{"id":12076,"date":"2025-09-01T16:42:01","date_gmt":"2025-09-01T14:42:01","guid":{"rendered":"https:\/\/staging.netxconsult.de\/blog\/it-sicherheit-verbessern-wie\/"},"modified":"2025-09-02T11:40:54","modified_gmt":"2025-09-02T09:40:54","slug":"it-sicherheit-verbessern-wie","status":"publish","type":"post","link":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/","title":{"rendered":"Improving IT security effectively &#8211; how?"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-margin-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>This is a very important area &#8211; but it is precisely here that people tend to cut corners. What needs to be done to be well prepared for an emergency and what should I do in an emergency?<\/p>\n<p>To avoid throwing money away unnecessarily, this article addresses the question: How can IT security be improved effectively?<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-three fusion-animated\" style=\"--awb-text-color:#f86011;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\" data-animationType=\"bounceInLeft\" data-animationDuration=\"1.1\" data-animationOffset=\"top-into-view\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Montserrat Alternates&quot;;margin:0;--fontSize:32;line-height:1.26;\">Expert IT personnel<\/h3><\/div><div class=\"fusion-text fusion-text-2\"><p>Who do you call when there&#8217;s a fire? That&#8217;s right, the fire department. And when a high-rise building is on fire, a single firefighter is not enough. And certainly not someone who has to think about what to do first. Or who then says that you have to call the fire department.<\/p>\n<p>Hackers are always coming up with new ideas. To stay one step ahead of them, or at least catch up with them quickly, your company must not lack expert staff.<\/p>\n<p>However, you can&#8217;t just leave it at the status quo. Expert IT staff will only remain expert if you guarantee further training. Regular &#8220;training&#8221; is important and those who start early will be prepared sooner. <span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">A properly trained &#8211; or further trained &#8211; employee is worth his weight in gold. And fireproof. While companies rarely have their own firefighters in-house, most have their own IT department. But sometimes it can make sense to outsource them. <\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three fusion-animated\" style=\"--awb-text-color:#f86011;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-sep-color:rgba(248,96,17,0.08);\" data-animationType=\"bounceInLeft\" data-animationDuration=\"1.1\" data-animationOffset=\"top-into-view\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Montserrat Alternates&quot;;margin:0;--fontSize:32;line-height:1.26;\">Train behavior in an IT emergency<\/h3><\/div><div class=\"fusion-text fusion-text-3\"><p>112? 110? 911? What do I have to say? What information is important?<\/p>\n<p>The number varies depending on the event and location. But &#8220;Who? How many? What? When? Where?&#8221; &#8211; these are always the questions in an emergency.<\/p>\n<p>And in principle, they are also those for an IT security incident:<\/p>\n<p><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/svg\/1f469-1f3fb-200d-1f4bc.svg\" alt=\"????????\u200d????\" \/> Who reports?<\/p>\n<p><img decoding=\"async\" class=\"emoji\" style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/svg\/1f5a5.svg\" alt=\"????\" \/><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\"> Which IT system is affected?<\/span><\/p>\n<p><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/svg\/1f468-1f3fb-200d-1f4bb.svg\" alt=\"????????\u200d????\" \/> How did you work with the IT system? What did you observe?<\/p>\n<p><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/svg\/23f0.svg\" alt=\"\u23f0\" \/> When did the event occur?<\/p>\n<p><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/svg\/1f3e0.svg\" alt=\"????\" \/> Where is the affected IT system located? (building, room, workplace)<\/p>\n<p>In an emergency, however, it can happen that you forget what you are doing because you are so nervous and excited. What can help?<\/p>\n<p>3 things: <u>Practice, practice and more practice<\/u>.<\/p>\n<p>Some take first aid courses every year. Some for the first and only time because of their driving license. And still others are voluntary first aiders in their company or private environment and therefore have regular training. In your opinion, who is better prepared for an emergency?<\/p>\n<p>You can also prepare your employees for an IT emergency and make them safer through regular training. Monthly training videos are a good way to do this &#8211; low cost, high impact. IT security awareness training, on the other hand, should take place at least once a year. This way, there are always reminders and a refresher course.<\/p>\n<p>Normally, you learn the questions to ask in an emergency at elementary school. In the same way, you should also &#8220;train&#8221; your employees as early as possible in the correct behavior in an emergency.<\/p>\n<p>Anyone who would like a template of the <b>&#8220;IT emergency card&#8221;<\/b> or would like more information on<b> training courses<\/b> is welcome to contact us.