{"id":15168,"date":"2022-12-07T13:52:45","date_gmt":"2022-12-07T12:52:45","guid":{"rendered":"https:\/\/www.robin-data.io\/?p=15168"},"modified":"2025-03-24T13:40:32","modified_gmt":"2025-03-24T12:40:32","slug":"what-to-do-it-security-incident","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident","title":{"rendered":"What to do in the event of an IT security incident?"},"content":{"rendered":"<div  class='flex_column av-6kd3hhc-f210d8e5670c4cb7b18b66478d4e24f6 av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div'     ><p><section  class='av_textblock_section av-lati8klg-423693dcd5d822cf0cc009c4f6399ef2'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\">Data Protection Wiki<\/a> \u00bb <strong>IT security incident: Responding correctly in an emergency<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-66vichs-e7a6e423682dd42bbb5a541a6e8d64a8\">\n.avia-image-container.av-66vichs-e7a6e423682dd42bbb5a541a6e8d64a8 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-66vichs-e7a6e423682dd42bbb5a541a6e8d64a8 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-66vichs-e7a6e423682dd42bbb5a541a6e8d64a8 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-15255 avia-img-lazy-loading-not-15255 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png\" alt='IT security incident' title=''  height=\"343\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png 685w, https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall-300x150.png 300w, https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall-18x9.png 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><br \/>\n<div  class='hr av-5qtkvkw-410af83d638c329078749686c01f2314 hr-default  avia-builder-el-3  el_after_av_image  el_before_av_heading'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-579ysv4-90f84aca1248d3942cd887d745647779\">\n#top .av-special-heading.av-579ysv4-90f84aca1248d3942cd887d745647779{\npadding-bottom:10px;\ncolor:#303440;\n}\nbody .av-special-heading.av-579ysv4-90f84aca1248d3942cd887d745647779 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-579ysv4-90f84aca1248d3942cd887d745647779 .special-heading-inner-border{\nborder-color:#303440;\n}\n.av-special-heading.av-579ysv4-90f84aca1248d3942cd887d745647779 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-579ysv4-90f84aca1248d3942cd887d745647779 av-special-heading-h1 custom-color-heading  avia-builder-el-4  el_after_av_hr  el_before_av_hr'><h1 class='av-special-heading-tag'  itemprop=\"headline\"  >IT security incident: Responding correctly in an emergency<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='hr av-4rr125c-e031f612228a0b8839abd6dc9bdd796c hr-default  avia-builder-el-5  el_after_av_heading  el_before_av_textblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-4f1falc-4869804e9bde8e83be6df64c7dd13fb1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Cyber attacks have become highly professionalised in recent years and cause up to 220 billion euros in damage per year in Germany alone. They cause the failure of information and production systems or the disruption of internal processes, often through the use of ransomware via phishing attacks.<\/p>\n<p>The aim of this paper is to help you proceed in an informed and considered manner in the event of an IT security incident. You will get practical tips on how to recognise IT security incidents and how to prepare and deal with them. Nevertheless, the topic is complex. Every company has different requirements and needs individually adapted measures. Therefore, this article does not go into technical depth and is not intended to be a conclusive examination of the topic. Rather, the article is intended to give you, as the person in charge of a company, the most important key points to take with you on your way.<\/p>\n<\/div><\/section><\/p><\/div><div class='flex_column_table av-lw9umk-33703d3362028b1aa2ff3515470fd277 sc-av_one_full av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lw9umk-33703d3362028b1aa2ff3515470fd277\">\n.flex_column.av-lw9umk-33703d3362028b1aa2ff3515470fd277{\nborder-radius:0px 0px 0px 0px;\npadding:25px 25px 25px 25px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  id=\"uebersicht\"  class='flex_column av-lw9umk-33703d3362028b1aa2ff3515470fd277 av_one_full  avia-builder-el-7  el_after_av_one_full  el_before_av_one_full  first flex_column_table_cell av-equal-height-column av-align-top  column-top-margin'     ><section  class='av_textblock_section av-kiipug5e-9fb40f37d4a3507a9adb6100183fdb62'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Content on the topic of IT security incident:<\/h2>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8\">\n#top .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .iconlist_icon{\ncolor:#127db3;\nfont-size:20px;\n}\n#top .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .iconlist_icon svg:first-child{\nstroke:#127db3;\nfill:#127db3;\nheight:20px;\nwidth:20px;\n}\n#top #wrap_all .avia-icon-list-container.av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 .av_iconlist_title{\nfont-size:20px;\n}\n<\/style>\n<div  class='avia-icon-list-container av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8  avia-builder-el-9  el_after_av_textblock  el_before_av_hr'><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-small av-kiiw1urp-f27e17df72223b7dbe3b5605698b72d8 avia-iconlist-animate'>\n<li><div class='iconlist_icon av-1m936j-87f1330b1f5cd7635dbe6c14090b15c7 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#definition-it-sicherheitsvorfall&#039; title=&#039;What is an IT security incident?