{"id":1556,"date":"2021-09-15T11:14:00","date_gmt":"2021-09-15T11:14:00","guid":{"rendered":"https:\/\/locaterisk.com\/?p=1556"},"modified":"2025-08-08T07:25:33","modified_gmt":"2025-08-08T07:25:33","slug":"it-sicherheit-der-deutschen-bundestagsparteien","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/fr\/it-sicherheit-der-deutschen-bundestagsparteien\/","title":{"rendered":"Statistiques sur la s\u00e9curit\u00e9 informatique : les parties"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Retour au blog                <a href=\"https:\/\/locaterisk.com\/fr\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Statistiques sur la s\u00e9curit\u00e9 informatique : les parties <br><\/h1>\r\n            <p class=\"paragraph\"><strong>Enqu\u00eate 1er semestre 2021.<\/strong> La situation des donn\u00e9es est plus que grave ! Malheureusement, elle refl\u00e8te exactement ce que de nombreuses entreprises et autorit\u00e9s ont d\u00e9j\u00e0 appris \u00e0 leurs d\u00e9pens. Les mesures de s\u00e9curit\u00e9 informatique - lorsqu'elles existent - ne suffisent pas. Le risque d'\u00eatre victime d'une cyber-attaque augmente. <meta charset=\"utf-8\">Une raison suffisante pour examiner de plus pr\u00e8s la situation actuelle de la s\u00e9curit\u00e9 informatique en Allemagne. \u00c0 l'approche des \u00e9lections f\u00e9d\u00e9rales, nous commen\u00e7ons par les neuf partis du Bundestag.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-LocateRisk_2-1024x576.jpg\" alt=\"\" class=\"wp-image-2286\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-LocateRisk_2-1024x576.jpg 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-LocateRisk_2-300x169.jpg 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-LocateRisk_2-768x432.jpg 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-LocateRisk_2-1536x864.jpg 1536w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-LocateRisk_2-18x10.jpg 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-LocateRisk_2.jpg 1911w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n<h3>Analyse des risques informatiques des partis politiques ayant un si\u00e8ge au Bundestag allemand<\/h3>\n<p>En vue des \u00e9lections f\u00e9d\u00e9rales, le Centre national de recherche en cybers\u00e9curit\u00e9 appliqu\u00e9e, qui fait partie de la Fraunhofer Gesellschaft, a organis\u00e9 une conf\u00e9rence sur la cybers\u00e9curit\u00e9. <a href=\"https:\/\/www.athene-center.de\/\" target=\"_blank\" rel=\"noopener\">ATHENE<\/a>&nbsp; Fin 2020, les syst\u00e8mes informatiques des partis politiques allemands ont \u00e9t\u00e9 soumis \u00e0 un audit et des vuln\u00e9rabilit\u00e9s graves ont \u00e9t\u00e9 identifi\u00e9es. En outre, Arne Sch\u00f6nbohm, directeur de l'Office f\u00e9d\u00e9ral de la s\u00e9curit\u00e9 informatique (BSI), a offert son soutien et ses conseils pour se prot\u00e9ger des cybercriminels. Le site <a href=\"https:\/\/www.wiwo.de\/politik\/deutschland\/dringender-handlungsbedarf-experten-offenbaren-wie-leicht-deutschlands-parteien-opfer-von-hackern-werden-koennen\/27401302.html\" target=\"_blank\" rel=\"noopener\">WirtschaftsWoche<\/a> a consacr\u00e9 un article \u00e0 ce sujet en juillet 2021.<\/p>\n<p>Nous voulions savoir ce qu'il en \u00e9tait aujourd'hui de la situation en mati\u00e8re de s\u00e9curit\u00e9 et avons analys\u00e9 la surface d'attaque informatique des neuf partis du Bundestag en ao\u00fbt dans une perspective externe. Pour ce faire, nous avons recens\u00e9 les syst\u00e8mes identifiables sur le r\u00e9seau et v\u00e9rifi\u00e9 de mani\u00e8re non invasive leurs points critiques en mati\u00e8re de s\u00e9curit\u00e9. Dans huit cat\u00e9gories, en se basant sur les normes des autorit\u00e9s et de l'industrie disponibles publiquement. Les r\u00e9sultats nous ont alors surpris. Le score de s\u00e9curit\u00e9 \u00e9tait en moyenne de 46 sur une \u00e9chelle de 0 \u00e0 100. A partir d'une valeur de 80, nous parlons d'une s\u00e9curit\u00e9 informatique ad\u00e9quate.