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:20px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"801\" height=\"601\" title=\"Panik vor Hacker\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Panik-vor-Hacker.jpg\" alt class=\"img-responsive wp-image-7404\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Panik-vor-Hacker-200x150.jpg 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Panik-vor-Hacker-400x300.jpg 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Panik-vor-Hacker-600x450.jpg 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Panik-vor-Hacker.jpg 801w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-padding-top:9px;--awb-padding-left:41px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:36px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:19.008%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:19.008%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-arrow-right fas circle-yes fusion-animated\" style=\"--awb-circlecolor-hover:#ffe7da;--awb-circlebordercolor-hover:#ffe7da;--awb-circlebordersize:0px;--awb-font-size:87.12px;--awb-width:174.24px;--awb-height:174.24px;--awb-line-height:174.24px;--awb-margin-top:0;--awb-margin-right:49.5px;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:flex-start;\" data-animationType=\"flash\" data-animationDuration=\"1.1\" data-animationOffset=\"top-into-view\"><\/i><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:20px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"801\" height=\"601\" title=\"gewappnet und gesch\u00fctzt\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/gewappnet-und-geschuetzt.jpg\" alt class=\"img-responsive wp-image-7406\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/gewappnet-und-geschuetzt-200x150.jpg 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/gewappnet-und-geschuetzt-400x300.jpg 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/gewappnet-und-geschuetzt-600x450.jpg 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/gewappnet-und-geschuetzt.jpg 801w\" sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three fusion-animated\" style=\"--awb-text-color:#f86011;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\" data-animationType=\"bounceInLeft\" data-animationDuration=\"1.1\" data-animationOffset=\"top-into-view\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Montserrat Alternates&quot;;margin:0;--fontSize:32;line-height:1.26;\">An IT security officer<\/h3><\/div><div class=\"fusion-text fusion-text-4\"><p>Does your company have a fire safety officer?<\/p>\n<p>Is it important at all? Because: has there ever been a fire? No? Then that&#8217;s money wasted. It could be used much more effectively. For example, in a better coffee machine or a small pay rise. Or at least a bonus!<\/p>\n<p>Sounds stupid? It&#8217;s stupid too. After all, it&#8217;s called a fire prevention officer and not a fire incident officer. Their tasks are primarily about protection and prevention. So that there is no fire or a small fire does not develop into a major fire. In the event of danger, prevention is better than cure.<\/p>\n<p>The same applies to the &#8220;IT security officer&#8221;. If nothing happens, is he worth his money? Well, if nothing happens, that answers the question, doesn&#8217;t it?<\/p>\n<p>Proper and functioning monitoring allows you to keep an overview of the company network. Then you can react to potential sources of danger &#8211; sources of fire &#8211; at an early stage and in good time.<\/p>\n<p>For example, if devices are integrated into the network somewhere without the knowledge of the IT department, you can find them with a network scanner and react accordingly. A <span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">In addition, vulnerabilities are detected more quickly and preventive action can be taken against them. Regardless of whether these are in the system, in the work processes or arise through the use of the user. <\/span><\/p>\n<p>The &#8220;IT security officer&#8221; and his team recognize the danger and create measures against it. Of course, every employee is then responsible for implementing these measures.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three fusion-animated\" style=\"--awb-text-color:#f86011;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\" data-animationType=\"bounceInLeft\" data-animationDuration=\"1.1\" data-animationOffset=\"top-into-view\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"font-family:&quot;Montserrat Alternates&quot;;margin:0;--fontSize:32;line-height:1.26;\">Analysis and prevention in IT security<\/h3><\/div><div class=\"fusion-text fusion-text-5\"><p>Have you ever wanted to break the glass and press the alarm button? <span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">Of course, nobody did it if there was no reason. But it would have been stupid if it had been needed but nothing had happened. <\/span><\/p>\n<p>It&#8217;s better to have something and not need it than to need something but not have it.<\/p>\n<p>And it is better to discover an IT security leak yourself than to have it pointed out to you by hackers demanding money.<\/p>\n<p>How can the latter be prevented?<\/p>\n<p>This would mean the following for the company:<\/p>\n<\/div><ul style=\"--awb-line-height:34px;--awb-icon-width:34px;--awb-icon-height:34px;--awb-icon-margin:14px;--awb-content-margin:48px;--awb-circlecolor:#f86011;--awb-circle-yes-font-size:17.6px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-bell fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><strong>Fire alarm<\/strong><b>: <\/b><span class=\"TextRun SCXW264058323 BCX8\" lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW264058323 BCX8\">Run scans and see where there are technical weaknesses in the system.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW264058323 BCX8\"> <br class=\"SCXW264058323 BCX8\" \/><\/span><span class=\"TextRun SCXW264058323 BCX8\" lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW264058323 BCX8\">Or send out a phishing e-mail and see if and how many employees &#8220;fall for it&#8221;.<\/span><\/span><\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-book-open fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\"><b>Inspections of the fire protection measures: <\/b><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">Set up regular, documented patch management. Data analyses from the network can also be used to detect attempted attacks. <\/span><\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-fire-extinguisher fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><span class=\"TextRun SCXW87182155 BCX8\" lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW87182155 BCX8\"><b>Pay attention to the &#8220;MHD&#8221; of the fire protection measures:<\/b><\/span><\/span><b> <\/b><span style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">Do not use outdated hardware or software (no maintenance possible, no safety possible).