{"id":2792,"date":"2025-11-03T19:39:05","date_gmt":"2025-11-03T18:39:05","guid":{"rendered":"http:\/\/www.kmu-aalen.de\/kmu\/?page_id=2792"},"modified":"2025-11-04T22:19:42","modified_gmt":"2025-11-04T21:19:42","slug":"cybersicherheitscheck_uebersicht","status":"publish","type":"page","link":"http:\/\/www.kmu-aalen.de\/kmu\/cybersicherheitscheck_uebersicht\/","title":{"rendered":"CyberSicherheitsCheck &#8211; \u00dcbersicht"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2792\" class=\"elementor elementor-2792\">\n\t\t\t\t\t\t<header class=\"elementor-section elementor-top-section elementor-element elementor-element-6b41a1d elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"6b41a1d\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c9be44\" data-id=\"4c9be44\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6888cc2 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6888cc2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CyberSicherheitsCheck<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/header>\n\t\t<div class=\"elementor-element elementor-element-f1abfaf e-flex e-con-boxed e-con e-parent\" data-id=\"f1abfaf\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03de3d9 elementor-widget elementor-widget-text-editor\" data-id=\"03de3d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Der <strong data-start=\"96\" data-end=\"129\">CyberSicherheitsCheck f\u00fcr KMU<\/strong> ist ein <strong data-start=\"138\" data-end=\"216\">standardisiertes, einst\u00fcndiges Beratungstool zur Cybersicherheitsbewertung<\/strong> kleiner und mittlerer Unternehmen in Baden-W\u00fcrttemberg. Entwickelt wurde das Konzept von der <strong data-start=\"310\" data-end=\"330\">Hochschule Aalen<\/strong> im Rahmen des Forschungsprojekts <strong data-start=\"364\" data-end=\"376\">CyberWuP<\/strong>, gef\u00f6rdert durch das <strong data-start=\"398\" data-end=\"436\">Innenministerium Baden-W\u00fcrttemberg<\/strong> und in Kooperation mit der <strong data-start=\"464\" data-end=\"494\">Cybersicherheitsagentur BW<\/strong>, dem <strong data-start=\"500\" data-end=\"521\">Landeskriminalamt<\/strong> und der <strong data-start=\"530\" data-end=\"552\">IHK Ostw\u00fcrttemberg<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0579c2 e-flex e-con-boxed e-con e-parent\" data-id=\"e0579c2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94821ce e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"94821ce\" data-element_type=\"widget\" data-settings=\"{&quot;tabs_justify_horizontal&quot;:&quot;start&quot;,&quot;horizontal_scroll&quot;:&quot;enable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"155722190\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1557221901\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1557221901\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tZiel &amp; Methode\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1557221902\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1557221902\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tDurchf\u00fchrung und Ansprechpartner\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1557221903\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1557221903\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tEntstehung &amp; Pilotierung\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1557221901\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1557221901\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-227276a e-con-full e-flex e-con e-child\" data-id=\"227276a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-abcae45 e-flex e-con-boxed e-con e-child\" data-id=\"abcae45\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a94099a elementor-widget elementor-widget-text-editor\" data-id=\"a94099a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"579\" data-end=\"676\"><p data-start=\"581\" data-end=\"676\"><strong data-start=\"581\" data-end=\"590\">Ziel:<\/strong> Einstieg in das Thema Cybersicherheit und Sensibilisierung der Unternehmensleitung.<\/p><\/li><li data-start=\"677\" data-end=\"936\"><p data-start=\"679\" data-end=\"694\"><strong data-start=\"679\" data-end=\"692\">Vorgehen:<\/strong><\/p><ul data-start=\"697\" data-end=\"936\"><li data-start=\"697\" data-end=\"783\"><p data-start=\"699\" data-end=\"783\">Durchf\u00fchrung durch <strong data-start=\"718\" data-end=\"745\">geschulte Berater:innen<\/strong> in ca. <strong data-start=\"753\" data-end=\"780\">60-min\u00fctigen Gespr\u00e4chen<\/strong>.<\/p><\/li><li data-start=\"786\" data-end=\"850\"><p data-start=\"788\" data-end=\"850\">Nutzung einer <strong data-start=\"802\" data-end=\"816\">Checkliste<\/strong> zur Erfassung des Ist-Zustands.<\/p><\/li><li data-start=\"853\" data-end=\"936\"><p data-start=\"855\" data-end=\"936\">Ableitung <strong data-start=\"865\" data-end=\"900\">konkreter Handlungsempfehlungen<\/strong> zur Verbesserung der IT-Sicherheit.