{"id":2792,"date":"2025-11-03T19:39:05","date_gmt":"2025-11-03T18:39:05","guid":{"rendered":"http:\/\/www.kmu-aalen.de\/kmu\/?page_id=2792"},"modified":"2025-11-04T22:19:42","modified_gmt":"2025-11-04T21:19:42","slug":"cybersicherheitscheck_uebersicht","status":"publish","type":"page","link":"http:\/\/www.kmu-aalen.de\/kmu\/en\/cybersicherheitscheck_uebersicht\/","title":{"rendered":"CyberSicherheitsCheck &#8211; \u00dcbersicht"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2792\" class=\"elementor elementor-2792\">\n\t\t\t\t\t\t<header class=\"elementor-section elementor-top-section elementor-element elementor-element-6b41a1d elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"6b41a1d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c9be44\" data-id=\"4c9be44\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6888cc2 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6888cc2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CyberSecurityCheck<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/header>\n\t\t<div class=\"elementor-element elementor-element-f1abfaf e-flex e-con-boxed e-con e-parent\" data-id=\"f1abfaf\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03de3d9 elementor-widget elementor-widget-text-editor\" data-id=\"03de3d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The <strong data-start=\"96\" data-end=\"129\">CyberSecurityCheck for Small And Medium Sized Enterprises<\/strong> is a <strong data-start=\"138\" data-end=\"216\">standardised, one-hour cybersecurity assessment tool for<\/strong> small and medium-sized enterprises in Baden-W\u00fcrttemberg. The concept was developed by the <strong data-start=\"310\" data-end=\"330\">Aalen University<\/strong> as part of the research project <strong data-start=\"364\" data-end=\"376\">CyberWuP<\/strong>, funded by the <strong data-start=\"398\" data-end=\"436\">Ministry of the Interior of Baden-W\u00fcrttemberg<\/strong> and in cooperation with the <strong data-start=\"464\" data-end=\"494\">Cybersecurity Agency BW<\/strong>the <strong data-start=\"500\" data-end=\"521\">State Criminal Police Office<\/strong> and <strong data-start=\"530\" data-end=\"552\">Chamber of Industry and Commerce, East W\u00fcrttemberg<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0579c2 e-flex e-con-boxed e-con e-parent\" data-id=\"e0579c2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94821ce e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"94821ce\" data-element_type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;start&quot;,&quot;horizontal_scroll&quot;:&quot;enable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"155722190\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1557221901\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1557221901\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tObjective &amp; Method\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1557221902\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1557221902\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tImplementation and Contact Persons\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1557221903\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1557221903\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDevelopment &amp; Piloting\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1557221901\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1557221901\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-227276a e-con-full e-flex e-con e-child\" data-id=\"227276a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-abcae45 e-flex e-con-boxed e-con e-child\" data-id=\"abcae45\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a94099a elementor-widget elementor-widget-text-editor\" data-id=\"a94099a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"579\" data-end=\"676\"><p data-start=\"581\" data-end=\"676\"><strong data-start=\"581\" data-end=\"590\">Objective:<\/strong> Introduction to the topic of cyber security and raising awareness among company management.<\/p><\/li><li data-start=\"677\" data-end=\"936\"><p data-start=\"679\" data-end=\"694\"><strong data-start=\"679\" data-end=\"692\">Procedure:<\/strong><\/p><ul data-start=\"697\" data-end=\"936\"><li data-start=\"697\" data-end=\"783\"><p data-start=\"699\" data-end=\"783\">Implementation by <strong data-start=\"718\" data-end=\"745\">trained advisors<\/strong> in <strong data-start=\"753\" data-end=\"780\">60-minute conversations<\/strong>.<\/p><\/li><li data-start=\"786\" data-end=\"850\"><p data-start=\"788\" data-end=\"850\">Use of a <strong data-start=\"802\" data-end=\"816\">checklist<\/strong> to record the current status.<\/p><\/li><li data-start=\"853\" data-end=\"936\"><p data-start=\"855\" data-end=\"936\">Derivation <strong data-start=\"865\" data-end=\"900\">specific recommendations for action<\/strong> to improve IT security.