{"id":35198,"date":"2025-04-17T10:58:31","date_gmt":"2025-04-17T10:58:31","guid":{"rendered":"https:\/\/www.blickfeld.com\/?page_id=35198"},"modified":"2025-06-24T11:28:05","modified_gmt":"2025-06-24T11:28:05","slug":"cybersicherheit","status":"publish","type":"page","link":"https:\/\/www.blickfeld.com\/de\/cybersicherheit\/","title":{"rendered":"Cybersicherheit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"35198\" class=\"elementor elementor-35198 elementor-35197\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-11c8424 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"11c8424\" data-element_type=\"section\" data-e-type=\"section\" id=\"bf-top\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-134a102\" data-id=\"134a102\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-396ba86 elementor-widget elementor-widget-heading\" data-id=\"396ba86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybersicherheit bei Blickfeld\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe8edcc elementor-view-stacked elementor-widget__width-auto elementor-fixed elementor-hidden-desktop elementor-hidden-tablet elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"fe8edcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"#bf-top\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-arrow-alt-circle-up\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0977c64 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0977c64\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-df30f62\" data-id=\"df30f62\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-97ccf04 elementor-widget elementor-widget-text-editor\" data-id=\"97ccf04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In der heutigen digital vernetzten Welt ist Cybersicherheit ein zentraler Bestandteil organisatorischer Resilienz und betrieblicher Integrit\u00e4t. Bei Blickfeld setzen wir uns f\u00fcr h\u00f6chste Standards der Datensicherheit f\u00fcr unsere Kunden und Partner ein. Wir ergreifen umfassende Ma\u00dfnahmen, um sichere Produkte und L\u00f6sungen bereitzustellen, unsere digitalen Werte zu sch\u00fctzen und die Gesch\u00e4ftskontinuit\u00e4t zu gew\u00e4hrleisten.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-754fdfb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"754fdfb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e6bc844\" data-id=\"e6bc844\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-889c7dd elementor-widget elementor-widget-text-editor\" data-id=\"889c7dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Organisation und Informationssicherheits-Managementsystem (ISMS)<\/b><\/p><p><span style=\"font-weight: 400;\">Blickfeld betreibt ein ISMS auf Basis der ISO\/IEC 27001:2022-Norm. Es definiert Richtlinien, Prozesse und Kontrollen zum Schutz von Informationswerten. Verantwortlichkeiten sind klar zugewiesen, w\u00e4hrend regelm\u00e4\u00dfige Risikoanalysen und die Einbindung der Unternehmensleitung f\u00fcr Transparenz und Verantwortlichkeit sorgen.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1da5497\" data-id=\"1da5497\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7dcc557 elementor-widget elementor-widget-text-editor\" data-id=\"7dcc557\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Sichere Software- und Systementwicklung<\/b><\/p><p><span style=\"font-weight: 400;\">Sicherheitsaspekte sind fest in den Software- und Systementwicklungszyklus (SDLC) von Blickfeld integriert. Klare Zust\u00e4ndigkeiten, sicheres Programmieren sowie regelm\u00e4\u00dfige Pr\u00fcfungen von Drittkomponenten gew\u00e4hrleisten ein hohes Sicherheitsniveau. Interne Richtlinien und Schulungen unterst\u00fctzen die sichere Entwicklung.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-666087c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"666087c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a434c23\" data-id=\"a434c23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9898211 elementor-widget elementor-widget-text-editor\" data-id=\"9898211\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>CVE-Tracking und Schwachstellenmanagement<\/b><\/p><p><span style=\"font-weight: 400;\">Ver\u00f6ffentlichte Schwachstellen (CVEs) werden kontinuierlich beobachtet und hinsichtlich ihrer Relevanz bewertet. Erforderliche Ma\u00dfnahmen wie Patches werden priorisiert umgesetzt und dokumentiert \u2013 besonders bei sicherheitskritischen Updates.