<\/p><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1557221902\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1557221902\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-7bd2f39 e-con-full e-flex e-con e-child\" data-id=\"7bd2f39\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b14aff6 e-flex e-con-boxed e-con e-child\" data-id=\"b14aff6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca6cd5a elementor-widget elementor-widget-text-editor\" data-id=\"ca6cd5a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"976\" data-end=\"1159\"><p data-start=\"978\" data-end=\"1005\"><strong data-start=\"978\" data-end=\"1003\">Tr\u00e4gerorganisationen:<\/strong><\/p><ul data-start=\"1008\" data-end=\"1159\"><li data-start=\"1008\" data-end=\"1066\"><p data-start=\"1010\" data-end=\"1066\"><strong data-start=\"1010\" data-end=\"1019\">BWIHK<\/strong> und regionale <strong data-start=\"1034\" data-end=\"1042\">IHKs<\/strong> in Baden-W\u00fcrttemberg.<\/p><\/li><li data-start=\"1069\" data-end=\"1159\"><p data-start=\"1071\" data-end=\"1159\">Seit 2024 zus\u00e4tzlich <strong data-start=\"1092\" data-end=\"1112\">Handwerkskammern<\/strong> und <strong data-start=\"1117\" data-end=\"1137\">Bauwirtschaft BW<\/strong> (\u00fcber HANDWERK BW).<\/p><\/li><\/ul><\/li><li data-start=\"1160\" data-end=\"1223\"><p data-start=\"1162\" data-end=\"1223\"><strong data-start=\"1162\" data-end=\"1177\">Zielgruppe:<\/strong> Mitgliedsunternehmen dieser Organisationen.<\/p><\/li><li data-start=\"1224\" data-end=\"1329\"><p data-start=\"1226\" data-end=\"1329\"><strong data-start=\"1226\" data-end=\"1248\">Beratungskontakte:<\/strong> Regionale Ansprechpartner:innen der IHKs, Handwerkskammern und Bauwirtschaft BW.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1557221903\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1557221903\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-e926476 e-con-full e-flex e-con e-child\" data-id=\"e926476\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-91c429d e-flex e-con-boxed e-con e-child\" data-id=\"91c429d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dab1350 elementor-widget elementor-widget-text-editor\" data-id=\"dab1350\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"1861\" data-end=\"1927\"><p data-start=\"1863\" data-end=\"1927\">Ursprung im <strong data-start=\"1875\" data-end=\"1905\">Forschungsprojekt CyberWuP<\/strong> (Hochschule Aalen).<\/p><\/li><li data-start=\"1928\" data-end=\"2014\"><p data-start=\"1930\" data-end=\"2014\">Basierend auf <strong data-start=\"1944\" data-end=\"1963\">Bedarfserhebung<\/strong> und <strong data-start=\"1968\" data-end=\"2001\">wissenschaftlicher Auswertung<\/strong> unter KMU.<\/p><\/li><li data-start=\"2015\" data-end=\"2120\"><p data-start=\"2017\" data-end=\"2120\"><strong data-start=\"2017\" data-end=\"2031\">Pilotphase<\/strong> mit \u00fcber <strong data-start=\"2041\" data-end=\"2059\">50 Unternehmen<\/strong> in Kooperation mit mehreren IHKs erfolgreich durchgef\u00fchrt.<\/p><\/li><li data-start=\"2121\" data-end=\"2210\"><p data-start=\"2123\" data-end=\"2210\">Fachliche Unterst\u00fctzung durch <strong data-start=\"2153\" data-end=\"2174\">Landeskriminalamt<\/strong> und <strong data-start=\"2179\" data-end=\"2209\">Cybersicherheitsagentur BW<\/strong>.<\/p><\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f28fcb7 e-flex e-con-boxed e-con e-parent\" data-id=\"f28fcb7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e969d72 elementor-widget elementor-widget-heading\" data-id=\"e969d72\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abgrenzung zum BSI-CyberRisikoCheck (DIN SPEC 27076)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f024b5d e-grid e-con-boxed e-con e-parent\" data-id=\"f024b5d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-403ff54 e-con-full e-flex e-con e-child\" data-id=\"403ff54\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8fc20d elementor-widget elementor-widget-text-editor\" data-id=\"a8fc20d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1393\" data-end=\"1424\"><strong data-start=\"1393\" data-end=\"1422\">CyberSicherheitsCheck BW:<\/strong><\/p><ul data-start=\"1427\" data-end=\"1537\"><li data-start=\"1427\" data-end=\"1489\"><p data-start=\"1429\" data-end=\"1489\">Einstiegsberatung, 1 Stunde, kostenfrei, niedrigschwellig.<\/p><\/li><li data-start=\"1492\" data-end=\"1537\"><p data-start=\"1494\" data-end=\"1537\">Fokus: Sensibilisierung und Orientierung.