<\/p><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1557221902\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1557221902\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-7bd2f39 e-con-full e-flex e-con e-child\" data-id=\"7bd2f39\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b14aff6 e-flex e-con-boxed e-con e-child\" data-id=\"b14aff6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca6cd5a elementor-widget elementor-widget-text-editor\" data-id=\"ca6cd5a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"976\" data-end=\"1159\"><p data-start=\"978\" data-end=\"1005\"><strong data-start=\"978\" data-end=\"1003\">Supporting Organisations:<\/strong><\/p><ul data-start=\"1008\" data-end=\"1159\"><li data-start=\"1008\" data-end=\"1066\"><p data-start=\"1010\" data-end=\"1066\"><strong data-start=\"1010\" data-end=\"1019\">BWIHK<\/strong> and local <strong data-start=\"1034\" data-end=\"1042\">Chambers of Industry and Commerce<\/strong> in Baden-Wurttemberg.<\/p><\/li><li data-start=\"1069\" data-end=\"1159\"><p data-start=\"1071\" data-end=\"1159\">Since 2024, additionally <strong data-start=\"1092\" data-end=\"1112\">chambers of crafts<\/strong> and <strong data-start=\"1117\" data-end=\"1137\">Construction industry BW<\/strong> (via HANDWERK BW).<\/p><\/li><\/ul><\/li><li data-start=\"1160\" data-end=\"1223\"><p data-start=\"1162\" data-end=\"1223\"><strong data-start=\"1162\" data-end=\"1177\">Target group:<\/strong> Member companies of these organisations.<\/p><\/li><li data-start=\"1224\" data-end=\"1329\"><p data-start=\"1226\" data-end=\"1329\"><strong data-start=\"1226\" data-end=\"1248\">Consulting contacts:<\/strong> Regional contacts at the Chambers of Industry and Commerce, Chambers of Crafts and the Construction Industry BW.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1557221903\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1557221903\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-e926476 e-con-full e-flex e-con e-child\" data-id=\"e926476\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-91c429d e-flex e-con-boxed e-con e-child\" data-id=\"91c429d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dab1350 elementor-widget elementor-widget-text-editor\" data-id=\"dab1350\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"1861\" data-end=\"1927\"><p data-start=\"1863\" data-end=\"1927\">Origin in <strong data-start=\"1875\" data-end=\"1905\">CyberWuP research project<\/strong> (Hochschule Aalen).<\/p><\/li><li data-start=\"1928\" data-end=\"2014\"><p data-start=\"1930\" data-end=\"2014\">Based on <strong data-start=\"1944\" data-end=\"1963\">needs assessment<\/strong> and <strong data-start=\"1968\" data-end=\"2001\">scientific evaluation<\/strong> among SMEs.<\/p><\/li><li data-start=\"2015\" data-end=\"2120\"><p data-start=\"2017\" data-end=\"2120\"><strong data-start=\"2017\" data-end=\"2031\">Pilot phase<\/strong> with more than <strong data-start=\"2041\" data-end=\"2059\">50 companies<\/strong> successfully carried out in cooperation with several Chambers of Industry and Commerce.<\/p><\/li><li data-start=\"2121\" data-end=\"2210\"><p data-start=\"2123\" data-end=\"2210\">Technical support provided by <strong data-start=\"2153\" data-end=\"2174\">State Criminal Police Office<\/strong> and <strong data-start=\"2179\" data-end=\"2209\">Cybersecurity Agency BW<\/strong>.<\/p><\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f28fcb7 e-flex e-con-boxed e-con e-parent\" data-id=\"f28fcb7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e969d72 elementor-widget elementor-widget-heading\" data-id=\"e969d72\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Distinction from the BSI Cyber Risk Check (DIN SPEC 27076)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f024b5d e-grid e-con-boxed e-con e-parent\" data-id=\"f024b5d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-403ff54 e-con-full e-flex e-con e-child\" data-id=\"403ff54\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8fc20d elementor-widget elementor-widget-text-editor\" data-id=\"a8fc20d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1393\" data-end=\"1424\"><strong data-start=\"1393\" data-end=\"1422\">Cyber Security Check BW:<\/strong><\/p><ul data-start=\"1427\" data-end=\"1537\"><li data-start=\"1427\" data-end=\"1489\"><p data-start=\"1429\" data-end=\"1489\">Initial consultation, 1 hour, free of charge, low threshold.<\/p><\/li><li data-start=\"1492\" data-end=\"1537\"><p data-start=\"1494\" data-end=\"1537\">Focus: Awareness raising and orientation.