{"id":3442,"date":"2022-06-27T12:45:31","date_gmt":"2022-06-27T12:45:31","guid":{"rendered":"https:\/\/locaterisk.com\/?page_id=3442"},"modified":"2022-06-29T10:39:37","modified_gmt":"2022-06-29T10:39:37","slug":"it-sicherheit-energieversorgung","status":"publish","type":"page","link":"https:\/\/locaterisk.com\/en\/it-sicherheit-energieversorgung\/","title":{"rendered":"IT security energy supplier"},"content":{"rendered":"<h1 class=\"blog-title wp-block-heading\" id=\"case-study-mit-it-monitoring-in-richtung-sichere-stadt\">Utilities: This Is How to Keep an Eye on the IT Security of Your Office IT at All Times<\/h1>\n\n\n\n<p>The responsibility is immense. As operators of critical Infrastructures, energy supply companies are almost permanently exposed to attack attempts. As a rule, the networks of the supply processes are physically separated from the administration for security reasons. But even if ONLY the administration and customer data are affected, the damage quickly runs into millions. As a preventive measure, IT security monitoring provides the external attack surface with the urgently needed transparency. They continuously record possible vulnerabilities and help the IT team to quickly minimize the risk.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-1024x437.png\" alt=\"\" class=\"wp-image-3456\" width=\"840\" height=\"359\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-1024x437.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-300x128.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-768x328.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash-18x8.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png 1080w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/figure><\/div>\n\n<h3 style=\"text-align: left;\">IT Security from an External Perspective: Energy Groups in Germany<\/h3>\n<p><strong>Considerable need for action in IT security<br \/><\/strong><span class=\"s1\">Energy supply requires smoothly functioning IT operations. This makes it all the more worrying that threats from ransomware and risks along the supply chain of IT products and services in the energy sector have increased dramatically in recent years. With the IT Security Act 2.0, the federal government obliges all operators of critical infrastructures (CRITIS) to take enhanced security measures for their IT. The high pace of aggressive attacks also presents companies with the task of providing sufficient resources. After all, only continuous analysis and optimization of security systems and protective measures can ensure the business continuity expected by society.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Our analysis of 14 energy groups revealed that there is still considerable need for action in terms of IT security. The data was collected by gathering and processing information from publicly available sources.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h3 style=\"text-align: left;\">The Results\u00a0<\/h3>\n<p><strong>Protected Mail Dispatch<\/strong><br \/>86 percent of the energy companies checked sent emails partially unprotected (without SPF entry), which facilitates spam and phishing attacks by attackers through mail forgery.<\/p>\n<p><strong>Accessibility of the System Interfaces<\/strong><br \/><span style=\"font-weight: 400;\">79 percent do not adequately protect all database systems belonging to the company against cyber attacks. <\/span>Unsecured systems that can be accessed from the outside make it easier for hackers to gain access to sensitive data.<\/p>\n<p><strong>Data Transmission Security<br \/><\/strong>In addition, 100 percent allowed data transmission using outdated transport encryption, which encourages data theft.<\/p>\n<p><strong>Obsolete Applications<br \/><\/strong>At least one application with a potential security vulnerability of high criticality was found in 79 percent. Applications with missing security updates are a welcome gateway for attackers.<\/p>\n<p><strong>GDPR Compliance<br \/><\/strong>100 percent of energy companies used tracking cookies without user permission. In these cases, warnings and fines can threaten.<\/p>\n<p>\u00a0<\/p>\n<h3>Gain Insight into Your Organization's External IT Attack Surface<\/h3>\n<p>IT managers do their best to ensure the security of their IT systems. But how can the current status of security performance continuously be proven? With LocateRisk's IT security analysis, it's quick and easy. See for yourself: Interested organizations can receive a security assessment of their IT landscape, including a 30minute insight into the detailed analysis, free of charge at: Tel. 06151 6290246 or e-mail to: <a href=\"mailto:em@LocateRisk.com\">em@LocateRisk.com<\/a><\/p>\n<h3>Case Study Energy Logistics Company<\/h3>\n<p>Read now: <a href=\"https:\/\/locaterisk.com\/en\/casestudy-energielogistik\/\">Meeting KRITIS Requirements with Continuous Monitoring<\/a>\u00a0<\/p>\n<p>\u00a0<\/p>\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"it-sicherheit-energieversorgung\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>I agree to the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_blank\" rel=\"noreferrer noopener\">privacy policy.