&#039;&gt;What is an IT security incident?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#definition-it-sicherheitsvorfall' title='What is an IT security incident?'>What is an IT security incident?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li>\n<p class=\"av-special-heading-tag\"><a href=\"#erkennung-it-sicherheitsvorfall\">How do I recognise an IT security incident?<\/a><\/p>\n<\/li>\n<li>\n<p class=\"av-special-heading-tag\"><a href=\"#beispiele-it-sicherheitsvorfall\">Examples of IT security incidents<\/a><\/p>\n<\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-e0rz63-3ce7118d136ddaaddef6c0863cfd1fca avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#reagieren-it-sicherheitsvorfall&#039; title=&#039;How should you react in the event of an IT security incident?&#039;&gt;How should you react in the event of an IT security incident?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#reagieren-it-sicherheitsvorfall' title='How should you react in the event of an IT security incident?'>How should you react in the event of an IT security incident?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul>\n<li>\n<p class=\"av-special-heading-tag\"><a href=\"#vorbereitung-it-sicherheitsvorfall\">How do you prepare for an IT security incident?<\/a><\/p>\n<\/li>\n<li>\n<p class=\"av-special-heading-tag\"><a href=\"#tipps-it-sicherheitsvorfall\">7 tips for the right approach<\/a><\/p>\n<\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-7jdvf-62f1af42dc6b97111a7be27c2772a94b avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#fazit&#039; title=&#039;Conclusion&#039;&gt;Conclusion&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#fazit' title='Conclusion'>Conclusion<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-7jdvf-2-e9d14f82ad4e4312b945ee0b670d9c0a avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#weitere-links&#039; title=&#039;Further links&#039;&gt;Further links&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#weitere-links' title='Further links'>Further links<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa\">\n#top .hr.hr-invisible.av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-kdu4eeyn-eb3f32c0008bb0ef46b2ec5ca7bda5fa hr-invisible  avia-builder-el-10  el_after_av_iconlist  avia-builder-el-last'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n<div  class='flex_column av-7nl7e2o-b06aece08f93760e8c8abefe8039b476 av_one_full  avia-builder-el-11  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-latnafzm-950dfb4b4cce1ac188ca4dc019cbd849\">\n#top .av-special-heading.av-latnafzm-950dfb4b4cce1ac188ca4dc019cbd849{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-latnafzm-950dfb4b4cce1ac188ca4dc019cbd849 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-latnafzm-950dfb4b4cce1ac188ca4dc019cbd849 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"definition-it-sicherheitsvorfall\"  class='av-special-heading av-latnafzm-950dfb4b4cce1ac188ca4dc019cbd849 av-special-heading-h2 blockquote modern-quote  avia-builder-el-12  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >What is an IT security incident?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-6bmbly8-9343f992466c6d3609ba720918c6a57f'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>An IT security incident is an event or emergency that has a negative impact on the information security of a company. In IT security incidents, the information security criteria (confidentiality, availability and integrity of information) in business processes and IT systems are compromised in such a way that major damage can occur. Malicious action, non-compliance with a security policy rule or generally any kind of information security breach fall under the definition of an IT security incident. IT security incidents have a greater or lesser impact in different contexts and situations.<\/p>\n<p>IT systems play a central role for many companies. A failure of these systems can lead to a complete standstill, high claims for damages or even insolvency of the company. Furthermore, there is also the threat of damage to the company's image, loss of customers or infringements of the law.<\/p>\n<p>Some IT security incidents are simple \"glitches\" while other incidents that can cause significant damage are emergencies. Each type of IT security incident needs a customised action plan to ensure a quick resolution of the problem. Therefore, it is important to know how to recognise and prepare for IT security incidents in order to react properly in case of an emergency.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-latnbe8m-da1a148ce48e709ef3c9b5a52c4c65bf\">\n#top .av-special-heading.av-latnbe8m-da1a148ce48e709ef3c9b5a52c4c65bf{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-latnbe8m-da1a148ce48e709ef3c9b5a52c4c65bf .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-latnbe8m-da1a148ce48e709ef3c9b5a52c4c65bf .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"erkennung-it-sicherheitsvorfall\"  class='av-special-heading av-latnbe8m-da1a148ce48e709ef3c9b5a52c4c65bf av-special-heading-h3 blockquote modern-quote  avia-builder-el-14  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >How do I recognise an IT security incident?