{"id":16178,"date":"2025-06-13T09:45:32","date_gmt":"2025-06-13T07:45:32","guid":{"rendered":"https:\/\/cosh.de\/cybersecurity-2025-new-threats-new-solutions\/"},"modified":"2025-11-24T10:50:24","modified_gmt":"2025-11-24T08:50:24","slug":"cybersecurity-2025-new-threats-new-solutions","status":"publish","type":"post","link":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/","title":{"rendered":"Cybersecurity 2025 \u2013 New threats, new solutions"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top:40px;--awb-margin-top-small:0px;--awb-margin-bottom-small:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:45;line-height:1.14;\"><h1 class=\"reader-article-header__title\" dir=\"ltr\"><span data-scaffold-immersive-reader-title=\"\">Cybersecurity 2025 \u2013 New threats, new solutions<\/span><\/h1><\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p id=\"ember358\" class=\"ember-view reader-text-block__paragraph\">The digital threat landscape is no longer a marginal issue \u2013 it is part of our everyday reality. This is particularly evident in small and medium-sized enterprises: while IT structures are becoming more complex and interconnected, security concepts often lag behind technological progress. <\/p>\n<p id=\"ember359\" class=\"ember-view reader-text-block__paragraph\">2025 is just around the corner \u2013 and with it come new challenges: technical, organisational and legal.<\/p>\n<p id=\"ember360\" class=\"ember-view reader-text-block__paragraph\">The CosH special feature provides an overview of the most important developments, explains why traditional security concepts are often no longer sufficient, and presents practical approaches for making your company more resilient.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:40px;--awb-margin-top-small:0px;--awb-margin-bottom-small:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\"><h2 id=\"ember362\" class=\"ember-view reader-text-block__heading-2\">\ud83d\udea8 1. The threat continues to evolve \u2013 faster than many companies can keep up with<\/h2><\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p id=\"ember363\" class=\"ember-view reader-text-block__paragraph\">Cybercrime has long since become professionalised. Particularly on the rise: <\/p>\n<p id=\"ember364\" class=\"ember-view reader-text-block__paragraph\">Ransomware-as-a-Service (RaaS): Criminal groups offer ready-made attack packages, including support and payment systems \u2013 a \u2018business model\u2019 that was already responsible for over 60% of all ransomware attacks in 2024.<\/p>\n<p id=\"ember365\" class=\"ember-view reader-text-block__paragraph\">Deepfakes and AI-generated phishing emails: Attacks are becoming more credible because artificial intelligence is capable of imitating communication styles \u2013 even internally. This dramatically increases the success rate of social engineering. <\/p>\n<p id=\"ember366\" class=\"ember-view reader-text-block__paragraph\">Supply chain attacks: Attackers target not only the company itself, but also its IT service providers, software suppliers or hosting partners \u2013 often the weakest link in the chain.<\/p>\n<p id=\"ember367\" class=\"ember-view reader-text-block__paragraph\">So the big question is no longer: Is my company a target? But rather: Am I prepared when the attack comes?<\/p>\n<h2 id=\"ember368\" class=\"ember-view reader-text-block__heading-2\">\ud83d\udd10 3. Zero Trust, XDR, MFA &amp; Co. \u2013 How does modern security work?<\/h2>\n<p>Moderne Sicherheitsarchitekturen setzen nicht mehr auf Perimeterverteidigung allein. Stattdessen dominieren diese Ans\u00e4tze: <\/p>\n<p>\ud83d\udd10 3. Zero Trust, XDR, MFA &amp; Co. \u2013 How does modern security work? <\/p>\n<p>Extended Detection &amp; Response (XDR): Traditional AV solutions are no longer sufficient. XDR combines telemetry data from various IT areas (network, endpoints, cloud) to detect even complex attack patterns in real time. <\/p>\n<p>MFA, PAM &amp; BYOD rules: Multi-factor authentication, privileged access management and a clear policy for private devices (Bring Your Own Device) will become the minimum standard in 2025.<\/p>\n<p>What is often overlooked is that the most effective measures are not necessarily the most expensive ones, but rather those that are best integrated into processes.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:40px;--awb-margin-top-small:0px;--awb-margin-bottom-small:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\"><h2 id=\"ember379\" class=\"ember-view reader-text-block__heading-2\">\u2696\ufe0f 4. Regulation on the rise: NIS2, DORA and Co.<\/h2><\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3\"><p id=\"ember380\" class=\"ember-view reader-text-block__paragraph\">In 2025, several regulatory requirements will come into force that may also affect small and medium-sized enterprises \u2013 either directly or indirectly through their role as service providers or suppliers:<\/p>\n<p id=\"ember381\" class=\"ember-view reader-text-block__paragraph\">NIS2 Directive (EU): Far-reaching requirements for cybersecurity, risk analysis, business continuity and reporting obligations. It affects not only critical infrastructures, but also many medium-sized companies \u2013 often without their knowledge.  <strong>What NIS2 requires:<\/strong><\/p>\n<ul>\n<li>Clear responsibilities for IT security<\/li>\n<li>Risk management &amp; business continuity<\/li>\n<li>Incident response processes<\/li>\n<li>Documentation and reporting requirements<\/li>\n<li>Regular review and improvement of protective measures<\/li>\n<\/ul>\n<p id=\"ember383\" class=\"ember-view reader-text-block__paragraph\">And what happens if you don&#8217;t comply: hefty fines of up to \u20ac10 million or 2% of annual turnover \u2013 and potentially massive damage to your reputation.<\/p>\n<p id=\"ember384\" class=\"ember-view reader-text-block__paragraph\">Digital Operational Resilience Act (DORA): IT risk management is becoming a legally binding discipline for all companies in the financial and insurance sectors, including IT service providers in these industries.<\/p>\n<p id=\"ember385\" class=\"ember-view reader-text-block__paragraph\">Cyber Resilience Act: Emphasises the responsibility of manufacturers and software providers to deliver secure products. This affects entire ecosystems and supply chains. <\/p>\n<p id=\"ember386\" class=\"ember-view reader-text-block__paragraph\">Actively addressing these requirements is important not only for compliance reasons, but also because they provide a useful framework for IT security strategy.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:40px;--awb-margin-top-small:0px;--awb-margin-bottom-small:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\"><h2 id=\"ember388\" class=\"ember-view reader-text-block__heading-2\">\ud83d\udcc9 5. The human factor: Lack of expertise becomes a risk<\/h2><\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-4\"><p id=\"ember389\" class=\"ember-view reader-text-block__paragraph\">Despite technical advances, one thing remains constant:<\/p>\n<p id=\"ember390\" class=\"ember-view reader-text-block__paragraph\"><strong>The biggest weak spot is sitting in front of the screen.<\/strong> This applies to social engineering as well as to faulty configurations.<\/p>\n<p id=\"ember391\" class=\"ember-view reader-text-block__paragraph\">But who should take responsibility when:<\/p>\n<ul>\n<li>IT managers repairing printers, patching servers and maintaining ERP systems all at the same time?<\/li>\n<li>No time for further training?<\/li>\n<li>Is there a lack of awareness on the part of management?<\/li>\n<\/ul>\n<p id=\"ember393\" class=\"ember-view reader-text-block__paragraph\">According to a Bitkom study from 2024, 68% of SMEs say that they cannot build up enough security expertise internally. And yet many companies shy away from seeking external support \u2013 for fear of costs, loss of control or complexity. <\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2560\" height=\"1707\" title=\"Data center technician runs code\" src=\"https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/data-center-techniker-fuhrt-den-code-aus-scaled.jpg\" data-orig-src=\"https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/data-center-techniker-fuhrt-den-code-aus-scaled.jpg\" alt class=\"lazyload img-responsive wp-image-15469\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%272560%27%20height%3D%271707%27%20viewBox%3D%270%200%202560%201707%27%3E%3Crect%20width%3D%272560%27%20height%3D%271707%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/data-center-techniker-fuhrt-den-code-aus-200x133.jpg 200w, https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/data-center-techniker-fuhrt-den-code-aus-400x267.jpg 400w, https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/data-center-techniker-fuhrt-den-code-aus-600x400.jpg 600w, https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/data-center-techniker-fuhrt-den-code-aus-800x533.jpg 800w, https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/data-center-techniker-fuhrt-den-code-aus-1200x800.jpg 1200w, https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/data-center-techniker-fuhrt-den-code-aus-scaled.jpg 2560w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-5 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:40px;--awb-margin-top-small:0px;--awb-margin-bottom-small:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\"><h2 id=\"ember394\" class=\"ember-view reader-text-block__heading-2\">\ud83d\udee0\ufe0f 6. Pragmatic solutions \u2013 what really works<\/h2><\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-5\"><p id=\"ember395\" class=\"ember-view reader-text-block__paragraph\">We see in practice that the decisive difference is not the budget, but the courage to implement a structured approach. What works is not a huge project, but a clear, realistic roadmap. <\/p>\n<h3 id=\"ember396\" class=\"ember-view reader-text-block__heading-3\">1. Security assessment as a starting point<\/h3>\n<p id=\"ember397\" class=\"ember-view reader-text-block__paragraph\">Where do you really stand? Which systems are exposed? What are your crown jewels? A technical and organisational check provides the answers.   <\/p>\n<h3 id=\"ember398\" class=\"ember-view reader-text-block__heading-3\">2. Prioritise protective measures<\/h3>\n<ul>\n<li>Not all at once. Instead: <\/li>\n<li>MFA (multi-factor authentication)<\/li>\n<li>Patch management<\/li>\n<li>network segmentation<\/li>\n<li>Logging &amp; Monitoring<\/li>\n<li>Basic protection for end devices<\/li>\n<\/ul>\n<h3 id=\"ember400\" class=\"ember-view reader-text-block__heading-3\">3. Raising awareness \u2013 internally and externally<\/h3>\n<p id=\"ember401\" class=\"ember-view reader-text-block__paragraph\">Training courses are not a chore, but a survival strategy. A well-informed employee is more valuable than any firewall. <\/p>\n<h3 id=\"ember402\" class=\"ember-view reader-text-block__heading-3\">4. Clarify responsibilities<\/h3>\n<p id=\"ember403\" class=\"ember-view reader-text-block__paragraph\">Who makes decisions in an emergency? Who reports incidents? IT security requires defined roles \u2013 not gut feelings.  <\/p>\n<h3 id=\"ember404\" class=\"ember-view reader-text-block__heading-3\">5. Understand external support not as a weakness, but as a strategy<\/h3>\n<p id=\"ember405\" class=\"ember-view reader-text-block__paragraph\">An external IT security partner can provide specialised expertise \u2013 scalable, controllable, efficient. From 24\/7 monitoring and vulnerability scans to support with NIS2 audits. <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:40px;--awb-margin-top-small:0px;--awb-margin-bottom-small:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\"><h2 id=\"ember406\" class=\"ember-view reader-text-block__heading-2\">\ud83e\udde9 Case study 7 (November 2023\/2024)<\/h2><\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-6\"><p id=\"ember407\" class=\"ember-view reader-text-block__paragraph\">Company: Nordwest Handel AG, Dortmund Industry: Wholesale &amp; logistics Size: approx. 1,200 employees, over 1,000 specialist retail partners Date of incident: November 2023 Type of attack: Ransomware attack with partial data encryption<\/p>\n<h3 id=\"ember408\" class=\"ember-view reader-text-block__heading-3\">Causes &amp; weak points<\/h3>\n<p id=\"ember409\" class=\"ember-view reader-text-block__paragraph\">Specific technical details have not been made public for understandable reasons. However, it is known that the attack was not carried out via social engineering or phishing, but presumably via a technical vulnerability in the system \u2013 an indication of exploitable attack paths in third-party software or insufficiently secured services. <\/p>\n<h3 id=\"ember410\" class=\"ember-view reader-text-block__heading-3\">Consequences of the attack:<\/h3>\n<ul>\n<li>Temporary shutdown of essential IT services<\/li>\n<li>Slowed down or halted ordering and logistics processes<\/li>\n<li>Emergency operation with manual support<\/li>\n<li>High organisational effort required for recovery<\/li>\n<li>Internal resource allocation and external costs<\/li>\n<li>The financial damage has not been publicly quantified, but is likely to have been significant given the company&#8217;s role in the supply chain.<\/li>\n<\/ul>\n<h3 id=\"ember412\" class=\"ember-view reader-text-block__heading-3\">Lessons learned from the incident:<\/h3>\n<p id=\"ember413\" class=\"ember-view reader-text-block__paragraph\">This incident exemplifies:<\/p>\n<ul>\n<li><strong>Even established B2B companies with their own IT teams are vulnerable.<\/strong><\/li>\n<li>Small and medium-sized enterprises are increasingly becoming the focus of professional cybercriminals.<\/li>\n<li>Protection provided by traditional antivirus solutions is no longer sufficient.<\/li>\n<li>Without contingency plans, backup strategies and external support, companies can quickly become overwhelmed.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:40px;--awb-margin-top-small:0px;--awb-margin-bottom-small:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\"><h3 id=\"ember415\" class=\"ember-view reader-text-block__heading-3\">\ud83d\udccc Conclusion: IT security in 2025 is a management decision<\/h3>\n<p>&nbsp;<\/p><\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-7\"><p id=\"ember416\" class=\"ember-view reader-text-block__paragraph\">Cybersecurity is not purely a technical task. It is part of modern corporate management \u2013 just like finance or legal affairs. <\/p>\n<p id=\"ember417\" class=\"ember-view reader-text-block__paragraph\">Those who act in a structured manner now can build an effective defence with limited resources.<\/p>\n<p id=\"ember418\" class=\"ember-view reader-text-block__paragraph\">And those who wait will eventually no longer be able to act \u2013 they will have to react.