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6650444 e-con-full e-flex e-con e-child\" data-id=\"6650444\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2f147d elementor-widget elementor-widget-text-editor\" data-id=\"f2f147d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1540\" data-end=\"1569\"><strong data-start=\"1540\" data-end=\"1567\">Cyber Risk Check (BSI):<\/strong><\/p><ul data-start=\"1572\" data-end=\"1728\"><li data-start=\"1572\" data-end=\"1667\"><p data-start=\"1574\" data-end=\"1667\">In-depth consultation, approx. 3 hours, subject to a fee, by certified IT service providers.<\/p><\/li><li data-start=\"1670\" data-end=\"1728\"><p data-start=\"1672\" data-end=\"1728\">Focus: detailed risk analysis in accordance with DIN SPEC 27076.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-621aa9c e-flex e-con-boxed e-con e-parent\" data-id=\"621aa9c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a834725 elementor-widget elementor-widget-heading\" data-id=\"a834725\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Cyber Security Check in 8 categories with practical checklists and further information<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29764fc e-flex e-con-boxed e-con e-parent\" data-id=\"29764fc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9918223 elementor-list-item-link-inline elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"9918223\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/en\/sicherheitsluecken-schliessen\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">1. Close security gaps<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/en\/2-benutzerzugaenge-absichern\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">2. Secure user accounts<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/en\/3-datensicherung-durchfuehren\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">3. Perform data backup<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/en\/4-gefahrenbewusstsein-schaffen\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">4. Raising awareness of hazards<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/en\/5-netzuebergaenge-absichern\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">5. Secure network gateways<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/en\/6-schadprogramme-abwehren\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">6. Defend against malware<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/en\/7-notfallplan-erstellen\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">7. Create an emergency plan<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/en\/8-inventarisieren-und-dokumentieren\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">8. Inventory and documentation<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68b1b05 e-grid e-con-boxed e-con e-parent\" data-id=\"68b1b05\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e85bfbf elementor-widget elementor-widget-button\" data-id=\"e85bfbf\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.wirtschaft-digital-bw.de\/aktuelles\/pressemitteilungen\/detailseite\/cybersicherheits-check-fuer-kleine-und-mittlere-unternehmen\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Find out more about the cybersecurity check for small and medium-sized enterprises HERE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>CyberSicherheitsCheck Der CyberSicherheitsCheck f\u00fcr KMU ist ein standardisiertes, einst\u00fcndiges Beratungstool zur Cybersicherheitsbewertung kleiner und mittlerer Unternehmen in Baden-W\u00fcrttemberg. Entwickelt wurde das Konzept von der Hochschule Aalen im Rahmen des Forschungsprojekts CyberWuP, gef\u00f6rdert durch das Innenministerium Baden-W\u00fcrttemberg und in Kooperation mit der Cybersicherheitsagentur BW, dem Landeskriminalamt und der IHK Ostw\u00fcrttemberg. Ziel &amp; Methode Durchf\u00fchrung und Ansprechpartner [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"full-screen","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-2792","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"http:\/\/www.kmu-aalen.de\/kmu\/en\/wp-json\/wp\/v2\/pages\/2792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.kmu-aalen.de\/kmu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.kmu-aalen.de\/kmu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.kmu-aalen.de\/kmu\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.kmu-aalen.de\/kmu\/en\/wp-json\/wp\/v2\/comments?post=2792"}],"version-history":[{"count":27,"href":"http:\/\/www.kmu-aalen.de\/kmu\/en\/wp-json\/wp\/v2\/pages\/2792\/revisions"}],"predecessor-version":[{"id":2987,"href":"http:\/\/www.kmu-aalen.de\/kmu\/en\/wp-json\/wp\/v2\/pages\/2792\/revisions\/2987"}],"wp:attachment":[{"href":"http:\/\/www.kmu-aalen.de\/kmu\/en\/wp-json\/wp\/v2\/media?parent=2792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}