{"id":3434,"date":"2026-04-23T12:59:22","date_gmt":"2026-04-23T10:59:22","guid":{"rendered":"https:\/\/visit.astrum-it.de\/?post_type=news&#038;p=3434"},"modified":"2026-04-28T09:54:32","modified_gmt":"2026-04-28T07:54:32","slug":"cyberresilienz","status":"publish","type":"news","link":"https:\/\/visit.astrum-it.de\/en\/news\/cyberresilienz\/","title":{"rendered":"Why holistic security is critical to business today \u2013 and how VISIT can help"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1200\" height=\"668\" alt=\"Matrix-Bildschirm und Laptop im Dunkeln als Symbol f\u00fcr Cyber-Resilienz.\" title=\"Cyberresilienz\" src=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Cyberresilienz-1-1200x668.jpg\" class=\"img-responsive wp-image-3380\" srcset=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Cyberresilienz-1-200x111.jpg 200w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Cyberresilienz-1-400x223.jpg 400w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Cyberresilienz-1-600x334.jpg 600w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Cyberresilienz-1-800x445.jpg 800w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Cyberresilienz-1-1200x668.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-1\" style=\"--awb-margin-top:20px;\"><p>At the same time, recent studies show that security incidents can be triggered not only by external hacker attacks but also by carelessness or misconduct within the company itself.<\/p>\n<p>Against this backdrop, <strong>cyber resilience<\/strong> is becoming increasingly important from a strategic perspective. It is no longer just a matter of preventing attacks\u2014but of maintaining business operations even in the event of a crisis and being able to quickly restore them.<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><h2>What Cyber Resilience Really Means<\/h2>\n<p>While traditional cybersecurity aims to protect IT systems against attacks, cyber resilience takes a broader approach. It combines:<\/p>\n<ul>\n<li>Preventive technical and organizational security measures<\/li>\n<li>Structured cyber risk management<\/li>\n<li>Measures for detecting, analyzing, and containing security incidents<\/li>\n<li>Business continuity strategies<\/li>\n<li>Backup and recovery plans<\/li>\n<li>Clearly defined reporting and communication processes<\/li>\n<\/ul>\n<p>The goal is to<strong> prevent security incidents, detect them, manage them in a controlled manner, and quickly restore<\/strong> operational capability.<\/p>\n<h5>Cyber resilience therefore affects not only the IT department, but the entire company\u2014from management and compliance officers to operational departments such as reception, production, and logistics.<\/h5>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:var(--awb-color3);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-selfhosted-video\" style=\"margin-bottom:20px;max-width:100%;\"><div class=\"video-wrapper\"><video playsinline=\"true\" width=\"100%\" style=\"object-fit: cover;\" loop=\"true\" poster=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Vorschau-Cyberresilienz-1-1200x675.png\" preload=\"auto\" controls=\"1\"><source src=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Video_KRITIS_final_low_nur-daniel-mit-outro.mp4\" type=\"video\/mp4\">Sorry, your browser doesn&#039;t support embedded videos.<\/video><\/div><\/div><div class=\"fusion-text fusion-text-3\"><h2>Regulatory Framework: KRITIS and NIS-2<\/h2>\n<p>For certain companies, cyber resilience is now a legal requirement:<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h3>KRITIS \u2013 Operators of critical infrastructure<\/h3>\n<p>KRITIS refers to facilities and organizations that are essential to the functioning of society, such as those in the following sectors:<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><ul>\n<li>Energy<\/li>\n<li>Water<\/li>\n<li>Health<\/li>\n<li>Transportation<\/li>\n<li>Finance<\/li>\n<li>Digital Infrastructure<\/li>\n<\/ul>\n<\/div><div class=\"fusion-text fusion-text-6\"><p>The KRITIS Framework Act defines additional obligations, including:<\/p>\n<ul>\n<li>Reporting obligations to government authorities<\/li>\n<li>Business continuity management<\/li>\n<li>Physical security requirements<\/li>\n<li>Guidelines for personnel and crisis management<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"600\" height=\"338\" alt=\"Die Collage zeigt verschiedene Branchen.