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-latnkrgz-269fc2e602f93a942dc7bae791d11ebd'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Since not every event is a security incident, you should immediately check whether at least one of the information security criteria is affected:<\/p>\n<ul>\n<li style=\"font-size: 20px;\"><strong>Confidentiality<\/strong>: If your data has been stolen or confidential information has been sent to the wrong recipient, the confidentiality of your data is no longer guaranteed.<\/li>\n<li style=\"font-size: 20px;\"><strong>Availability<\/strong>: The availability of your data is affected if, for example, a hard disk with critical data is defective or important IT systems are no longer accessible.<\/li>\n<li style=\"font-size: 20px;\"><strong>Integrity<\/strong>: The integrity of your data is no longer guaranteed if, for example, one of your computers is infected by a Trojan or your bookkeeping is suddenly no longer correct.<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-latnbu2g-829369fb8abd5b6f383f071ca14efd5f\">\n#top .av-special-heading.av-latnbu2g-829369fb8abd5b6f383f071ca14efd5f{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-latnbu2g-829369fb8abd5b6f383f071ca14efd5f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-latnbu2g-829369fb8abd5b6f383f071ca14efd5f .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"beispiele-it-sicherheitsvorfall\"  class='av-special-heading av-latnbu2g-829369fb8abd5b6f383f071ca14efd5f av-special-heading-h3 blockquote modern-quote  avia-builder-el-16  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Examples of IT security incidents<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-latncsuw-ab287501512e40fe5f204cb258bf477c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span class=\"TextRun SCXW161802567 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW161802567 BCX0\">Three common security incidents are briefly presented below.\u00a0<\/span><\/span><span class=\"EOP SCXW161802567 BCX0\" data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h4>Ransomware attacks<\/h4>\n<p>Ransomware is malicious software used to block access to a computer or mobile phones or to encrypt personal data. Most commonly, ransomware is operated through phishing. This happens by sending an email to the target organisation or individuals asking the recipient to open an attachment or download a file. Once the attachment is opened or the file is downloaded, the ransomware is installed on the computer and penetrates the victim's computer network. Cybercriminals often use ransomware to demand a ransom from the victim in exchange for a decryption key. If the victim refuses, the attackers may threaten to publish the confidential or critical information.<\/p>\n<h4>Phishing attacks<\/h4>\n<p>Phishing attacks are fraudulent activities by cybercriminals in which disguised emails or text messages are sent to individuals or organisations. Usually, readers are asked to divulge sensitive data (bank details or passwords for accounts) or to click links to dubious websites. These emails try to create a sense of urgency in you, urging you to act quickly to avoid losing your data or account, for example.<\/p>\n<h4>Information theft<\/h4>\n<p>Information theft is the loss of a laptop, USB stick or other IT equipment on which confidential documents are stored.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4brhbnk-8ae98fcd62da8a7359f86ba72a01ff90\">\n.flex_column.av-4brhbnk-8ae98fcd62da8a7359f86ba72a01ff90{\npadding:35px 25px 30px 25px;\nbackground-color:#b3dff1;\n}\n<\/style>\n<div  class='flex_column av-4brhbnk-8ae98fcd62da8a7359f86ba72a01ff90 av_one_full  avia-builder-el-18  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-3rd9kg0-94b12c1f792bf9a65665cb3e175b32eb'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong>ISMS audit and ISO 27001 audit<\/strong><\/p>\n<p>Regular audits of your information security system contribute to the optimisation of your information security. By means of an ISMS audit, the current status of your information security management is analysed and documented by our T\u00dcV \/ DEKRA certified consultants in your company. Open measures are recorded, prioritised and recorded in a concrete action plan. Find out about the benefits, process and costs with Robin Data.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-bt83y8-7590ea9ae1e6e0ecb23d7576c3564b35-wrap avia-button-left  avia-builder-el-20  el_after_av_textblock  avia-builder-el-last'><a href='https:\/\/www.robin-data.io\/en\/compliance-audit'  class='avia-button av-bt83y8-7590ea9ae1e6e0ecb23d7576c3564b35 av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Discover audit advantages\"><span class='avia_iconbox_title' >Discover audit advantages<\/span><\/a><\/div><\/p><\/div>\n<div  class='flex_column av-5q834n4-8ace0a65a98651bb68c27ba5df7c91f2 av_one_full  avia-builder-el-21  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-latnfy1r-34c05f96f9868a187126f16ea0c610f2\">\n#top .av-special-heading.av-latnfy1r-34c05f96f9868a187126f16ea0c610f2{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-latnfy1r-34c05f96f9868a187126f16ea0c610f2 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-latnfy1r-34c05f96f9868a187126f16ea0c610f2 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"reagieren-it-sicherheitsvorfall\"  class='av-special-heading av-latnfy1r-34c05f96f9868a187126f16ea0c610f2 av-special-heading-h3 blockquote modern-quote  avia-builder-el-22  el_before_av_textblock  avia-builder-el-first'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >How should one react in the event of an IT security incident?