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6650444 e-con-full e-flex e-con e-child\" data-id=\"6650444\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2f147d elementor-widget elementor-widget-text-editor\" data-id=\"f2f147d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1540\" data-end=\"1569\"><strong data-start=\"1540\" data-end=\"1567\">CyberRisikoCheck (BSI):<\/strong><\/p><ul data-start=\"1572\" data-end=\"1728\"><li data-start=\"1572\" data-end=\"1667\"><p data-start=\"1574\" data-end=\"1667\">Vertiefende Beratung, ca. 3 Stunden, kostenpflichtig, durch zertifizierte IT-Dienstleister.<\/p><\/li><li data-start=\"1670\" data-end=\"1728\"><p data-start=\"1672\" data-end=\"1728\">Fokus: detaillierte Risikoanalyse nach DIN SPEC 27076.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-621aa9c e-flex e-con-boxed e-con e-parent\" data-id=\"621aa9c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a834725 elementor-widget elementor-widget-heading\" data-id=\"a834725\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Der CyberSicherheitsCheck in 8 Kategorien mit praktischen Checklisten und weiteren Informationen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29764fc e-flex e-con-boxed e-con e-parent\" data-id=\"29764fc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9918223 elementor-list-item-link-inline elementor-icon-list--layout-traditional elementor-widget elementor-widget-icon-list\" data-id=\"9918223\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/sicherheitsluecken-schliessen\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">1. Sicherheitsl\u00fccken schlie\u00dfen<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/2-benutzerzugaenge-absichern\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">2. Benutzerzug\u00e4nge absichern<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/3-datensicherung-durchfuehren\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">3. Datensicherung durchf\u00fchren<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/4-gefahrenbewusstsein-schaffen\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">4. Gefahrenbewusstsein schaffen<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/5-netzuebergaenge-absichern\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">5. Netz\u00fcberg\u00e4nge absichern<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/6-schadprogramme-abwehren\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">6. Schadprogramme abwehren<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/7-notfallplan-erstellen\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">7. Notfallplan erstellen<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.kmu-aalen.de\/kmu\/8-inventarisieren-und-dokumentieren\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">8. Inventarisieren und Dokumentieren<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68b1b05 e-grid e-con-boxed e-con e-parent\" data-id=\"68b1b05\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e85bfbf elementor-widget elementor-widget-button\" data-id=\"e85bfbf\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.wirtschaft-digital-bw.de\/aktuelles\/pressemitteilungen\/detailseite\/cybersicherheits-check-fuer-kleine-und-mittlere-unternehmen\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-external-link-alt\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Erfahren Sie mehr \u00fcber den Cybersicherheits-Check f\u00fcr kleine und mittlere Unternehmen HIER<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CyberSicherheitsCheck Der CyberSicherheitsCheck f\u00fcr KMU ist ein standardisiertes, einst\u00fcndiges Beratungstool zur Cybersicherheitsbewertung kleiner und mittlerer Unternehmen in Baden-W\u00fcrttemberg. Entwickelt wurde das Konzept von der Hochschule Aalen im Rahmen des Forschungsprojekts CyberWuP, gef\u00f6rdert durch das Innenministerium Baden-W\u00fcrttemberg und in Kooperation mit der Cybersicherheitsagentur BW, dem Landeskriminalamt und der IHK Ostw\u00fcrttemberg. Ziel &amp; Methode Durchf\u00fchrung und Ansprechpartner [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"full-screen","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-2792","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"http:\/\/www.kmu-aalen.de\/kmu\/wp-json\/wp\/v2\/pages\/2792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.kmu-aalen.de\/kmu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.kmu-aalen.de\/kmu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.kmu-aalen.de\/kmu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.kmu-aalen.de\/kmu\/wp-json\/wp\/v2\/comments?post=2792"}],"version-history":[{"count":27,"href":"http:\/\/www.kmu-aalen.de\/kmu\/wp-json\/wp\/v2\/pages\/2792\/revisions"}],"predecessor-version":[{"id":2987,"href":"http:\/\/www.kmu-aalen.de\/kmu\/wp-json\/wp\/v2\/pages\/2792\/revisions\/2987"}],"wp:attachment":[{"href":"http:\/\/www.kmu-aalen.de\/kmu\/wp-json\/wp\/v2\/media?parent=2792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}