\" title=\"Branchencollage\" src=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Branchencollage-600x338.jpg\" class=\"img-responsive wp-image-3374\" srcset=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Branchencollage-200x113.jpg 200w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Branchencollage-400x225.jpg 400w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Branchencollage-600x338.jpg 600w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Branchencollage-800x450.jpg 800w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/04\/Branchencollage.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><h3>NIS-2 \u2013 Expansion of Cybersecurity Requirements<\/h3>\n<p>At the same time, the NIS-2 Implementation Act transposes the EU Directive (EU 2022\/2555) into German law. NIS-2 significantly expands the scope of affected companies\u2014even beyond traditional KRITIS operators.<\/p>\n<p><strong>Key provisions include:<\/strong><\/p>\n<ul>\n<li>stricter requirements for IT security measures<\/li>\n<li>mandatory cyber risk management<\/li>\n<li>expanded reporting obligations for security incidents<\/li>\n<li>a cross-threat approach to protecting network and information systems as well as their physical environment<\/li>\n<\/ul>\n<p><strong>It is important to note<\/strong> that many of the required measures have been considered established best practices in information security for years. What is new, above all, is the binding nature, systematic approach, and documentation requirements.<\/p>\n<p>For many companies, this means reviewing existing security concepts, developing them further in a structured manner, and embedding them within the organization.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><h2>Cyber resilience doesn\u2019t end at the firewall: Physical security as a risk factor<\/h2>\n<p>Security incidents aren\u2019t caused exclusively by digital attacks. Physical access often plays a decisive role\u2014whether through:<\/p>\n<ul>\n<li>inadequately screened visitors<\/li>\n<li>third-party companies and service providers<\/li>\n<li>former employees<\/li>\n<li>tampering with sensitive areas such as server rooms<\/li>\n<li>uncontrolled logistics processes<\/li>\n<\/ul>\n<p>Studies also show that a significant proportion of security-related incidents can be attributed to internal misconduct\u2014whether intentional or unintentional. Modern cyber resilience therefore always takes into account the <strong>physical environment of IT systems<\/strong>.<\/p>\n<\/div><div class=\"fusion-text fusion-text-9\"><h2>Visitor Management and Access Control as a Cornerstone of Modern Cyber Resilience<\/h2>\n<p>The NIS 2 Directive explicitly requires appropriate technical, operational, and organizational measures to protect network and information systems\u2014including their physical environment.<\/p>\n<p><strong>Access control and visitor management systems play a key role in this regard:<\/strong><\/p>\n<ul>\n<li>Control and documentation of access rights<\/li>\n<li>Identity verification of external individuals<\/li>\n<li>Time- and location-restricted access permissions<\/li>\n<li>Traceability of all visitor movements<\/li>\n<li>Integration into existing security and IT infrastructures<\/li>\n<\/ul>\n<p>In this way, they help effectively prevent unauthorized access to sensitive areas and associated IT systems.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:0px;--awb-background-color:var(--awb-color3);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><h2>VISIT by ASTRUM IT: Connected Security for Businesses<\/h2>\n<p>With VISIT, the modular visitor management and yard management platform from ASTRUM IT, businesses can achieve transparency, control, and reliable documentation in sensitive areas.<\/p>\n<h3>Features to Strengthen Cyber Resilience<\/h3>\n<p><strong>Among other things, VISIT enables:<\/strong><\/p>\n<ul>\n<li>Capture and validation of identification documents<\/li>\n<li>Structured pre-registration and approval processes<\/li>\n<li>Customized access procedures for areas requiring special protection<\/li>\n<li>Real-time monitoring of visitors and suppliers<\/li>\n<li>Audit-proof documentation of all entries<\/li>\n<li>Integration into existing security and compliance structures<\/li>\n<\/ul>\n<p>Especially in regulated industries\u2014such as manufacturing, medical technology, research, finance, or public institutions\u2014VISIT helps systematically implement legal requirements and successfully pass audits.<\/p>\n<h3>Security in Logistics: Yard Management as Risk Control<\/h3>\n<p>Logistical processes also represent potential vulnerabilities. Uncontrolled vehicle movements or delivery processes can not only disrupt operations but also create security-critical risks.