking on phishing links or using weak passwords can create vulnerabilities. Software flaws and unpatched systems can also be exploited by attackers. Furthermore, the increasing reliance on interconnected devices and cloud services expands the potential attack surface. Finally, insider threats, where individuals within an organisation misuse their access, represent a serious risk.<\/h3>\n<p style=\"font-family:verdana;text-align:left;\">Cybersecurity risks arise from technical vulnerabilities, but also from human error. Many attacks begin with an email that appears harmless. A click on a link or an attachment can be enough to compromise the entire system.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">For example: a healthcare company received an email that looked like an official message. An employee opened the attachment, and the network was infected. The consequence: patient data was stolen, and the company had to pay fines.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">Another example: a company in the financial sector fell victim to data theft through a social engineering attack. The attackers posed as employees, thereby gaining access to sensitive information.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">A third example: A company in the logistics sector was paralysed by a ransomware attack. The attackers encrypted the data and demanded a ransom. The company had to cease operations until the data was restored.<\/p>\n<h3 style=\"font-family:verdana;text-align:left;\">How can cybersecurity risks be assessed?<\/h3>\n<p style=\"font-family:verdana;text-align:left;\">Cybersecurity risk assessment is carried out through a systematic analysis of existing threats and vulnerabilities. This includes technical audits, penetration tests, and the review of security measures.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">For example: A company in the energy sector regularly carried out security audits. Weaknesses in the network were discovered and rectified. The consequence: the company was better protected against attacks.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">Another example: A telecommunications company carried out penetration tests. Weaknesses in the system were discovered and fixed. The consequence: The company was better protected against attacks.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">A third example: A company in the education sector conducted regular employee training sessions. Staff were made aware of the dangers and knew how to respond to suspicious emails. The result: the number of attacks decreased significantly.<\/p>\n<h2 style=\"font-family:verdana;text-align:left;\">Minimising and warding off cybersecurity risks<\/h2>\n<h3 style=\"font-family:verdana;text-align:left;\">Practical measures to minimise cybersecurity risks<\/h3>\n<p style=\"font-family:verdana;text-align:left;\">Minimising cybersecurity risks requires a combination of technical and organisational measures. These include the installation of firewalls, the use of antivirus software, and regular staff training.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">A practical example: A company operating in the retail sector installed a firewall and an antivirus program. Staff received regular training. The result: the number of attacks decreased significantly.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">Another example: A company in the tourism sector conducted regular security audits. Weaknesses were rectified, and security measures were continuously improved. The result: The company was better protected against attacks.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">A third example: A company in the construction sector conducted regular penetration tests. Vulnerabilities were fixed, and security measures were continuously improved. The result: the company was better protected against attacks.<\/p>\n<h3 style=\"font-family:verdana;text-align:left;\">Support through transruption coaching<\/h3>\n<p style=\"font-family:verdana;text-align:left;\">transruptions-Coaching supports companies in identifying and defending against cybersecurity risks. Support is provided individually and tailored to the specific needs of the company. Clients often report that the support leaves them better prepared for attacks and able to react more quickly.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">An example: A company in the healthcare sector was supported by transruption coaching. Employees were trained, and security measures were improved. The result: The company was better protected against attacks.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">Another example: A company in the finance sector was supported by transruption coaching. Security measures were improved, and employees were trained. The result: the company was better protected against attacks.