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-250a0ad\" data-id=\"250a0ad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dbbbf06 elementor-widget elementor-widget-text-editor\" data-id=\"dbbbf06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Vorfallmanagement<\/b><\/p><p><span style=\"font-weight: 400;\">Ein strukturierter Plan steuert die Erkennung, Eind\u00e4mmung und Behebung von Sicherheitsvorf\u00e4llen. Ein spezialisiertes Team bearbeitet jeden Fall gezielt. Erkenntnisse flie\u00dfen in die kontinuierliche Verbesserung unserer Prozesse ein, wobei eine zeitnahe Kommunikation gew\u00e4hrleistet wird.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8630c63 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8630c63\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8427d94\" data-id=\"8427d94\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25f6d04 elementor-widget elementor-widget-text-editor\" data-id=\"25f6d04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Penetrationtest und unabh\u00e4ngige Sicherheitspr\u00fcfung<\/b><\/p><p>Zur weiteren St\u00e4rkung unserer Cybersicherheitsma\u00dfnahmen wurde im Jahr 2025 ein externer Penetrationstest durchgef\u00fchrt. Diese autorisierten, simulierten Angriffe auf unsere Systeme und Anwendungen erm\u00f6glichen eine realit\u00e4tsnahe Bewertung der Sicherheitsarchitektur aus der Perspektive eines potenziellen Angreifers. Die Ergebnisse best\u00e4tigten ein hohes Sicherheitsniveau. Der Test unterstreicht unsere kontinuierlichen Bem\u00fchungen, Cybersicherheit auf h\u00f6chstem Niveau sicherzustellen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-488455d\" data-id=\"488455d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a86b62 elementor-widget elementor-widget-text-editor\" data-id=\"7a86b62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3155113 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3155113\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ac4082c\" data-id=\"ac4082c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-295ebbd elementor-widget elementor-widget-heading\" data-id=\"295ebbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Ressourcen\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8500b1f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8500b1f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-000e508\" data-id=\"000e508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3681856 elementor-widget elementor-widget-jet-table\" data-id=\"3681856\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-jet-table jet-elements\">\n\t\t<div class=\"jet-table-wrapper\">\n\t\t\t<table class=\"jet-table jet-table--fa5-compat\">\n\t\t\t\t<thead class=\"jet-table__head\"><tr class=\"jet-table__head-row\"><th class=\"jet-table__cell elementor-repeater-item-9e5cb26 jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Document Title<\/div><\/div><\/div><\/th><th class=\"jet-table__cell elementor-repeater-item-849cdf9 jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Description<\/div><\/div><\/div><\/th><th class=\"jet-table__cell elementor-repeater-item-4299ccb jet-table__head-cell\" scope=\"col\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Access<\/div><\/div><\/div><\/th><\/tr><\/thead>\n\t\t\t\t\t\t\t\t<tbody class=\"jet-table__body\"><tr class=\"jet-table__body-row elementor-repeater-item-4a08eb1\"><td class=\"jet-table__cell elementor-repeater-item-82cc351 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Cybersecurity Overview<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-ff22bb8 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Richtlinien, Ma\u00dfnahmen und verf\u00fcgbare Unterlagen f\u00fcr einen umfassenden \u00dcberblick \u00fcber unsere Cybersicherheit.<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-d5095ba jet-table__body-cell\"><a class=\"jet-table__cell-inner jet-table__cell-link\" href=\"https:\/\/www.blickfeld.com\/wp-content\/uploads\/2025\/04\/Cybersecurity-Overview_1.0-1.pdf\" target=\"_blank\"><div class=\"jet-table__cell-content\"><span class=\"jet-elements-icon jet-table__cell-icon jet-table__cell-icon--before\"><i aria-hidden=\"true\" class=\"fas fa-arrow-down\"><\/i><\/span><div class=\"jet-table__cell-text\">PDF herunterladen<\/div><\/div><\/a><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-ee81135\"><td class=\"jet-table__cell elementor-repeater-item-3a4dea1 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Information Security Management System at Blickfeld<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-7cce3f4 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Darstellung organisatorischer Rollen, Prozesse, Ma\u00dfnahmen und dokumentierter Verfahren.