<\/p>\n<p>VISIT expands the security concept to include structured yard management:<\/p>\n<ul>\n<li>Control of vehicle movements on the premises<\/li>\n<li>Documentation of deliveries and pickups<\/li>\n<li>Transparent processes for third-party companies and freight forwarders<\/li>\n<li>Traceable procedures for audits and compliance checks<\/li>\n<li>This ensures cyber resilience throughout<\/li>\n<\/ul>\n<h4>This supports cyber resilience throughout the entire value chain.<\/h4>\n<\/div><div class=\"fusion-text fusion-text-11\" style=\"--awb-margin-top:20px;\"><h2>Comprehensive Cyber Resilience with ASTRUM IT<\/h2>\n<p>Cyber resilience requires more than just individual technical measures. It is achieved through the interplay of:<\/p>\n<ul>\n<li>Secure-by-design software engineering<\/li>\n<li>ISO-certified security processes (including ISO\/IEC 27001)<\/li>\n<li>Hosting and IT operations on German, GDPR-compliant servers<\/li>\n<li>Structured IT service management<\/li>\n<li>Emergency and recovery plans<\/li>\n<li>Physical security architecture<\/li>\n<\/ul>\n<p><strong>With its full-cycle approach, ASTRUM IT supports companies from consulting through development and hosting to support\u2014with the goal of ensuring sustainable digital vitality.<\/strong><\/p>\n<\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"500\" height=\"333\" title=\"ISO27001\" src=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/ISO27001-1.png\" alt class=\"img-responsive wp-image-3333\" srcset=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/ISO27001-1-200x133.png 200w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/ISO27001-1-400x266.png 400w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/ISO27001-1.png 500w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 500px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"500\" height=\"333\" title=\"ISO9001\" src=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/ISO9001-1.png\" alt class=\"img-responsive wp-image-3331\" srcset=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/ISO9001-1-200x133.png 200w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/ISO9001-1-400x266.png 400w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/ISO9001-1.png 500w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 500px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"500\" height=\"333\" title=\"TR-Testmarkl\" src=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/TR-Testmarkl-1.png\" alt class=\"img-responsive wp-image-3339\" srcset=\"https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/TR-Testmarkl-1-200x133.png 200w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/TR-Testmarkl-1-400x266.png 400w, https:\/\/visit.astrum-it.de\/wp-content\/uploads\/2026\/03\/TR-Testmarkl-1.png 500w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 500px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:var(--awb-color8);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12\" style=\"--awb-text-color:var(--awb-color1);\"><h2><span style=\"color: #ffffff;\">Conclusion: Cyber Resilience as a Strategic Management Task<\/span><\/h2>\n<p>Cyber resilience is not merely a technical discipline. It is a <strong>company-wide management<\/strong> issue. Regulatory requirements such as KRITIS and NIS-2 increase the pressure to act\u2014but even setting these aside, the following remains true:<\/p>\n<p><strong>Without structured security measures and robust processes, long-term competitiveness cannot be guaranteed.<\/strong><\/p>\n<p>With integrated solutions like VISIT and an experienced, ISO-certified IT partner, companies can lay the foundation for sustainable, verifiable, and future-proof cyber resilience.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"featured_media":3376,"template":"","meta":{"_acf_changed":false,"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","_links_to":"","_links_to_target":""},"mediathek-kategorie":[50],"class_list":["post-3434","news","type-news","status-publish","has-post-thumbnail","hentry","mediathek-kategorie-technology-insights-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/news\/3434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/types\/news"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/media\/3376"}],"wp:attachment":[{"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/media?parent=3434"}],"wp:term":[{"taxonomy":"mediathek-kategorie","embeddable":true,"href":"https:\/\/visit.astrum-it.de\/en\/wp-json\/wp\/v2\/mediathek-kategorie?post=3434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}