{"id":84379,"date":"2024-08-15T11:14:05","date_gmt":"2024-08-15T09:14:05","guid":{"rendered":"https:\/\/www.dako.de\/it-security-in-transport-and-logistics-if-youre-not-careful-you-could-lose-out\/"},"modified":"2024-08-26T16:08:25","modified_gmt":"2024-08-26T14:08:25","slug":"it-security-in-transport-and-logistics-if-youre-not-careful-you-could-lose-out","status":"publish","type":"post","link":"https:\/\/www.dako.de\/en\/it-security-in-transport-and-logistics-if-youre-not-careful-you-could-lose-out\/","title":{"rendered":"IT security in transport and logistics: if you\u2019re not careful, you could lose out"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84379\" class=\"elementor elementor-84379 elementor-82919\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5bd1a30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5bd1a30\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b3b43a5\" data-id=\"b3b43a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f47e2d elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"1f47e2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\"><nav aria-label=\"breadcrumbs\" class=\"rank-math-breadcrumb\"><p><span class=\"last\">Home<\/span><\/p><\/nav><\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e730fa9 elementor-widget__width-initial elementor-widget elementor-widget-elementskit-heading\" data-id=\"e730fa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-text_left   ekit_heading_mobile-text_left\"><h1 class=\"ekit-heading--title elementskit-section-title \">IT security in transport and logistics: if you\u2019re not careful, you could lose out<\/h1><h1 class=\"ekit-heading--subtitle elementskit-section-subtitle  \">\n\t\t\t\t\t\tCybercrime is increasingly becoming the dark side of digitalisation, and poses a real threat to the industry\n\t\t\t\t\t<\/h1><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1010ab elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"d1010ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMany companies in the industry only address the issue of IT security when it is too late; usually after becoming the target of a cyberattack. To prevent this from happening to you, we have compiled a comprehensive guide on the topic here &#8211; because knowledge gives you a decisive edge. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-525ae7d elementor-widget__width-initial elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"525ae7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"960\" height=\"520\" src=\"https:\/\/www.dako.de\/media\/2024\/08\/2406_IAA-Ausstellerverzeichnis-Keyvisual_960x520.jpg\" class=\"attachment-full size-full wp-image-83260\" alt=\"\" srcset=\"https:\/\/www.dako.de\/media\/2024\/08\/2406_IAA-Ausstellerverzeichnis-Keyvisual_960x520.jpg 960w, https:\/\/www.dako.de\/media\/2024\/08\/2406_IAA-Ausstellerverzeichnis-Keyvisual_960x520-300x163.jpg 300w, https:\/\/www.dako.de\/media\/2024\/08\/2406_IAA-Ausstellerverzeichnis-Keyvisual_960x520-768x416.jpg 768w, https:\/\/www.dako.de\/media\/2024\/08\/2406_IAA-Ausstellerverzeichnis-Keyvisual_960x520-24x13.jpg 24w, https:\/\/www.dako.de\/media\/2024\/08\/2406_IAA-Ausstellerverzeichnis-Keyvisual_960x520-36x20.jpg 36w, https:\/\/www.dako.de\/media\/2024\/08\/2406_IAA-Ausstellerverzeichnis-Keyvisual_960x520-48x26.jpg 48w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd4182b elementor-widget__width-initial elementor-widget elementor-widget-post-info\" data-id=\"dd4182b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-fa83409 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar-day\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>15. August 2024<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-3706641 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-book-reader\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t8 Min.\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-b2a212c elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-archive\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/www.dako.de\/en\/category\/blog-en\/\" class=\"elementor-post-info__terms-list-item\">Blog<\/a>, <a href=\"https:\/\/www.dako.de\/en\/category\/blog-en\/branch\/\" class=\"elementor-post-info__terms-list-item\">Branch<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-0d9121f elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.dako.de\/en\/author\/stheu\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"elementor-avatar\" src=\"https:\/\/secure.gravatar.com\/avatar\/ee357c3c67c3c6fde4cd0c04b08fd3bc19236194ef2b6fa21500932d36e1785a?s=96&amp;d=mm&amp;r=g\" alt=\"Picture of Sebastian Theuerkauf\" loading=\"lazy\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t\t\t\tSebastian Theuerkauf\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0981d21 elementor-widget__width-initial elementor-widget