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-latnqwo9-9ea9f70b1e047ad7b782e6869ebc4437'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In an emergency situation it is important to remain calm. First have the seriousness of the situation assessed before acting to avoid hasty and ill-considered action. If you have dealt with your information security before an attack, you will certainly have created security guidelines that drive the individual management of each security incident. In that case, refer to the documentation and follow the defined procedures and security policies to restore your business processes and IT infrastructure. To avoid reputational damage and liability to third parties, you should also follow the communication procedures described in your emergency response manual.<\/p>\n<p>If you do not have an internal or <a href=\"https:\/\/www.robin-data.io\/en\/information-security-as-a-service\">external information security officer<\/a> please feel free to contact us. Robin Data's experienced experts will be happy to set up an information security management system with you and create emergency concepts with you.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1zmrs0-160a43043a10728ffa5d6dc8f72ca747\">\n#top .av-special-heading.av-1zmrs0-160a43043a10728ffa5d6dc8f72ca747{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1zmrs0-160a43043a10728ffa5d6dc8f72ca747 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1zmrs0-160a43043a10728ffa5d6dc8f72ca747 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"vorbereitung-it-sicherheitsvorfall\"  class='av-special-heading av-1zmrs0-160a43043a10728ffa5d6dc8f72ca747 av-special-heading-h3 blockquote modern-quote  avia-builder-el-24  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >How do you prepare for an IT security incident?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-latnneic-c6304e55e369127d84a3ab4430d2c4fe'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Implement a system in advance that <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system\">Information Security Management System (ISMS)<\/a>. Define in the ISMS which processes and policies are necessary to continuously improve the security of corporate information. Protect your critical business processes by setting up a business continuity management system (BCM). Appoint an information security officer to deal with issues related to the security of information. <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/information-security-definition\">Information Security<\/a> busy. You should also conduct regular penetration tests or vulnerability audits to create a constant and up-to-date overview of your information security. In addition, you can also take out cyber security insurance.<\/p>\n<p>To ensure that you are as well prepared as possible for an IT security incident, you should answer the following questions in advance:<\/p>\n<ul>\n<li style=\"font-size: 20px;\">How can I tell that I am\/was being attacked?<\/li>\n<li style=\"font-size: 20px;\">What is the fastest way to reach my IT service providers?<\/li>\n<li style=\"font-size: 20px;\">What is the treatment procedure?<\/li>\n<li style=\"font-size: 20px;\">Who can I get advice from?<\/li>\n<li style=\"font-size: 20px;\">What damage has occurred or can still occur?<\/li>\n<li style=\"font-size: 20px;\">How can I avoid further damage?<\/li>\n<li style=\"font-size: 20px;\">How to recover lost data?<\/li>\n<li style=\"font-size: 20px;\">How expensive are the damages?<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-31s5ug0-8e12611f83c4eb111c6cf3e3449852af\">\n.flex_column.av-31s5ug0-8e12611f83c4eb111c6cf3e3449852af{\npadding:35px 25px 30px 25px;\nbackground-color:#b3dff1;\n}\n<\/style>\n<div  class='flex_column av-31s5ug0-8e12611f83c4eb111c6cf3e3449852af av_one_full  avia-builder-el-26  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-2ev5hhc-ad3e59d8be6a1c0b1eb446aee83f3a13'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong>External Information Security Officer<\/strong><\/p>\n<p>You are welcome to contact us as\u00a0<strong>external Information Security Officer (ISB)\u00a0<\/strong>order. We also offer individual consulting services as well as audits in the area of information security. We will be happy to provide you with a non-binding offer. You can find more information about our external information security officers on our website.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-1y4ko4g-b1f0f204f1af854f85a0b6ec887c26d4-wrap avia-button-left  avia-builder-el-28  el_after_av_textblock  avia-builder-el-last'><a href='https:\/\/www.robin-data.io\/en\/information-security-as-a-service'  class='avia-button av-1y4ko4g-b1f0f204f1af854f85a0b6ec887c26d4 av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Discover ISB services\"><span class='avia_iconbox_title' >Discover ISB services<\/span><\/a><\/div><\/p><\/div>\n<div  id=\"tipps-it-sicherheitsvorfall\"  class='flex_column av-1l6koxs-53cb729c18ebf3cb1f94ef85695dfecb av_one_full  avia-builder-el-29  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-459p28-aeab8d8ba5aa862a209f446bff07047d\">\n#top .av-special-heading.av-459p28-aeab8d8ba5aa862a209f446bff07047d{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-459p28-aeab8d8ba5aa862a209f446bff07047d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-459p28-aeab8d8ba5aa862a209f446bff07047d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-459p28-aeab8d8ba5aa862a209f446bff07047d av-special-heading-h3 blockquote modern-quote  avia-builder-el-30  el_before_av_textblock  avia-builder-el-first'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >7 tips for the right approach<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-qvhpq8-00896901418eeb1698919c7ec4595089'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>These tips will help you make appropriate decisions and react as quickly and safely as possible in the event of an incident.