&nbsp;<\/p>\n<h3>Situation insuffisante en mati\u00e8re de s\u00e9curit\u00e9 informatique<\/h3>\n<p>En mati\u00e8re de cybers\u00e9curit\u00e9, les partis du Bundestag ont encore beaucoup de progr\u00e8s \u00e0 faire. Voici un extrait de trois cat\u00e9gories pour lesquelles il est n\u00e9cessaire d'agir et quel r\u00f4le cela joue pour la s\u00e9curit\u00e9.<\/p>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"428\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/A_IT-Sicherheitsanlayse-der-Parteien-1024x428.jpg\" alt=\"\" class=\"wp-image-2265\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/A_IT-Sicherheitsanlayse-der-Parteien-1024x428.jpg 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/A_IT-Sicherheitsanlayse-der-Parteien-300x126.jpg 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/A_IT-Sicherheitsanlayse-der-Parteien-768x321.jpg 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/A_IT-Sicherheitsanlayse-der-Parteien-1536x643.jpg 1536w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/A_IT-Sicherheitsanlayse-der-Parteien-2048x857.jpg 2048w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/A_IT-Sicherheitsanlayse-der-Parteien-18x8.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n<h3>Premi\u00e8rement : la cybers\u00e9curit\u00e9 dans l'envoi de courriers \u00e9lectroniques<\/h3>\n<p>Le courrier \u00e9lectronique des partis est-il bien prot\u00e9g\u00e9 contre l'usurpation d'identit\u00e9 ? Est-il possible d'envoyer des spams en masse en leur nom - par exemple pour r\u00e9cup\u00e9rer des donn\u00e9es sensibles ? L'envoi de courriers \u00e9lectroniques non prot\u00e9g\u00e9s permet des attaques de spam et d'hame\u00e7onnage au nom du ou des domaines du parti. Si celles-ci r\u00e9ussissent, les pirates peuvent acc\u00e9der \u00e0 d'autres syst\u00e8mes et les infecter avec des logiciels malveillants. Chez 89% des parties contr\u00f4l\u00e9es, des configurations DNS pouvant favoriser des probl\u00e8mes de s\u00e9curit\u00e9 critiques ont \u00e9t\u00e9 trouv\u00e9es. C'est pourquoi nous recommandons \u00e0 tous les responsables informatiques de v\u00e9rifier les param\u00e8tres de s\u00e9curit\u00e9 de leurs fournisseurs de domaines.<\/p>\n<h3>Deuxi\u00e8mement, la cybers\u00e9curit\u00e9 dans le transport des donn\u00e9es<\/h3>\n<p>Le flux de donn\u00e9es entre les collaborateurs du parti et les partenaires de communication ou commerciaux est-il prot\u00e9g\u00e9 contre l'acc\u00e8s par des tiers ? Dans cette cat\u00e9gorie, la qualit\u00e9 du cryptage des connexions de donn\u00e9es est \u00e9valu\u00e9e. La validit\u00e9 et la version des certificats de s\u00e9curit\u00e9 ainsi que leur mise en \u0153uvre correcte sont \u00e9galement v\u00e9rifi\u00e9es. L'examen a r\u00e9v\u00e9l\u00e9 que toutes les parties transmettaient des donn\u00e9es avec un cryptage de transport en partie non autoris\u00e9 et qu'elles avaient clairement besoin d'\u00eatre optimis\u00e9es. En effet, la transmission non s\u00e9curis\u00e9e de contenus sensibles sur le r\u00e9seau facilite le vol de donn\u00e9es et met en danger la s\u00e9curit\u00e9 des parties ainsi que celle des entreprises en r\u00e9seau.<\/p>\n<h3>Troisi\u00e8mement, les violations de la protection des donn\u00e9es<\/h3>\n<p>Y a-t-il des infractions au RGPD de la part des parties ? Le r\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es (RGPD) place les donn\u00e9es \u00e0 caract\u00e8re personnel sous une protection particuli\u00e8re. Celles-ci sont trait\u00e9es chaque fois que les noms, les adresses (IP), les coordonn\u00e9es bancaires, les donn\u00e9es relatives \u00e0 la sant\u00e9, les donn\u00e9es de localisation et bien d'autres informations sont collect\u00e9es aupr\u00e8s des visiteurs d'un site web. Dans cette cat\u00e9gorie, nous avons analys\u00e9 tous les sites web de partis identifi\u00e9s quant aux violations fondamentales du RGPD. Dans 44 % des cas, nous avons d\u00e9couvert des situations limites par rapport au RGPD, qui n\u00e9cessitent un contr\u00f4le manuel. Pour rappel, les banni\u00e8res de cookies et les cookies de marketing, de suivi ou d'affiliation install\u00e9s de mani\u00e8re ill\u00e9gale sont passibles d'avertissements et d'amendes \u00e9lev\u00e9es.