<\/p>\n<p style=\"font-family:verdana;text-align:left;\">A third example: A logistics company was supported by transruption coaching. Safety measures were improved, and staff were trained. The result: the company was better protected against attacks.<\/p>\n<p style=\"font-family:verdana;text-align:left;\"><i><b>BEST PRACTICE at the customer (name hidden due to NDA contract)<\/b> A medium-sized company in the mechanical engineering sector was paralysed by a ransomware attack. The attackers encrypted the data and demanded a ransom. The company was not prepared for such an attack and had to cease operations. With the support of transruptions-Coaching, the company was helped to improve its security measures and train its employees. The result: The company was better protected against attacks and could react more quickly.<\/i><\/p>\n<h2 style=\"font-family:verdana;text-align:left;\">My analysis<\/h2>\n<p style=\"font-family:verdana;text-align:left;\">Cybersecurity risks are a real threat to businesses of all sizes and industries. Identifying and defending against attacks requires a combination of technical and organisational measures. Guidance from transruption coaching can provide impetus and support companies on their journey. Clients often report that the guidance better prepares them for attacks and allows them to react more quickly. The right guidance is the key to minimising and fending off cybersecurity risks.<\/p>\n<h2 style=\"font-family:verdana;text-align:left;\">Further links from the text above:<\/h2>\n<p style=\"font-family:verdana;text-align:left;\"><a href=\"https:\/\/wirtschaftslexikon.gabler.de\/definition\/cyber-risiken-54413\" target=\"_blank\">Definition of Cyber Risks \u2013 Gabler Business Lexicon<\/a><\/p>\n<p style=\"font-family:verdana;text-align:left;\"><a href=\"https:\/\/www.commerzbank.de\/unternehmerkunden\/it-sicherheit-fuer-unternehmen\/cybersecurity-massnahmen\/\" target=\"_blank\">Cyber Security Prevention Measures \u2013 Commerzbank<\/a><\/p>\n<p style=\"font-family:verdana;text-align:left;\"><a href=\"https:\/\/www.fuer-gruender.de\/wissen\/unternehmen-gruenden\/versicherung\/cyber-versicherung\/risiken\/\" target=\"_blank\">What are the cyber risks and who is affected? \u2013 For founders<\/a><\/p>\n<p style=\"font-family:verdana;text-align:left;\"><a href=\"https:\/\/www.stmi.bayern.de\/news\/detail\/cybersecurityday-2025\/\" target=\"_blank\">Cybersecurity Day: Cybercrime one of the biggest dangers \u2013 Bavarian State Ministry<\/a><\/p>\n<p style=\"font-family:verdana;text-align:left;\"><a href=\"https:\/\/www.nexusgroup.com\/de\/cyber-risk-management\/\" target=\"_blank\">What is Cyber Risk Management? \u2013 Nexus Group<\/a><\/p>\n<p style=\"font-family:verdana;text-align:left;\">For more information and if you have any questions, please contact <a href=\"https:\/\/risawave.org\/en\/kontakt-zu-transruption\/\" target=\"_blank\">Contact us<\/a> or read more blog posts on the topic <a href=\"https:\/\/risawave.org\/en\/themes\/disruption-blog\/\" target=\"_blank\">TRANSRUPTION<\/a> here.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity-Risiken sind heute ein zentrales Thema f\u00fcr Unternehmen jeder Gr\u00f6\u00dfe und Branche. Entscheider stehen vor der Herausforderung, ihre Organisationen vor digitalen Bedrohungen zu sch\u00fctzen. H\u00e4ufig berichten Klient:innen, dass sie sich unsicher f\u00fchlen, wenn es um die Identifikation und Abwehr von Cyberangriffen geht. Dabei ist das Bewusstsein f\u00fcr Cybersecurity-Risiken der erste Schritt, um wirksame Schutzma\u00dfnahmen zu &#8230; <a title=\"Cybersecurity Risks: How Decision-Makers Stop Cybercrime\" class=\"read-more\" href=\"https:\/\/risawave.org\/en\/cybersecurity-risiken-erkennen-bewerten-minimieren\/\" aria-label=\"Read more about Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen\">Read more<\/a><\/p>","protected":false},"author":2,"featured_media":348650,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ef_editorial_meta_date_first-draft-date":"","_ef_editorial_meta_paragraph_assignment":"","_ef_editorial_meta_checkbox_needs-photo":"","_ef_editorial_meta_number_word-count":"","footnotes":""},"categories":[65,52,26,28,4202],"tags":[155,61,62,167,1681],"class_list":["post-348651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberkriminalitaet-cybersecurity","category-digital-leadership","category-automatisierung","category-digitale-transformation","category-transruption-blog","tag-awareness","tag-cybersecurity-2","tag-itsecurity","tag-risikomanagement","tag-unternehmenssicherheit","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-25"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen<\/title>\n<meta name=\"description\" content=\"Sch\u00fctzen Sie Ihr Unternehmen vor Cybersecurity-Risiken! Erfahren Sie, wie Sie Risiken erkennen und abwehren. Jetzt informieren und sicher handeln!