<\/p>\n<ol>\n<li style=\"font-size: 20px;\"><strong>Respond swiftly<\/strong>: You should act thoughtfully but quickly in order to lose as little time as possible and not create any commotion in the company.<\/li>\n<li style=\"font-size: 20px;\"><strong>Keep evidence and data<\/strong>Do not alter or delete the data so that no traces are covered. Instead, work with copies until possible evidence has been forensically secured.<\/li>\n<li style=\"font-size: 20px;\"><strong>Leave the system unchanged<\/strong>: Do not switch off the system and do not reboot the computer, this could lead to the destruction of important traces.<\/li>\n<li style=\"font-size: 20px;\"><strong>Report the relevant internal bodies<\/strong>Inform the responsible or affected departments, such as the management, the legal department and the data protection officer as well as the IT security officer. Determine with the departments which other internal bodies need to be informed. Insofar as the perpetrator has not been caught, check which persons are trustworthy and do not unnecessarily expand the circle of informed persons. If necessary, form a crisis response team.<\/li>\n<li style=\"font-size: 20px;\"><strong>Document the incident carefully<\/strong>Log all steps taken and observations made and determine the exact facts (type, scope, date, time). Document the affected systems from which data has been lost and determine exactly what happened.<\/li>\n<li style=\"font-size: 20px;\"><strong>Involve qualified experts in good time<\/strong>Get external help, such as IT forensics experts, to ensure that the facts of the case are clarified and processed in a way that is legally compliant.<\/li>\n<li style=\"font-size: 20px;\"><strong>Inform external bodies<\/strong>Clarify with your crisis response team whether external bodies such as supervisory authorities need to be informed. In some cases, the disclosure of information is regulated by law (e.g. the GDPR) and non-compliance may lead to a fine.<\/li>\n<\/ol>\n<\/div><\/section><\/p><\/div>\n<div  id=\"fazit\"  class='flex_column av-3wuih5s-cb4d4609cdda92766b920fb918e2c825 av_one_full  avia-builder-el-32  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-39jgabk-ed49048dc6b969843746bdda355776bd\">\n#top .av-special-heading.av-39jgabk-ed49048dc6b969843746bdda355776bd{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-39jgabk-ed49048dc6b969843746bdda355776bd .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-39jgabk-ed49048dc6b969843746bdda355776bd .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-39jgabk-ed49048dc6b969843746bdda355776bd av-special-heading-h2 blockquote modern-quote  avia-builder-el-33  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Conclusion<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-2cjqnmo-72f017a09760d7a32dfaac6c2562d9ea'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Threats are constantly evolving and to keep up, you should best prepare your company for them. Therefore, it is necessary to be aware of the risks and take concrete, preventive measures. With a mature and tested response plan, as well as an emergency response manual, the amount of damage and the attacker's success can be minimised.<\/p>\n<\/div><\/section><\/p><\/div>\n<div  id=\"weitere-links\"  class='flex_column av-19kuyww-0dc71f33008f8f96f8969eb219a1c119 av_one_full  avia-builder-el-35  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-latt6ntw-8539a540cea797cae1839ab1e6b54b0b\">\n#top .av-special-heading.av-latt6ntw-8539a540cea797cae1839ab1e6b54b0b{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-latt6ntw-8539a540cea797cae1839ab1e6b54b0b .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-latt6ntw-8539a540cea797cae1839ab1e6b54b0b .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-latt6ntw-8539a540cea797cae1839ab1e6b54b0b av-special-heading-h2 blockquote modern-quote  avia-builder-el-36  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Further links<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-latt7dka-c52251ebb14ada2d4626403ff2df8878'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The Federal Office for Safety has issued brochures and articles for such situations that show specifically who to call in an emergency. At this point we recommend that you take a look at these two brochures:<\/p>\n<ul>\n<li style=\"font-size: 20px;\"><a href=\"https:\/\/www.allianz-fuer-cybersicherheit.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Themen\/Ransomware_Erste-Hilfe-IT-Sicherheitsvorfall.pdf?__blob=publicationFile&amp;v=1\">First aid in the event of a serious IT security incident<\/a><\/li>\n<li style=\"font-size: 20px;\"><a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/CSN\/210927_Digitale_Rettungskette.pdf?