{"id":4046,"date":"2022-08-03T12:14:07","date_gmt":"2022-08-03T12:14:07","guid":{"rendered":"https:\/\/locaterisk.com\/?page_id=4046"},"modified":"2022-08-03T16:31:12","modified_gmt":"2022-08-03T16:31:12","slug":"it-sicherheit-automobilzulieferer","status":"publish","type":"page","link":"https:\/\/locaterisk.com\/en\/it-sicherheit-automobilzulieferer\/","title":{"rendered":"IT security: automotive supplier"},"content":{"rendered":"<h1 class=\"blog-title wp-block-heading\" id=\"case-study-mit-it-monitoring-in-richtung-sichere-stadt\">IT Security for Automotive Suppliers: Minimizing Cyber Risks with Foresight<\/h1>\n\n\n\n<p>Suppliers to the automotive industry are permanently in the sights of attackers. Because they are so closely intertwined with manufacturers, they are seen as easy targets with great influence on the supply chain. A disruption in operations, an interruption in production or a shutdown can have devastating effects and are ideal leverage for ransomware. It is therefore essential for companies to continuously monitor the security of their IT systems to ensure sustained high levels of protection. In addition, it is important to identify and alert business partners to potential risks at an early stage. <\/p>\n\n\n\n<p>LocateRisk's IT security analyses and monitoring provide the necessary transparency in the ecosystem and enable accelerated minimization of attack surfaces. You can easily track the progress of security activities and prove the respective status to third parties.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1-1024x436.png\" alt=\"\" class=\"wp-image-4061\" width=\"837\" height=\"355\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1-1024x436.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1-300x128.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1-768x327.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1-18x8.png 18w\" sizes=\"auto, (max-width: 837px) 100vw, 837px\" \/><\/figure><\/div>\n\n<h3>IT Security from an External Perspective: Automotive Suppliers in Germany<\/h3>\n<p style=\"text-align: left;\">The structural change in the automotive industry is gaining momentum. Electromobility, car sharing, connected vehicles and autonomous driving are megatrends that are increasingly enriching our everyday mobile lives. However, the networking that goes hand in hand with this - be it user interfaces, cars, production routes or supply chains - harbors considerable risks. Espionage, sabotage, data theft and ransomware pose new challenges for manufacturers as well as component and system suppliers, as they require a holistic IT security approach. The importance attached to cybersecurity in this industry is confirmed by internationally valid UNECE regulations and the industry-specific adaptation of ISO standard 27001 by the TISAX standard for information security in the automotive sector.<\/p>\n<p class=\"p1\" style=\"text-align: left;\"><span class=\"s1\"><strong>Despite recognizable progress, there is still room for improvement<br \/><\/strong><\/span><span class=\"s1\">Our analysis of 252 automotive suppliers showed that there has been visible progress with regard to software updates and the accessibility of system interfaces. However, there is still a clear need for action with regard to the security of data transmission. <\/span><span class=\"s1\">Data collection was done by gathering and processing information from publicly available sources.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h3>The Results in Detail<\/h3>\n<p><strong>Protected Mail Dispatch<\/strong><br \/>Fifty-two percent of the major cities checked sent email partially unprotected (without an SPF record), making it easier for attackers to launch spam and phishing attacks through mail forgery.<\/p>\n<p><strong>Accessibility of the System Interfaces<\/strong><br \/>The fact that not all database systems belonging to the company were adequately protected against cyber attacks was revealed by 41 percent. Unsecured systems that can be accessed from outside make it easier for hackers to gain access to sensitive data.<\/p>\n<p><strong>Data Transmission Security<br \/><\/strong>87 percent allowed data transmission with outdated transport encryption, which encourages data theft.<\/p>\n<p><strong>Obsolete Applications<br \/><\/strong>At least one application with a potential security vulnerability of high criticality was found in 29 percent. Applications with missing security updates are a welcome gateway for attackers.<\/p>\n<p><strong>GDPR Compliance<br \/><\/strong>45 percent of major cities used tracking cookies without user permission. In these cases, warnings and fines can threaten.<\/p>\n<p>\u00a0<\/p>\n<h3>Gain Insight into Your Organization's External IT Attack Surface<\/h3>\n<p>IT managers do their best to ensure the IT security of their systems. But how can the current status of IT security performance be continuously proven? With LocateRisk's IT security analysis, it's quick and easy. See for yourself: Interested organizations can receive a security assessment of their IT landscape including a 30-minute insight into the detailed analysis free of charge at: Tel. 06151 6290246 or e-mail to: em@LocateRisk.com<\/p>\n<p>\u00a0<\/p>\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"it-sicherheit-automobilzulieferer\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>I agree to the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_blank\" rel=\"noreferrer noopener\">privacy policy.