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/risawave.org\/en\/recognise-assess-and-minimise-cybersecurity-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen - - risawave.org\" \/>\n<meta property=\"og:url\" content=\"https:\/\/risawave.org\/en\/recognise-assess-and-minimise-cybersecurity-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"risawave.org\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-02T08:56:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-14T12:20:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/risawave.org\/wp-content\/uploads\/2025\/11\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sanjay Sauldie (M.Sc.)\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sanjay Sauldie (M.Sc.)\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/\"},\"author\":{\"name\":\"Sanjay Sauldie (M.Sc.)\",\"@id\":\"https:\\\/\\\/risawave.org\\\/#\\\/schema\\\/person\\\/a88d2a92d710b97d3eaaca6aa2a70fc4\"},\"headline\":\"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen\",\"datePublished\":\"2025-11-02T08:56:12+00:00\",\"dateModified\":\"2026-03-14T12:20:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/\"},\"wordCount\":1047,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg\",\"keywords\":[\"#Awareness\",\"#Cybersecurity\",\"#ITSecurity\",\"#Risikomanagement\",\"#Unternehmenssicherheit\"],\"articleSection\":[\"Cyberkriminalit\u00e4t und Cybersecurity\",\"Digital Leadership\",\"Automatisierung\",\"Digitale Transformation\",\"TRANSRUPTION Digitaler Werkzeugkasten\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#respond\"]}],\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/en\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/\",\"url\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/\",\"name\":\"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg\",\"datePublished\":\"2025-11-02T08:56:12+00:00\",\"dateModified\":\"2026-03-14T12:20:23+00:00\",\"description\":\"Sch\u00fctzen Sie Ihr Unternehmen vor Cybersecurity-Risiken! Erfahren Sie, wie Sie Risiken erkennen und abwehren. Jetzt informieren und sicher handeln!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#primaryimage\",\"url\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg\",\"contentUrl\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg\",\"width\":1080,\"height\":1350,\"caption\":\"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\\\/\\\/risawave.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/risawave.org\\\/#website\",\"url\":\"https:\\\/\\\/risawave.org\\\/\",\"name\":\"risawave.org\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/risawave.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/risawave.org\\\/#organization\",\"name\":\"risawave.org\",\"url\":\"https:\\\/\\\/risawave.org\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#local-main-organization-logo\"},\"telephone\":[\"015140530884\"],\"openingHoursSpecification\":[],\"email\":\"office@newrella.hk\",\"faxNumber\":\"newrella Limited\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/risawave.org\\\/#\\\/schema\\\/person\\\/a88d2a92d710b97d3eaaca6aa2a70fc4\",\"name\":\"Sanjay Sauldie (M.Sc.)\",\"sameAs\":[\"https:\\\/\\\/risawave.org\"],\"url\":\"https:\\\/\\\/risawave.org\\\/en\\\/author\\\/sanjay-sauldie\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/risawave.org\\\/cybersecurity-risiken-erkennen-bewerten-minimieren\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Globales-logo-scaled-1.png\",\"contentUrl\":\"https:\\\/\\\/risawave.org\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Globales-logo-scaled-1.png\",\"width\":2560,\"height\":2560,\"caption\":\"risawave.org\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"\u8202\u574e\u89d2\" \/>\n<meta name=\"geo.region\" content=\"Hong Kong\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Risks: How Decision-Makers Stop Cybercrime","description":"Protect your company from cybersecurity risks! Learn how to identify and defend against threats. Get informed and act securely now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/risawave.org\/en\/recognise-assess-and-minimise-cybersecurity-risks\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen","og_description":"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen - - risawave.org","og_url":"https:\/\/risawave.org\/en\/recognise-assess-and-minimise-cybersecurity-risks\/","og_site_name":"risawave.org","article_published_time":"2025-11-02T08:56:12+00:00","article_modified_time":"2026-03-14T12:20:23+00:00","og_image":[{"width":1080,"height":1350,"url":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/11\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg","type":"image\/jpeg"}],"author":"Sanjay Sauldie (M.Sc.)","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sanjay