{"id":200,"date":"2015-04-06T10:13:24","date_gmt":"2015-04-06T09:13:24","guid":{"rendered":"https:\/\/wildhaber.com\/?p=200"},"modified":"2015-04-28T11:16:15","modified_gmt":"2015-04-28T10:16:15","slug":"wieso-investitionen-in-die-informationssicherheit-nutzlos-verpuffen","status":"publish","type":"post","link":"https:\/\/wildhaber.com\/index.php\/wieso-investitionen-in-die-informationssicherheit-nutzlos-verpuffen\/","title":{"rendered":"Wieso Investitionen in die Informationssicherheit nutzlos verpuffen."},"content":{"rendered":"<p>J\u00e4hrlich werden weltweit ca. 80 Mia. USD f\u00fcr Informationssicherheitsmassnahmen ausgegeben. Das meiste davon verpufft im leeren Raum und hinterl\u00e4sst keinerlei positive Wirkung. In einem Artikel aus dem Jahr 2011 haben wir (Rolf Oppliger und meine Wenigkeit) versucht darzustellen, wieso dem so ist. Eigentlich sind alle Aussagen im Artikel leider auch heute noch g\u00fcltig.<\/p>\n<p>&#8222;There are many misconceptions in computer and information security that deceive the view on reality. But to make meaningful security decisions, it is important and key to know and truly understand the misconceptions commonly found in computer and information security. In this article, we outline and discuss the misconceptions we think are most common and influential. We divide the misconceptions into three groups, namely social and behavioral misconceptions, technical misconceptions, and false estimations The aim of the article is to prepare the stage and provide a better understanding for all questions and answers related to computer and information security.&#8220;<\/p>\n<p>Artikel: <a href=\"https:\/\/wildhaber.com\/?p=274\">Common misconceptions in Information Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>J\u00e4hrlich werden weltweit ca. 80 Mia. USD f\u00fcr Informationssicherheitsmassnahmen ausgegeben. Das meiste davon verpufft im leeren Raum und hinterl\u00e4sst keinerlei &hellip; <a href=\"https:\/\/wildhaber.com\/index.php\/wieso-investitionen-in-die-informationssicherheit-nutzlos-verpuffen\/\" class=\"more-link\"><span class=\"more-button\">Continue reading &gt;<span class=\"screen-reader-text\">Wieso Investitionen in die Informationssicherheit nutzlos verpuffen.<\/span><\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-200","post","type-post","status-publish","format-standard","hentry","category-informationssicherheit"],"_links":{"self":[{"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/posts\/200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/comments?post=200"}],"version-history":[{"count":4,"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/posts\/200\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/posts\/200\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/media?parent=200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/categories?post=200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wildhaber.com\/index.php\/wp-json\/wp\/v2\/tags?post=200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}