elementor-widget-table-of-contents\" data-id=\"0981d21\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;container&quot;:&quot;#content-blog&quot;,&quot;exclude_headings_by_selector&quot;:[],&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;],&quot;marker_view&quot;:&quot;bullets&quot;,&quot;icon&quot;:{&quot;value&quot;:&quot;icon icon-right-arrow&quot;,&quot;library&quot;:&quot;ekiticons&quot;},&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_widescreen&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t<div class=\"elementor-toc__header-title\">\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<div id=\"elementor-toc__0981d21\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e175fe5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e175fe5\" data-element_type=\"section\" data-e-type=\"section\" id=\"content-blog\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fa5a551\" data-id=\"fa5a551\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da1de70 elementor-widget elementor-widget-spacer\" data-id=\"da1de70\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ba9776 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6ba9776\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Short summary<\/h3>\n<p><strong>\u276f The risk of becoming a victim of cybercrime is currently particularly high for the transport industry.<\/strong><\/p>\n<p><strong>\u276f At the same time, the majority of transport and logistics companies massively underestimate the risk.<\/strong><\/p>\n<p><strong>\u276f There are numerous reasons for this negligence, but the potential consequences can quickly threaten the survival of the company.<\/strong><\/p>\n<p><strong>\u276f Let DAKO show you how you can securely archive and manage your important data.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0213add elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0213add\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Current threats to the transport industry<\/h2>\n<p>In its latest status report, the German Federal Ministry for Information Security (BSI) concludes that \u201cthe<strong> threat in cyberspace [&#8230;] is higher than ever before.<\/strong>\u201d The reasons for this are the greater threat posed by politically motivated attacks in the context of the war in Ukraine and the increasing differentiation of a \u2018cybercriminal shadow economy\u2019, which is able to carry out complex <strong>campaigns against entire branches of industry or infrastructure<\/strong> through coordinated attacks and the use of artificial intelligence. The idea of the lone hacker in a hoodie may be a Hollywood film icon, but the reality is often more complex.  <\/p>\n<p>The reason for the <strong>threat status in the transport and logistics industry<\/strong> lies in its strong influence on the operation of all other economic sectors and the correspondingly high <strong>potential for extortio<\/strong>n. If the industry is disrupted, there is a risk of entire supply chains collapsing and a high level of damage to the economy as a whole. According to a survey by IT specialist insurer Hiscox, <strong>the transport industry is one of the five sectors of the economy most at risk<\/strong>. As early as 2021, 45% of the companies surveyed across Europe as part of this study reported having been victims of cyberattacks.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8770912 elementor-widget elementor-widget-image\" data-id=\"8770912\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"467\" src=\"https:\/\/www.dako.de\/media\/2024\/08\/sectors_most_effected-1024x598.png\" class=\"attachment-large size-large wp-image-84424\" alt=\"\" srcset=\"https:\/\/www.dako.de\/media\/2024\/08\/sectors_most_effected-1024x598.png 1024w, https:\/\/www.dako.de\/media\/2024\/08\/sectors_most_effected-300x175.png 300w, https:\/\/www.dako.de\/media\/2024\/08\/sectors_most_effected-768x448.png 768w, https:\/\/www.dako.de\/media\/2024\/08\/sectors_most_effected-1536x897.png 1536w, https:\/\/www.dako.de\/media\/2024\/08\/sectors_most_effected-24x14.png 24w, https:\/\/www.dako.de\/media\/2024\/08\/sectors_most_effected-36x21.png 36w, https:\/\/www.dako.de\/media\/2024\/08\/sectors_most_effected-48x28.png 48w, https:\/\/www.dako.de\/media\/2024\/08\/sectors_most_effected.png 1982w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7327249 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"7327249\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Source: https:\/\/www.gdv.de\/gdv\/medien\/medieninformationen\/it-sicherheit-in-handel-und-logistik-hohe-verwundbarkeit-geringes-problembewusstsein&#8211;131658<\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-807c17b elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"807c17b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Dangerous negligence prevails<\/h2>\n<p>While insurers and IT experts are sounding the alarm, <strong>awareness of the problem<\/strong> among potentially affected companies <strong>still appears to be very low<\/strong>. The reasons for this were analysed in a representative Forsa survey last year: 84% of the companies surveyed believed that their IT systems were comprehensively protected. Around 70% assumed that their company was too small to be targeted by hackers, while a further 59% of respondents believed that their data was simply not of interest to criminals.