__blob=publicationFile&amp;v=4\">The \"Digital Rescue Chain\" of the Cyber Security Network<\/a><\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-38  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-40  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident&#038;t=Was%20tun%20beim%20IT-Sicherheitsvorfall%3F' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Was%20tun%20beim%20IT-Sicherheitsvorfall%3F&#038;url=https:\/\/www.robin-data.io\/en\/?p=15168' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Was%20tun%20beim%20IT-Sicherheitsvorfall%3F&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Was%20tun%20beim%20IT-Sicherheitsvorfall%3F&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-41  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\">This might interest you too:<\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-43  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-44  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-16316 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7' data-rel='slide-1' class='slide-image' title='TISAX requirements: Prepare certification step by step'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall-495x343.png\" class=\"wp-image-15255 avia-img-lazy-loading-not-15255 attachment-portfolio size-portfolio wp-post-image\" alt=\"IT security incident\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: TISAX requirements: Prepare certification step by step\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7' title='TISAX requirements: Prepare certification step by step'>TISAX requirements: Prepare certification step by step<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >TISAX\u00ae requirements: Information on the question catalogue, maturity levels and certification. Prepare the assessment level and audit.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-01-08T13:19:57+01:00\" >8 January 2024<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-12-07T13:52:45+01:00\" >2024-01-08 13:19:57<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 16:15:24<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>TISAX requirements: Prepare certification step by step<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-12189 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system' data-rel='slide-1' class='slide-image' title='ISMS: definition, implementation, standards'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-not-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: ISMS: Definition, implementation, standards\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system' title='ISMS: definition, implementation, standards'>ISMS: definition, implementation, standards<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >All information on the information security management system: delimitation of DPMS, notes on implementation, norms and standards<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-10-26T14:56:51+02:00\" >26 October 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-12-07T13:52:45+01:00\" >2021-10-26 14:56:51<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:26<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ISMS: definition, implementation, standards<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-11257 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/information-security-definition' data-rel='slide-1' class='slide-image' title='Protection of information and data'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-not-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Protection of information and data\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/information-security-definition' title='Protection of information and data'>Protection of information and data<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >What is information security? Tasks of the information security officer and differentiation from data protection.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/information-security-definition\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-07-13T11:25:11+02:00\" >13 July 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/information-security-definition#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-12-07T13:52:45+01:00\" >2021-07-13 11:25:11<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-08-13 12:44:28<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Protection of information and data<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>The most important facts about IT security incidents. Learn practical tips on recognising and dealing with IT emergencies in the article.<\/p>","protected":false},"author":3,"featured_media":15255,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[71],"tags":[169,120,121],"class_list":["post-15168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki","tag-informationssicherheit","tag-it-sicherheit","tag-spezielle-themen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IT-Sicherheitsvorfall: Im Notfall richtig reagieren<\/title>\n<meta name=\"description\" content=\"Das Wichtigste zum IT-Sicherheitsvorfall. Erfahren Sie im Beitrag praktische Tipps zur Erkennung und Behandlung von IT-Notf\u00e4llen. Jetzt lesen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Was tun beim IT-Sicherheitsvorfall?