Sauldie (M.Sc.)","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#article","isPartOf":{"@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/"},"author":{"name":"Sanjay Sauldie (M.Sc.)","@id":"https:\/\/risawave.org\/#\/schema\/person\/a88d2a92d710b97d3eaaca6aa2a70fc4"},"headline":"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen","datePublished":"2025-11-02T08:56:12+00:00","dateModified":"2026-03-14T12:20:23+00:00","mainEntityOfPage":{"@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/"},"wordCount":1047,"commentCount":0,"publisher":{"@id":"https:\/\/risawave.org\/#organization"},"image":{"@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#primaryimage"},"thumbnailUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/11\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg","keywords":["#Awareness","#Cybersecurity","#ITSecurity","#Risikomanagement","#Unternehmenssicherheit"],"articleSection":["Cyberkriminalit\u00e4t und Cybersecurity","Digital Leadership","Automatisierung","Digitale Transformation","TRANSRUPTION Digitaler Werkzeugkasten"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#respond"]}],"copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/risawave.org\/en\/#organization"}},{"@type":"WebPage","@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/","url":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/","name":"Cybersecurity Risks: How Decision-Makers Stop Cybercrime","isPartOf":{"@id":"https:\/\/risawave.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#primaryimage"},"image":{"@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#primaryimage"},"thumbnailUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/11\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg","datePublished":"2025-11-02T08:56:12+00:00","dateModified":"2026-03-14T12:20:23+00:00","description":"Protect your company from cybersecurity risks! Learn how to identify and defend against threats. Get informed and act securely now!","breadcrumb":{"@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#primaryimage","url":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/11\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg","contentUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2025\/11\/cybersecurity-risiken-wie-entscheider-cyberkriminalitaet-stoppen.jpg","width":1080,"height":1350,"caption":"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen"},{"@type":"BreadcrumbList","@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/risawave.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity-Risiken: Wie Entscheider Cyberkriminalit\u00e4t stoppen"}]},{"@type":"WebSite","@id":"https:\/\/risawave.org\/#website","url":"https:\/\/risawave.org\/","name":"risawave.org","description":"","publisher":{"@id":"https:\/\/risawave.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/risawave.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Organization","Place"],"@id":"https:\/\/risawave.org\/#organization","name":"risawave.org","url":"https:\/\/risawave.org\/","logo":{"@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#local-main-organization-logo"},"image":{"@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#local-main-organization-logo"},"telephone":["015140530884"],"openingHoursSpecification":[],"email":"office@newrella.hk","faxNumber":"newrella Limited"},{"@type":"Person","@id":"https:\/\/risawave.org\/#\/schema\/person\/a88d2a92d710b97d3eaaca6aa2a70fc4","name":"Sanjay Sauldie (M.Sc.)","sameAs":["https:\/\/risawave.org"],"url":"https:\/\/risawave.org\/en\/author\/sanjay-sauldie\/"},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/risawave.org\/cybersecurity-risiken-erkennen-bewerten-minimieren\/#local-main-organization-logo","url":"https:\/\/risawave.org\/wp-content\/uploads\/2026\/01\/Globales-logo-scaled-1.png","contentUrl":"https:\/\/risawave.org\/wp-content\/uploads\/2026\/01\/Globales-logo-scaled-1.png","width":2560,"height":2560,"caption":"risawave.org"}]},"geo.placename":"\u8202\u574e\u89d2","geo.region":"Hong Kong"},"_links":{"self":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts\/348651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/comments?post=348651"}],"version-history":[{"count":1,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts\/348651\/revisions"}],"predecessor-version":[{"id":353311,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/posts\/348651\/revisions\/353311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/media\/348650"}],"wp:attachment":[{"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/media?parent=348651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/categories?post=348651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/risawave.org\/en\/wp-json\/wp\/v2\/tags?post=348651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}