<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-tools fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><span class=\"TextRun SCXW199787307 BCX8\" lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW199787307 BCX8\"><b>Build fireproof:<\/b><\/span><\/span><b> <\/b><span class=\"TextRun SCXW110510712 BCX8\" lang=\"DE-DE\" style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW110510712 BCX8\">Setting up and keeping the firewall up to date<\/span><\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-road fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><span class=\"TextRun SCXW17248160 BCX8\" lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW17248160 BCX8\"><b>Define escape routes:<\/b> <\/span><\/span><span class=\"TextRun SCXW17248160 BCX8\" lang=\"DE-DE\" style=\"background-color: rgba(255, 255, 255, 0); color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW17248160 BCX8\">functioning backup and <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW17248160 BCX8\">recovery concept<\/span><span class=\"NormalTextRun SCXW17248160 BCX8\"> have<\/span><\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-tint fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><span class=\"TextRun SCXW21080890 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW21080890 BCX8\"><b>Smoke detectors and <\/b><\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW21080890 BCX8\"><b>sprinkler systems:<\/b> <\/span> <\/span><span class=\"TextRun SCXW21080890 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW21080890 BCX8\">organize and conduct regular IT awareness training, <\/span><span class=\"NormalTextRun SCXW21080890 BCX8\">intrusion<\/span><span class=\"NormalTextRun SCXW21080890 BCX8\">&#8211;<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW21080890 BCX8\">detection<\/span><span class=\"NormalTextRun SCXW21080890 BCX8\">&#8211;<\/span><span class=\"NormalTextRun SCXW21080890 BCX8\">, intrusion<\/span><span class=\"NormalTextRun SCXW21080890 BCX8\">&#8211;<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW21080890 BCX8\">protection<\/span><span class=\"NormalTextRun SCXW21080890 BCX8\">&#8211;<\/span><span class=\"NormalTextRun SCXW21080890 BCX8\"> and SIEM systems<\/span><span class=\"NormalTextRun SCXW21080890 BCX8\"> use, <\/span><span class=\"NormalTextRun SCXW21080890 BCX8\">Introduce a role-based authorization concept<\/span><\/span><\/p>\n<\/div><\/li><\/ul><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"801\" height=\"601\" title=\"Awareness Training hilft\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Awareness-Training-hilft.jpg\" alt class=\"img-responsive wp-image-7408\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Awareness-Training-hilft-200x150.jpg 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Awareness-Training-hilft-400x300.jpg 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Awareness-Training-hilft-600x450.jpg 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/Awareness-Training-hilft.jpg 801w\" sizes=\"(max-width: 640px) 100vw, 801px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:0px;--awb-padding-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-right:326px;--awb-padding-left:247px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-reading-box-container reading-box-container-1\" style=\"--awb-title-color:#000000;--awb-margin-top:20px;--awb-margin-bottom:20px;\"><div class=\"reading-box\" style=\"background-color:#f4f4f6;border-width:1px;border-color:rgba(226,226,226,0);border-left-width:3px;border-left-color:var(--primary_color);border-style:solid;\"><h2>Support for one of these areas?<\/h2><div class=\"reading-box-description fusion-reading-box-additional\">It's not easy to think of everything. And being able to implement everything is even more difficult.   <\/div><div class=\"reading-box-additional\">\n<p>Do you want tips? More information? Get in touch with us. You can only benefit from our free initial consultation. Make an appointment directly!<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:290px;--awb-padding-left:246px;--awb-margin-top:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><p>[contact-form-7 id=&#8221;3200&#8243; \/]<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":7402,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[333],"tags":[],"class_list":["post-12076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-en_it_security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Improving IT security effectively - how? - netX consult<\/title>\n<meta name=\"description\" content=\"How can IT security be improved effectively? What needs to be done in an emergency and how can you prepare for an emergency?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Improving IT security effectively - how? - netX consult\" \/>\n<meta property=\"og:description\" content=\"How can IT security be improved effectively? What needs to be done in an emergency and how can you prepare for an emergency?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/\" \/>\n<meta property=\"og:site_name\" content=\"netX consult\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-01T14:42:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-02T09:40:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/IT-Sicherheit-bessern.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vanessa Daugherty\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vanessa Daugherty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/\"},\"author\":{\"name\":\"Vanessa Daugherty\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/53ca4ac6a6b996e04dc20a85d7a19249\"},\"headline\":\"Improving IT security effectively &#8211; how?