<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-fc0e896 jet-table__body-cell\"><a class=\"jet-table__cell-inner jet-table__cell-link\" href=\"https:\/\/www.blickfeld.com\/wp-content\/uploads\/2025\/04\/ISMS-Organizational_1.0.pdf\" target=\"_blank\"><div class=\"jet-table__cell-content\"><span class=\"jet-elements-icon jet-table__cell-icon jet-table__cell-icon--before\"><i aria-hidden=\"true\" class=\"fas fa-arrow-down\"><\/i><\/span><div class=\"jet-table__cell-text\">PDF herunterladen<\/div><\/div><\/a><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-ea9e5b6\"><td class=\"jet-table__cell elementor-repeater-item-f8ebae7 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Cyber Security Guideline for Software &#038; System Development<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-23a3b22 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Best Practices und Sicherheitsrichtlinien im Entwicklungsprozess (SDLC).<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-cea3e88 jet-table__body-cell\"><a class=\"jet-table__cell-inner jet-table__cell-link\" href=\"https:\/\/www.blickfeld.com\/wp-content\/uploads\/2025\/04\/Cyber-Security-Guideline-for-Software-Development_2.0.pdf%20\" target=\"_blank\"><div class=\"jet-table__cell-content\"><span class=\"jet-elements-icon jet-table__cell-icon jet-table__cell-icon--before\"><i aria-hidden=\"true\" class=\"fas fa-arrow-down\"><\/i><\/span><div class=\"jet-table__cell-text\">PDF herunterladen<\/div><\/div><\/a><\/td><\/tr><tr class=\"jet-table__body-row elementor-repeater-item-088bbca\"><td class=\"jet-table__cell elementor-repeater-item-2536064 jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Incident Response Policies and Procedures<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-d563c7d jet-table__body-cell\"><div class=\"jet-table__cell-inner\"><div class=\"jet-table__cell-content\"><div class=\"jet-table__cell-text\">Detaillierte Abl\u00e4ufe zur Erkennung, Bewertung und Behebung von Sicherheitsvorf\u00e4llen.<\/div><\/div><\/div><\/td><td class=\"jet-table__cell elementor-repeater-item-d148137 jet-table__body-cell\"><a class=\"jet-table__cell-inner jet-table__cell-link\" href=\"https:\/\/www.blickfeld.com\/wp-content\/uploads\/2025\/04\/Incident-Response-Policies-and-Procedures_1.1.pdf\" target=\"_blank\"><div class=\"jet-table__cell-content\"><span class=\"jet-elements-icon jet-table__cell-icon jet-table__cell-icon--before\"><i aria-hidden=\"true\" class=\"fas fa-arrow-down\"><\/i><\/span><div class=\"jet-table__cell-text\">PDF herunterladen<\/div><\/div><\/a><\/td><\/tr><\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f8b71f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f8b71f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f79bd78\" data-id=\"f79bd78\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b78b5bf elementor-widget elementor-widget-spacer\" data-id=\"b78b5bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersicherheit bei Blickfeld In der heutigen digital vernetzten Welt ist Cybersicherheit ein zentraler Bestandteil organisatorischer Resilienz und betrieblicher Integrit\u00e4t. Bei Blickfeld setzen wir uns f\u00fcr h\u00f6chste Standards der Datensicherheit f\u00fcr unsere Kunden und Partner ein. Wir ergreifen umfassende Ma\u00dfnahmen, um sichere Produkte und L\u00f6sungen bereitzustellen, unsere digitalen Werte zu sch\u00fctzen und die Gesch\u00e4ftskontinuit\u00e4t zu gew\u00e4hrleisten. [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":35206,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-35198","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.blickfeld.com\/de\/wp-json\/wp\/v2\/pages\/35198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blickfeld.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.blickfeld.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.blickfeld.com\/de\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blickfeld.com\/de\/wp-json\/wp\/v2\/comments?post=35198"}],"version-history":[{"count":3,"href":"https:\/\/www.blickfeld.com\/de\/wp-json\/wp\/v2\/pages\/35198\/revisions"}],"predecessor-version":[{"id":37306,"href":"https:\/\/www.blickfeld.com\/de\/wp-json\/wp\/v2\/pages\/35198\/revisions\/37306"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blickfeld.com\/de\/wp-json\/wp\/v2\/media\/35206"}],"wp:attachment":[{"href":"https:\/\/www.blickfeld.com\/de\/wp-json\/wp\/v2\/media?parent=35198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}