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e26ab56 elementor-widget elementor-widget-image\" data-id=\"e26ab56\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"467\" src=\"https:\/\/www.dako.de\/media\/2024\/08\/reasons_for_misjudgements-1024x598.png\" class=\"attachment-large size-large wp-image-84422\" alt=\"\" srcset=\"https:\/\/www.dako.de\/media\/2024\/08\/reasons_for_misjudgements-1024x598.png 1024w, https:\/\/www.dako.de\/media\/2024\/08\/reasons_for_misjudgements-300x175.png 300w, https:\/\/www.dako.de\/media\/2024\/08\/reasons_for_misjudgements-768x448.png 768w, https:\/\/www.dako.de\/media\/2024\/08\/reasons_for_misjudgements-1536x897.png 1536w, https:\/\/www.dako.de\/media\/2024\/08\/reasons_for_misjudgements-24x14.png 24w, https:\/\/www.dako.de\/media\/2024\/08\/reasons_for_misjudgements-36x21.png 36w, https:\/\/www.dako.de\/media\/2024\/08\/reasons_for_misjudgements-48x28.png 48w, https:\/\/www.dako.de\/media\/2024\/08\/reasons_for_misjudgements.png 1982w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87aa103 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"87aa103\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>https:\/\/www.gdv.de\/gdv\/medien\/medieninformationen\/it-sicherheit-in-handel-und-logistik-hohe-verwundbarkeit-geringes-problembewusstsein&#8211;131658<\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14fc261 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"14fc261\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is easy to prove that these self-assessments are far removed from reality. A security check carried out on behalf of the German Insurance Association (GDV) on a sample of medium-sized companies from the retail and logistics \/ transport sectors revealed <strong>considerable weaknesses in 95% of the companies analysed<\/strong>, \u201cwhich hackers could use to manipulate data or take over IT systems.\u201d <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbec6d9 elementor-widget elementor-widget-image\" data-id=\"fbec6d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"467\" src=\"https:\/\/www.dako.de\/media\/2024\/08\/IT_systems_with_vulnerabilities-1024x598.png\" class=\"attachment-large size-large wp-image-84420\" alt=\"\" srcset=\"https:\/\/www.dako.de\/media\/2024\/08\/IT_systems_with_vulnerabilities-1024x598.png 1024w, https:\/\/www.dako.de\/media\/2024\/08\/IT_systems_with_vulnerabilities-300x175.png 300w, https:\/\/www.dako.de\/media\/2024\/08\/IT_systems_with_vulnerabilities-768x448.png 768w, https:\/\/www.dako.de\/media\/2024\/08\/IT_systems_with_vulnerabilities-1536x897.png 1536w, https:\/\/www.dako.de\/media\/2024\/08\/IT_systems_with_vulnerabilities-24x14.png 24w, https:\/\/www.dako.de\/media\/2024\/08\/IT_systems_with_vulnerabilities-36x21.png 36w, https:\/\/www.dako.de\/media\/2024\/08\/IT_systems_with_vulnerabilities-48x28.png 48w, https:\/\/www.dako.de\/media\/2024\/08\/IT_systems_with_vulnerabilities.png 1982w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0efb39 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e0efb39\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>https:\/\/www.hiscox.de\/cyber-readiness-report-2021\/<\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e79f30 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"4e79f30\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In addition to the realisation that the existing IT landscape is inadequately secured in the majority of the companies surveyed, experts assume that <strong>small and medium-sized companies in particular are increasingly becoming targets of cyber criminals<\/strong>. The explanation for this is as simple as it is obvious: according to the BSI, attackers are taking the path of least resistance and attack where they can expect i<strong>nadequate expertise and security precautions<\/strong>. Small and medium-sized transport companies often have neither the time nor the financial resources to regularly train their entire staff, hire IT experts, or outsource these sensitive tasks to external service providers. Highly networked business processes along the supply chain mean that attacks on smaller subcontractors often open up the <strong>digital gateways (so-called attack vectors) to larger players in the industry<\/strong> as well. In many cases, they don\u2019t even need to attack these industry giants directly.    <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6a25e0 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f6a25e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Negligence when it comes to IT security can have devastating consequences<\/h2>\n<p>One of the reasons for misjudgements when it comes to IT security is that the massive consequences for a company\u2019s own business are not realistically assessed. So, what happens when security gaps are exploited? <\/p>\n<p>Transport companies can be <strong>affected by attacks on their IT in several ways<\/strong>. Like almost every other company, enterprises in this sector also manage data from customers and partners, as well as internal company data that is required for the processing and smooth functioning of day-to-day operations. Typically, this includes contact and delivery data, data on operational processes, balance sheet data, etc. If these are lost due to a cyber-attack, <strong>digital workflows are blocked<\/strong>. In the worst-case scenario, <strong>partners and customers<\/strong> may even become <strong>targets of fraud and blackmail attacks<\/strong> due to their own negligence. In addition to significant <strong>disruptions to regular operations<\/strong> and <strong>loss of sales<\/strong>, there is also the threat of <strong>loss of trust<\/strong>, <strong>delays in the supply chain<\/strong> or even<strong> fines<\/strong> for possible <strong>breach of contract.<\/strong> In addition, high<strong> fines<\/strong> can be levied under the<strong> European General Data Protection Regulation (GDPR)<\/strong> if customer data is leaked.     <\/p>\n<p>In addition to this threat scenario, transport companies are potentially focusing on a second pool of data, where blocked access or even complete loss can escalate into a <strong>business-threatening crisis<\/strong>: Fleet and driver-related data from tachographs, driver cards, working hours and expense calculations or the documentation of driving licence and vehicle checks. This data is not only irreplaceable for the day-to-day operation of a lorry fleet; it is also <strong>data that must be documented and securely archived by law<\/strong>. <\/p>\n<p>If, for example, driving times and rest periods cannot be fully documented, the responsible Federal Office for Logistics and Mobility (BALM) may impose a fine of <strong>\u20ac750 per driver each day for which no evidence can be provided<\/strong>. Depending on the size of the fleet, an already tense situation can quickly turn into a <strong>business-threatening incident<\/strong>. In addition, there are the high costs and time required to restore all relevant systems, serious disruptions to operations, <strong>loss of trust<\/strong> among customers, partners and employees, and the possible misuse of employee data.  <\/p>\n<p>With all this in mind, it is clear that transport companies are not only exposed to a high threat potential for cybercrime \u2013 they also<strong> feel the consequences of such an incident particularly severely<\/strong>.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-240695a elementor-widget__width-initial elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"240695a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-exclamation-triangle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIn short: Possible consequences of cyberattacks\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<br>\n<ul style=\"color:#002057\"><li>Loss of important customer and company data<\/li>\n<li>Massive disruption to operations and high costs for \u201crestart\u201d<\/li>\n<li>Serious damage to the image of customers, partners and employees<\/li>\n<li>Penalties for breach of contract in the event of impairment of supply chains<\/li>\n<li>Spam or hacks at customers and partners possible through data theft<\/li>\n<li>High fines under the General Data Protection Regulation (GDPR)<\/li>\n<li>Heavy fines for missing proof of driving and rest periods<\/li>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47ceda1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"47ceda1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>IT security in everyday transport &#8211; easier said than done?<\/h2>\n<p>\u201cI\u2019m the only one using this PC. I\u2019ve secured it with a password, and that\u2019ll do it!\u201d Another misconception about data security may sound something like this. However, the assumption that there is no risk of unauthorised access when working with locally installed PC programs and storing all data records on a local hard drive is deceptive. This is because it is precisely when driver and vehicle-related data is stored, analysed and processed within seemingly closed local IT infrastructures that it is potentially exposed to a higher risk. This may sound paradoxical, but in view of the attack vectors mentioned above (possible ways of unauthorised access), such \u2018classic office scenarios\u2019 offer a <strong>multitude of possible gateways for criminal misuse<\/strong>. The sources of error are both man-made and technical in nature.     <\/p>\n<p>This is because a large part of day-to-day administrative business in the transport sector consists of collecting and exchanging information and data. The channels used for this are always potential <strong>starting points for cyber-attacks: Email inboxes, links on websites, a data CD-ROM, USB sticks or memory cards, even a phone call<\/strong> can allow attackers to gain unauthorised access to passwords, data or system functions. The tactics used to persuade users to make a fateful click, to use manipulated storage media or to pass on confidential information in a fictitious telephone call are just as sophisticated as the software that ultimately makes the hack technically possible. It is no coincidence that this part of deliberate user control is also known in specialist circles as <strong>\u2018social engineering\u2019<\/strong>.   <\/p>\n<p>It is often impossible to train all employees on the latest cyber threats and the tactics of potential attackers during day-to-day operations. Maintaining an overview of necessary software and hardware updates without calling in expensive external expertise also seems extremely difficult for many small to medium-sized companies. Caught in the <strong>dilemma between a core business that is demanding in terms of time and costs, and the dangers of the digital age<\/strong>, it therefore seems all too understandable when transport companies ultimately opt for the ostrich strategy.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d5bd12 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3d5bd12\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Ensure safety and sustainability seamlessly &#8211; with DAKO<\/h2>\n<p>To keep your finger <strong>on the pulse in this difficult situation<\/strong>, it is advisable to work with a suitable partner. This is because more modern solutions enable the <strong>encrypted transfer of data<\/strong> via the G network (remote download) to <strong>highly secure servers<\/strong> (mainframes for storing enormous amounts of data). This data can then be processed on multiple devices, regardless of location and number of devices. Access to and processing of the data is made possible via <strong>security barriers<\/strong>, such as strong password protection. A web platform replaces the user interface of a static, local programme for displaying and editing the data. In IT jargon, this is referred to as a <strong>\u2018cloud solution\u2019<\/strong>.     <\/p>\n<p>In the world of transport, this means that employee and vehicle data, tachograph, driver card and vehicle data (FMS data) <strong>can be called up online at any time<\/strong>. The relevant information can therefore be accessed from any Internet-enabled device worldwide and by different users at the same time. It is also easy to set which employees can see and work with which data. The good news is that you do <strong>not need to invest in a new and extensive computer infrastructure (hardware) for a cloud solution<\/strong>.   <\/p>\n<p>What does this mean for those who use remote download for driver card and tachograph data and the <strong><a href=\"https:\/\/www.dako.de\/en\/products\/dako-fleet\/\">DAKO cloud solution<\/a><\/strong>?<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40f5e64 elementor-widget__width-initial elementor-widget elementor-widget-elementskit-stylish-list\" data-id=\"40f5e64\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-stylish-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\">\t\t<ul class=\"ekit-stylish-list \" >\n\t\t\t\t\t\t\t<li class=\"ekit-stylish-list-content-wrapper elementor-repeater-item-d701695\" >\n\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-text\">\n\t\t\t\t\t\t\t<span class=\"ekit-stylish-list-content-title\">Certified security through regular checks and training in accordance with ISO \/ IEC 27001<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"ekit-stylish-list-content-wrapper elementor-repeater-item-56ebfef\" >\n\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-text\">\n\t\t\t\t\t\t\t<span class=\"ekit-stylish-list-content-title\">Encrypted data transfer and highly secure data storage on DAKO\u2019s own servers in Germany<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"ekit-stylish-list-content-wrapper elementor-repeater-item-cb9dcf7\" >\n\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-text\">\n\t\t\t\t\t\t\t<span class=\"ekit-stylish-list-content-title\">A wide range of smart services with optimum integration options in your existing system landscape - regardless of fleet size and business purpose<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"ekit-stylish-list-content-wrapper elementor-repeater-item-db27e48\" >\n\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-text\">\n\t\t\t\t\t\t\t<span class=\"ekit-stylish-list-content-title\">An identity provider as a guarantee for the strict restriction of access rights and user roles on your platform account, as well as optimum integration into your IT system landscape using OpenID Connect<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"ekit-stylish-list-content-wrapper elementor-repeater-item-a4b0ddc\" >\n\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-text\">\n\t\t\t\t\t\t\t<span class=\"ekit-stylish-list-content-title\">Comprehensive