\",\"datePublished\":\"2025-09-01T14:42:01+00:00\",\"dateModified\":\"2025-09-02T09:40:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/\"},\"wordCount\":4670,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/IT-Sicherheit-bessern.jpg\",\"articleSection\":[\"EN_IT_Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/\",\"name\":\"Improving IT security effectively - how? - netX consult\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/IT-Sicherheit-bessern.jpg\",\"datePublished\":\"2025-09-01T14:42:01+00:00\",\"dateModified\":\"2025-09-02T09:40:54+00:00\",\"description\":\"How can IT security be improved effectively? What needs to be done in an emergency and how can you prepare for an emergency?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/IT-Sicherheit-bessern.jpg\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/IT-Sicherheit-bessern.jpg\",\"width\":1800,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/it-sicherheit-verbessern-wie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Improving IT security effectively &#8211; how?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"name\":\"netX consult\",\"description\":\"IT-Beratung\",\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\",\"name\":\"netX consult e.K.\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"width\":241,\"height\":240,\"caption\":\"netX consult e.K.\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netxconsult\\\/about\",\"https:\\\/\\\/www.youtube.com\\\/@netXconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/53ca4ac6a6b996e04dc20a85d7a19249\",\"name\":\"Vanessa Daugherty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g\",\"caption\":\"Vanessa Daugherty\"},\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/author\\\/vanessanetx\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Improving IT security effectively - how? - netX consult","description":"How can IT security be improved effectively? What needs to be done in an emergency and how can you prepare for an emergency?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/","og_locale":"en_US","og_type":"article","og_title":"Improving IT security effectively - how? - netX consult","og_description":"How can IT security be improved effectively? What needs to be done in an emergency and how can you prepare for an emergency?","og_url":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/","og_site_name":"netX consult","article_published_time":"2025-09-01T14:42:01+00:00","article_modified_time":"2025-09-02T09:40:54+00:00","og_image":[{"width":1800,"height":1200,"url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/IT-Sicherheit-bessern.jpg","type":"image\/jpeg"}],"author":"Vanessa Daugherty","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vanessa Daugherty","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/#article","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/"},"author":{"name":"Vanessa Daugherty","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/53ca4ac6a6b996e04dc20a85d7a19249"},"headline":"Improving IT security effectively &#8211; how?","datePublished":"2025-09-01T14:42:01+00:00","dateModified":"2025-09-02T09:40:54+00:00","mainEntityOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/"},"wordCount":4670,"commentCount":0,"publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/IT-Sicherheit-bessern.jpg","articleSection":["EN_IT_Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/","url":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/","name":"Improving IT security effectively - how? - netX consult","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/#primaryimage"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/IT-Sicherheit-bessern.jpg","datePublished":"2025-09-01T14:42:01+00:00","dateModified":"2025-09-02T09:40:54+00:00","description":"How can IT security be improved effectively? What needs to be done in an emergency and how can you prepare for an emergency?","breadcrumb":{"@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/#primaryimage","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/IT-Sicherheit-bessern.jpg","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/06\/IT-Sicherheit-bessern.jpg","width":1800,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/netxconsult.de\/en\/blog\/it-sicherheit-verbessern-wie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/netxconsult.de\/en\/"},{"@type":"ListItem","position":2,"name":"Improving IT security effectively &#8211; how?"}]},{"@type":"WebSite","@id":"https:\/\/netxconsult.de\/en\/#website","url":"https:\/\/netxconsult.de\/en\/","name":"netX consult","description":"IT-Beratung","publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netxconsult.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netxconsult.de\/en\/#organization","name":"netX consult e.K.","url":"https:\/\/netxconsult.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","width":241,"height":240,"caption":"netX consult e.K."},"image":{"@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/netxconsult\/about","https:\/\/www.youtube.com\/@netXconsult"]},{"@type":"Person","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/53ca4ac6a6b996e04dc20a85d7a19249","name":"Vanessa Daugherty","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f699faaf94af7e45e67f3f9b9027f92a594263506edac1f9fabd9085df05f849?s=96&d=mm&r=g","caption":"Vanessa Daugherty"},"url":"https:\/\/netxconsult.de\/en\/blog\/author\/vanessanetx\/"}]}},"_links":{"self":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/12076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/comments?post=12076"}],"version-history":[{"count":0,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/12076\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media\/7402"}],"wp:attachment":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media?parent=12076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/categories?post=12076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/tags?post=12076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}