<\/p>\n<h3>Conclusion : Chers partis, nous devons parler !<\/h3>\n<p>En raison de l'annonce faite il y a plusieurs mois par <a href=\"https:\/\/www.athene-center.de\/aktuelles\/news\/fraunhofer-studie-zur-it-sicherheit-der-parteien-1424\" target=\"_blank\" rel=\"noopener\">ATHENE<\/a> Nous avions esp\u00e9r\u00e9 que les r\u00e9sultats de l'analyse au moment de l'\u00e9lection seraient au moins \u00e0 moiti\u00e9 satisfaisants. Il s'av\u00e8re aujourd'hui qu'il faut encore - ou \u00e0 nouveau - agir. C'est pourquoi nous souhaitons \u00e9galement offrir notre soutien et mettons volontiers \u00e0 la disposition des responsables informatiques concern\u00e9s l'analyse correspondante pour acc\u00e9l\u00e9rer l'\u00e9limination des points faibles.<\/p>\n<\/p>\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"it-sicherheit-der-deutschen-bundestagsparteien\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">Je suis d'accord avec la politique de confidentialit\u00e9<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Demander une d\u00e9mo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Quelle est la situation de la cybers\u00e9curit\u00e9 en Allemagne ? Quelle est la situation des partis politiques ? Notre enqu\u00eate montre qu'il y a encore beaucoup de marge de progression. <\/p>","protected":false},"author":8,"featured_media":2289,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[10,4,8,9],"class_list":["post-1556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-bundestagsparteien","tag-it-sicherheit","tag-it-sicherheitsanalysen","tag-parteien"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Statistiken zur IT-Sicherheit: Die Parteien - LocateRisk<\/title>\n<meta name=\"description\" content=\"Wie steht es um die Cybersicherheit in Deutschland? Wie ist die Lage bei den Parteien? Unsere Erhebung zeigt, es gibt noch viel Luft nach oben. Mehr erfahren\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/it-sicherheit-der-deutschen-bundestagsparteien\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Statistiken zur IT-Sicherheit: Die Parteien - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Wie steht es um die Cybersicherheit in Deutschland? Wie ist die Lage bei den Parteien? Unsere Erhebung zeigt, es gibt noch viel Luft nach oben. Mehr erfahren\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/it-sicherheit-der-deutschen-bundestagsparteien\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-15T11:14:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:25:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-_LocateRisk-Teaser.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1075\" \/>\n\t<meta property=\"og:image:height\" content=\"1075\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"Statistiken zur IT-Sicherheit: Die Parteien\",\"datePublished\":\"2021-09-15T11:14:00+00:00\",\"dateModified\":\"2025-08-08T07:25:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/\"},\"wordCount\":686,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Big-Data-Analyse-_LocateRisk-Teaser.jpg\",\"keywords\":[\"Bundestagsparteien\",\"IT-Sicherheit\",\"IT-Sicherheitsanalysen\",\"Parteien\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/\",\"name\":\"Statistiken zur IT-Sicherheit: Die Parteien - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Big-Data-Analyse-_LocateRisk-Teaser.jpg\",\"datePublished\":\"2021-09-15T11:14:00+00:00\",\"dateModified\":\"2025-08-08T07:25:33+00:00\",\"description\":\"Wie steht es um die Cybersicherheit in Deutschland? Wie ist die Lage bei den Parteien? Unsere Erhebung zeigt, es gibt noch viel Luft nach oben. Mehr erfahren\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Big-Data-Analyse-_LocateRisk-Teaser.