and customised in-house customer service with advice tailored to your needs<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t<li class=\"ekit-stylish-list-content-wrapper elementor-repeater-item-f2d6847\" >\n\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-stylish-list-content-text\">\n\t\t\t\t\t\t\t<span class=\"ekit-stylish-list-content-title\">Our own research and development team ensures that our products and therefore your company are future-proof<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bc2d84 elementor-widget__width-initial elementor-cta--layout-image-left elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-widget elementor-widget-call-to-action\" data-id=\"9bc2d84\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<a class=\"elementor-cta\" href=\"https:\/\/www.dako.de\/kontakt\/kontakt-kundenbetreuung\/\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/www.dako.de\/media\/2023\/03\/Cards_Ansprechpartner_Bild-Vertrieb_600x400.jpg);\" role=\"img\" aria-label=\"Kontakt Neukundenvertrieb\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tContact  Support\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\t<p>Do you have any questions about IT security or are you unsure about the performance of your current infrastructure? Then let us advise you on how to make your company fit for the digital future! <\/p>\n<p><strong style=\"color:#002057;\">Phone +49 3641 22778 596<\/strong><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item \">\n\t\t\t\t\t<span class=\"elementor-cta__button elementor-button elementor-size-\">\n\t\t\t\t\t\tTo the contact form&nbsp;&nbsp;\u279c\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bb1c247 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bb1c247\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1aff5e9\" data-id=\"1aff5e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ee727f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1ee727f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-721e06c elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"721e06c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Share post via<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ca43b5 elementor-share-buttons--skin-framed elementor-share-buttons--shape-rounded elementor-widget__width-auto elementor-widget-mobile__width-inherit elementor-share-buttons--view-icon-text elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"6ca43b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_linkedin\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on linkedin\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tLinkedIn\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_email\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on email\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-share-btn__text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__title\">\n\t\t\t\t\t\t\t\t\t\tE-Mail\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5257f0f elementor-widget__width-initial elementor-widget elementor-widget-post-navigation\" data-id=\"5257f0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/www.dako.de\/en\/smart-tachograph-version-2\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><i class=\"fa fa-arrow-left\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Previous article<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/www.dako.de\/en\/extension-of-the-obligation-to-hold-driver-related-data-to-56-days\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Next article<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><i class=\"fa fa-arrow-right\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Next<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Many companies in the industry only address the issue of IT security when it is too late; usually after becoming the target of a cyberattack. To prevent this from happening to you, we have compiled a comprehensive guide on the topic here &#8211; because knowledge gives you a decisive edge. <\/p>\n","protected":false},"author":13,"featured_media":83260,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[72,74],"tags":[],"class_list":["post-84379","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-branch"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/posts\/84379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/comments?post=84379"}],"version-history":[{"count":10,"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/posts\/84379\/revisions"}],"predecessor-version":[{"id":84430,"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/posts\/84379\/revisions\/84430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/media\/83260"}],"wp:attachment":[{"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/media?parent=84379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/categories?post=84379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dako.de\/en\/wp-json\/wp\/v2\/tags?post=84379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}