<\/a> read<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Schedule a Live Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>IT-Sicherheit f\u00fcr Automobilzulieferer: Vorausschauend Cyber-Risiken minimieren Zulieferer der Automobilindustrie sind dauerhaft im Visier von Angreifern. Durch ihre enge Verzahnung mit den Herstellern gelten sie als leichtes Ziel mit gro\u00dfem Einfluss auf die Lieferkette. Eine St\u00f6rung im Betrieb, eine Produktionsunterbrechung oder ein Stillstand k\u00f6nnen verheerende Auswirkungen haben und sind ein ideales Druckmittel f\u00fcr L\u00f6segeld. F\u00fcr die [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4061,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4046","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Sicherheit: Automobilzulieferer - LocateRisk<\/title>\n<meta name=\"description\" content=\"F\u00fcr Zulieferer der Automobilindustrie ist ein hohes IT-Sicherheitsniveau essenziell. Das gilt auch f\u00fcr die externe, digitalen Angriffsfl\u00e4chen. IT-Sicherheitsanalysen sorgen f\u00fcr die n\u00f6tige Transparenz.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/it-sicherheit-automobilzulieferer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Sicherheit: Automobilzulieferer - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"F\u00fcr Zulieferer der Automobilindustrie ist ein hohes IT-Sicherheitsniveau essenziell. Das gilt auch f\u00fcr die externe, digitalen Angriffsfl\u00e4chen. IT-Sicherheitsanalysen sorgen f\u00fcr die n\u00f6tige Transparenz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/it-sicherheit-automobilzulieferer\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-03T16:31:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-automobilzulieferer\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-automobilzulieferer\\\/\",\"name\":\"IT-Sicherheit: Automobilzulieferer - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-automobilzulieferer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-automobilzulieferer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/IT-Sicherheit-Automobilzulieferer-1.png\",\"datePublished\":\"2022-08-03T12:14:07+00:00\",\"dateModified\":\"2022-08-03T16:31:12+00:00\",\"description\":\"F\u00fcr Zulieferer der Automobilindustrie ist ein hohes IT-Sicherheitsniveau essenziell. Das gilt auch f\u00fcr die externe, digitalen Angriffsfl\u00e4chen. IT-Sicherheitsanalysen sorgen f\u00fcr die n\u00f6tige Transparenz.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-automobilzulieferer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-automobilzulieferer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-automobilzulieferer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/IT-Sicherheit-Automobilzulieferer-1.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/IT-Sicherheit-Automobilzulieferer-1.png\",\"width\":1080,\"height\":460,\"caption\":\"Photo by thisisengineering-raeng\\\/Unsplash\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-automobilzulieferer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Sicherheit: Automobilzulieferer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT security: Automotive suppliers - LocateRisk","description":"A high level of IT security is essential for suppliers to the automotive industry. This also applies to external, digital attack surfaces. IT security analyses provide the necessary transparency.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/it-sicherheit-automobilzulieferer\/","og_locale":"en_US","og_type":"article","og_title":"IT-Sicherheit: Automobilzulieferer - LocateRisk","og_description":"F\u00fcr Zulieferer der Automobilindustrie ist ein hohes IT-Sicherheitsniveau essenziell. Das gilt auch f\u00fcr die externe, digitalen Angriffsfl\u00e4chen. IT-Sicherheitsanalysen sorgen f\u00fcr die n\u00f6tige Transparenz.","og_url":"https:\/\/locaterisk.com\/en\/it-sicherheit-automobilzulieferer\/","og_site_name":"LocateRisk","article_modified_time":"2022-08-03T16:31:12+00:00","og_image":[{"width":1080,"height":460,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/it-sicherheit-automobilzulieferer\/","url":"https:\/\/locaterisk.com\/it-sicherheit-automobilzulieferer\/","name":"IT security: Automotive suppliers - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-automobilzulieferer\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-automobilzulieferer\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1.png","datePublished":"2022-08-03T12:14:07+00:00","dateModified":"2022-08-03T16:31:12+00:00","description":"A high level of IT security is essential for suppliers to the automotive industry. This also applies to external, digital attack surfaces. IT security analyses provide the necessary transparency.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-automobilzulieferer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/it-sicherheit-automobilzulieferer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/it-sicherheit-automobilzulieferer\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2022\/08\/IT-Sicherheit-Automobilzulieferer-1.png","width":1080,"height":460,"caption":"Photo by thisisengineering-raeng\/Unsplash"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/it-sicherheit-automobilzulieferer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"IT-Sicherheit: Automobilzulieferer"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages\/4046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=4046"}],"version-history":[{"count":34,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages\/4046\/revisions"}],"predecessor-version":[{"id":4806,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages\/4046\/revisions\/4806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/4061"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=4046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}