<\/a> read<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Schedule a Live Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Energieversorger: So behalten Sie die IT-Sicherheit Ihrer Office-IT jederzeit im Blick Die Verantwortung ist immens. Als KRITIS-Betreiber sind Enregieversorgungsunternehmen quasi permanent Angriffsversuchen ausgesetzt. In der Regel sind die Netze der Versorgungsprozesse aus Sicherheitsgr\u00fcnden physisch von der Verwaltung getrennt. Doch selbst wenn es NUR die Administration und Kundendaten trifft, geht der Schaden schnell in die Millionen. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3456,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3442","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Sicherheit Energieversorger - LocateRisk<\/title>\n<meta name=\"description\" content=\"F\u00fcr Energieversorger hat IT-Sicherheit h\u00f6chste Priorit\u00e4t. Erfahren Sie wie es um Ihre IT-Sicherheitslage steht und was Sie tun k\u00f6nnen, um die Cyberrisiken zu minimieren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/it-sicherheit-energieversorgung\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Sicherheit Energieversorger - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"F\u00fcr Energieversorger hat IT-Sicherheit h\u00f6chste Priorit\u00e4t. Erfahren Sie wie es um Ihre IT-Sicherheitslage steht und was Sie tun k\u00f6nnen, um die Cyberrisiken zu minimieren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/it-sicherheit-energieversorgung\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-29T10:39:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"461\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/\",\"name\":\"IT-Sicherheit Energieversorger - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png\",\"datePublished\":\"2022-06-27T12:45:31+00:00\",\"dateModified\":\"2022-06-29T10:39:37+00:00\",\"description\":\"F\u00fcr Energieversorger hat IT-Sicherheit h\u00f6chste Priorit\u00e4t. Erfahren Sie wie es um Ihre IT-Sicherheitslage steht und was Sie tun k\u00f6nnen, um die Cyberrisiken zu minimieren.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png\",\"width\":1080,\"height\":461,\"caption\":\"Photo by Nikola Johnny Mirkovic\\\/Unsplash\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-energieversorgung\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Sicherheit Energieversorger\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT security for energy suppliers - LocateRisk","description":"IT security is a top priority for energy suppliers. Find out what your IT security situation is and what you can do to minimize cyber risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/it-sicherheit-energieversorgung\/","og_locale":"en_US","og_type":"article","og_title":"IT-Sicherheit Energieversorger - LocateRisk","og_description":"F\u00fcr Energieversorger hat IT-Sicherheit h\u00f6chste Priorit\u00e4t. Erfahren Sie wie es um Ihre IT-Sicherheitslage steht und was Sie tun k\u00f6nnen, um die Cyberrisiken zu minimieren.","og_url":"https:\/\/locaterisk.com\/en\/it-sicherheit-energieversorgung\/","og_site_name":"LocateRisk","article_modified_time":"2022-06-29T10:39:37+00:00","og_image":[{"width":1080,"height":461,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/","url":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/","name":"IT security for energy suppliers - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png","datePublished":"2022-06-27T12:45:31+00:00","dateModified":"2022-06-29T10:39:37+00:00","description":"IT security is a top priority for energy suppliers. Find out what your IT security situation is and what you can do to minimize cyber risks.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/06\/nikola-johnny-mirkovic-Z_dnvde5wxc-unsplash.png","width":1080,"height":461,"caption":"Photo by Nikola Johnny Mirkovic\/Unsplash"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/it-sicherheit-energieversorgung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"IT-Sicherheit Energieversorger"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages\/3442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=3442"}],"version-history":[{"count":48,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages\/3442\/revisions"}],"predecessor-version":[{"id":3653,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages\/3442\/revisions\/3653"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/3456"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=3442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}