{"id":18275,"date":"2023-07-13T20:02:07","date_gmt":"2023-07-13T18:02:07","guid":{"rendered":"https:\/\/www.m-q.ch\/de\/?p=18275"},"modified":"2023-07-07T15:04:43","modified_gmt":"2023-07-07T13:04:43","slug":"why-cybersecurity-needs-ethical-hacking","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/warum-cybersecurity-ethical-hacking-braucht\/","title":{"rendered":"Why Cybersecurity Needs Ethical Hacking"},"content":{"rendered":"<div class=\"swpm-post-not-logged-in-msg\">You need to be logged in to view this content. Please <a class=\"swpm-login-link\" href=\"https:\/\/www.m-q.ch\/en\/login\/\">Log In<\/a>. Not a Member? <a href=\"https:\/\/www.m-q.ch\/en\/register\/\">Join Us<\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>Before targeting a specific company, attackers simply wait to see in which organization their phishing email will succeed. Outside experts, known as ethical hackers or white hats, can perform penetration tests to put the vulnerability of a company's IT to the test. But many organizations, whether private or public, balk at the effort and expense. <\/p>","protected":false},"author":364,"featured_media":18274,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4443,4],"tags":[3560,5242,5435,3326],"class_list":["post-18275","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-abo","category-risikomanagement","tag-cybersicherheit","tag-ethical-hacking","tag-penentration-tests","tag-risikomanagement"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Warum Cybersecurity Ethical Hacking braucht - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Viele Organisationen, ob privatwirtschaftlich oder \u00f6ffentlich, scheuen den Aufwand und die Kosten von Ethical Hacking.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/why-cybersecurity-needs-ethical-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Warum Cybersecurity Ethical Hacking braucht - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"Viele Organisationen, ob privatwirtschaftlich oder \u00f6ffentlich, scheuen den Aufwand und die Kosten von Ethical Hacking.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/why-cybersecurity-needs-ethical-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-13T18:02:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"978\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Redaktion\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Redaktion\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/\"},\"author\":{\"name\":\"Redaktion\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/cf30c7b4028fe33150e62c36185ab577\"},\"headline\":\"Warum Cybersecurity Ethical Hacking braucht\",\"datePublished\":\"2023-07-13T18:02:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/\"},\"wordCount\":1188,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg\",\"keywords\":[\"Cybersicherheit\",\"Ethical Hacking\",\"Penentration Tests\",\"Risikomanagement\"],\"articleSection\":[\"Abo +\",\"Risikomanagement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/\",\"url\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/\",\"name\":\"Warum Cybersecurity Ethical Hacking braucht - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg\",\"datePublished\":\"2023-07-13T18:02:07+00:00\",\"description\":\"Viele Organisationen, ob privatwirtschaftlich oder \u00f6ffentlich, scheuen den Aufwand und die Kosten von Ethical Hacking.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg\",\"width\":1400,\"height\":978,\"caption\":\"Ethical Hacking ist unverzichtbar, um die Cyberresilienz einer Organisation auf ein solides Niveau zu heben.\u00a9 Depositphotos.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Warum Cybersecurity Ethical Hacking braucht\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/cf30c7b4028fe33150e62c36185ab577\",\"name\":\"Redaktion\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2b5af0e473e62154d7b4354a7dec14e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2b5af0e473e62154d7b4354a7dec14e?s=96&d=mm&r=g\",\"caption\":\"Redaktion\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Cybersecurity Needs Ethical Hacking - MQ Management and Quality","description":"Many organizations, whether private sector or public, shy away from the effort and expense of ethical hacking.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/why-cybersecurity-needs-ethical-hacking\/","og_locale":"en_US","og_type":"article","og_title":"Warum Cybersecurity Ethical Hacking braucht - MQ Management und Qualit\u00e4t","og_description":"Viele Organisationen, ob privatwirtschaftlich oder \u00f6ffentlich, scheuen den Aufwand und die Kosten von Ethical Hacking.","og_url":"https:\/\/www.m-q.ch\/en\/why-cybersecurity-needs-ethical-hacking\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2023-07-13T18:02:07+00:00","og_image":[{"width":1400,"height":978,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg","type":"image\/jpeg"}],"author":"Redaktion","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Redaktion","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/"},"author":{"name":"Redaktion","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/cf30c7b4028fe33150e62c36185ab577"},"headline":"Warum Cybersecurity Ethical Hacking braucht","datePublished":"2023-07-13T18:02:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/"},"wordCount":1188,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg","keywords":["Cybersicherheit","Ethical Hacking","Penentration Tests","Risikomanagement"],"articleSection":["Abo +","Risikomanagement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/","url":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/","name":"Why Cybersecurity Needs Ethical Hacking - MQ Management and Quality","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg","datePublished":"2023-07-13T18:02:07+00:00","description":"Many organizations, whether private sector or public, shy away from the effort and expense of ethical hacking.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2023\/07\/RISK_Ventum_Bild_management_qualitaet_52447-scaled.jpg","width":1400,"height":978,"caption":"Ethical Hacking ist unverzichtbar, um die Cyberresilienz einer Organisation auf ein solides Niveau zu heben.\u00a9 Depositphotos.com"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/warum-cybersecurity-ethical-hacking-braucht\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Warum Cybersecurity Ethical Hacking braucht"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/cf30c7b4028fe33150e62c36185ab577","name":"Editorial office","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2b5af0e473e62154d7b4354a7dec14e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2b5af0e473e62154d7b4354a7dec14e?s=96&d=mm&r=g","caption":"Redaktion"},"url":"https:\/\/www.m-q.ch\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/18275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/364"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=18275"}],"version-history":[{"count":2,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/18275\/revisions"}],"predecessor-version":[{"id":18334,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/18275\/revisions\/18334"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media\/18274"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=18275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=18275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=18275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}