\" \/>\n<meta property=\"og:description\" content=\"Das Wichtigste zum IT-Sicherheitsvorfall. Erfahren Sie im Beitrag praktische Tipps zur Erkennung und Behandlung von IT-Notf\u00e4llen. Jetzt lesen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-07T12:52:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T12:40:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Caroline Schwabe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Caroline Schwabe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall\"},\"author\":{\"name\":\"Caroline Schwabe\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"headline\":\"Was tun beim IT-Sicherheitsvorfall?\",\"datePublished\":\"2022-12-07T12:52:45+00:00\",\"dateModified\":\"2025-03-24T12:40:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall\"},\"wordCount\":6734,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png\",\"keywords\":[\"Informationssicherheit\",\"IT-Sicherheit\",\"Spezielle Themen\"],\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall\",\"name\":\"IT-Sicherheitsvorfall: Im Notfall richtig reagieren\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png\",\"datePublished\":\"2022-12-07T12:52:45+00:00\",\"dateModified\":\"2025-03-24T12:40:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"description\":\"Das Wichtigste zum IT-Sicherheitsvorfall. Erfahren Sie im Beitrag praktische Tipps zur Erkennung und Behandlung von IT-Notf\u00e4llen. Jetzt lesen!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png\",\"width\":685,\"height\":343,\"caption\":\"IT-Sicherheitsvorfall\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Was tun beim IT-Sicherheitsvorfall?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\",\"name\":\"Caroline Schwabe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"caption\":\"Caroline Schwabe\"},\"description\":\"Frau Schwabe ist Informationsdesignerin und Datenschutzbeauftragte. Der Schwerpunkt ihrer Arbeit liegt darin, Kunden und Interessenten mit Beitr\u00e4gen in der Robin Data Datenschutz-Akademie weiterzuhelfen.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/csc\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT security incident: Responding correctly in an emergency","description":"The most important facts about IT security incidents. Learn practical tips on recognising and dealing with IT emergencies in the article. Read now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident","og_locale":"en_GB","og_type":"article","og_title":"Was tun beim IT-Sicherheitsvorfall?","og_description":"Das Wichtigste zum IT-Sicherheitsvorfall. Erfahren Sie im Beitrag praktische Tipps zur Erkennung und Behandlung von IT-Notf\u00e4llen. Jetzt lesen!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2022-12-07T12:52:45+00:00","article_modified_time":"2025-03-24T12:40:32+00:00","og_image":[{"width":685,"height":343,"url":"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png","type":"image\/png"}],"author":"Caroline Schwabe","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Caroline Schwabe","Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall"},"author":{"name":"Caroline Schwabe","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"headline":"Was tun beim IT-Sicherheitsvorfall?","datePublished":"2022-12-07T12:52:45+00:00","dateModified":"2025-03-24T12:40:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall"},"wordCount":6734,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png","keywords":["Informationssicherheit","IT-Sicherheit","Spezielle Themen"],"articleSection":["Wiki"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall","name":"IT security incident: Responding correctly in an emergency","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png","datePublished":"2022-12-07T12:52:45+00:00","dateModified":"2025-03-24T12:40:32+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"description":"The most important facts about IT security incidents. Learn practical tips on recognising and dealing with IT emergencies in the article. Read now!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png","contentUrl":"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png","width":685,"height":343,"caption":"IT-Sicherheitsvorfall"},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/was-tun-beim-it-sicherheitsvorfall#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Was tun beim IT-Sicherheitsvorfall?"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5","name":"Caroline Schwabe","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","caption":"Caroline Schwabe"},"description":"Ms. Schwabe is an information designer and Data Protection Officer. The focus of her work is to help customers and interested parties with contributions to the Robin Data Privacy Academy.","url":"https:\/\/www.robin-data.io\/en\/author\/csc"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/15168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=15168"}],"version-history":[{"count":29,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/15168\/revisions"}],"predecessor-version":[{"id":15252,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/15168\/revisions\/15252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/15255"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=15168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=15168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=15168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}