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Big-Data-Analyse-_LocateRisk-Teaser.jpg\",\"width\":1075,\"height\":1075,\"caption\":\"Big-Data-Analyse IT-Sicherheit Teaser\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-sicherheit-der-deutschen-bundestagsparteien\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Statistiken zur IT-Sicherheit: Die Parteien\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Statistiques sur la s\u00e9curit\u00e9 informatique : les parties - LocateRisk","description":"Quelle est la situation de la cybers\u00e9curit\u00e9 en Allemagne ? Quelle est la situation des partis politiques ? Notre enqu\u00eate montre qu'il y a encore beaucoup de marge de progression. En savoir plus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/it-sicherheit-der-deutschen-bundestagsparteien\/","og_locale":"fr_FR","og_type":"article","og_title":"Statistiken zur IT-Sicherheit: Die Parteien - LocateRisk","og_description":"Wie steht es um die Cybersicherheit in Deutschland? Wie ist die Lage bei den Parteien? Unsere Erhebung zeigt, es gibt noch viel Luft nach oben. Mehr erfahren","og_url":"https:\/\/locaterisk.com\/fr\/it-sicherheit-der-deutschen-bundestagsparteien\/","og_site_name":"LocateRisk","article_published_time":"2021-09-15T11:14:00+00:00","article_modified_time":"2025-08-08T07:25:33+00:00","og_image":[{"width":1075,"height":1075,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-_LocateRisk-Teaser.jpg","type":"image\/jpeg"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Kristina Breuer","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"Statistiken zur IT-Sicherheit: Die Parteien","datePublished":"2021-09-15T11:14:00+00:00","dateModified":"2025-08-08T07:25:33+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/"},"wordCount":686,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-_LocateRisk-Teaser.jpg","keywords":["Bundestagsparteien","IT-Sicherheit","IT-Sicherheitsanalysen","Parteien"],"articleSection":["Blog post"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/","url":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/","name":"Statistiques sur la s\u00e9curit\u00e9 informatique : les parties - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-_LocateRisk-Teaser.jpg","datePublished":"2021-09-15T11:14:00+00:00","dateModified":"2025-08-08T07:25:33+00:00","description":"Quelle est la situation de la cybers\u00e9curit\u00e9 en Allemagne ? Quelle est la situation des partis politiques ? Notre enqu\u00eate montre qu'il y a encore beaucoup de marge de progression. En savoir plus","breadcrumb":{"@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-_LocateRisk-Teaser.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/09\/Big-Data-Analyse-_LocateRisk-Teaser.jpg","width":1075,"height":1075,"caption":"Big-Data-Analyse IT-Sicherheit Teaser"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/it-sicherheit-der-deutschen-bundestagsparteien\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Statistiken zur IT-Sicherheit: Die Parteien"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/1556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=1556"}],"version-history":[{"count":109,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/1556\/revisions"}],"predecessor-version":[{"id":6299,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/1556\/revisions\/6299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/2289"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=1556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/categories?post=1556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/tags?post=1556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}