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top:40px;--awb-margin-top-small:0px;--awb-margin-bottom-small:20px;\"><div class=\"title-sep-container title-sep-container-left fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><span class=\"awb-title-spacer fusion-no-large-visibility fusion-no-medium-visibility fusion-no-small-visibility\"><\/span><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.2;\"><h3 id=\"ember420\" class=\"ember-view reader-text-block__heading-3\">\u2705 Put your IT security to the test now<\/h3><\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e2e2e2;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-8\"><p id=\"ember421\" class=\"ember-view reader-text-block__paragraph\">Whether it&#8217;s NIS2, new threats from AI or simply the desire for greater stability \u2013 we help you to develop your IT security in a realistic and practical way.<\/p>\n<p id=\"ember422\" class=\"ember-view reader-text-block__paragraph\">Let us work together to identify your greatest risks \u2013 but also your best opportunities.<\/p>\n<p id=\"ember423\" class=\"ember-view reader-text-block__paragraph\">\ud83d\udce7 Write to us: <a class=\"PDuZgTTJniSbcpBCzeHjMlcFFsgCxLEhvw \" tabindex=\"0\" href=\"mailto:vertrieb@cosh.de\" target=\"_self\" data-test-app-aware-link=\"\">vertrieb@cosh.de<\/a><\/p>\n<p id=\"ember424\" class=\"ember-view reader-text-block__paragraph\">\ud83d\udcde Or speak to us directly: +49 911 477 595 00<\/p>\n<p id=\"ember425\" class=\"ember-view reader-text-block__paragraph\">CosH Consulting GmbH \u2013 Your partner for IT infrastructure, security and compliance in medium-sized businesses.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":15467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[398,399,700],"tags":[722,442,720,406,724,403,727,721,729,728],"class_list":["post-16178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-news","category-topics-specials","tag-best-practice","tag-cybersecurity-en","tag-daily-work-routine","tag-digital-en","tag-innovation","tag-it-en","tag-online","tag-opportunities","tag-solutions","tag-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity 2025 \u2013 New threats, new solutions - CosH Information Technology<\/title>\n<meta name=\"description\" content=\"Artificial intelligence offers companies a multitude of advantages that go far beyond mere process automation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity 2025 \u2013 New threats, new solutions - CosH Information Technology\" \/>\n<meta property=\"og:description\" content=\"Artificial intelligence offers companies a multitude of advantages that go far beyond mere process automation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"CosH Information Technology\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-13T07:45:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-24T08:50:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Erik\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erik\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/\"},\"author\":{\"name\":\"Erik\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\"},\"headline\":\"Cybersecurity 2025 \u2013 New threats, new solutions\",\"datePublished\":\"2025-06-13T07:45:32+00:00\",\"dateModified\":\"2025-11-24T08:50:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/\"},\"wordCount\":3866,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png\",\"keywords\":[\"best practice\",\"cybersecurity\",\"daily work routine\",\"digital\",\"Innovation\",\"IT\",\"online\",\"opportunities\",\"solutions\",\"threats\"],\"articleSection\":[\"Blog posts\",\"News\",\"Topics Specials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/\",\"url\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/\",\"name\":\"Cybersecurity 2025 \u2013 New threats, new solutions - CosH Information Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png\",\"datePublished\":\"2025-06-13T07:45:32+00:00\",\"dateModified\":\"2025-11-24T08:50:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\"},\"description\":\"Artificial intelligence offers companies a multitude of advantages that go far beyond mere process automation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png\",\"contentUrl\":\"https:\\\/\\\/cosh.de\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cosh.de\\\/en\\\/cybersecurity-2025-new-threats-new-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cosh.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity 2025 \u2013 New threats, new solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#website\",\"url\":\"https:\\\/\\\/cosh.de\\\/\",\"name\":\"CosH Information Technology\",\"description\":\"IT-Dienstleister &amp; Service Provider N\u00fcrnberg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cosh.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cosh.de\\\/#\\\/schema\\\/person\\\/a0bf426883c8134df8afaa886fd91e1d\",\"name\":\"Erik\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g\",\"caption\":\"Erik\"},\"sameAs\":[\"https:\\\/\\\/cosh.de\"],\"url\":\"https:\\\/\\\/cosh.de\\\/en\\\/author\\\/e-kapfensteincosh-de\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity 2025 \u2013 New threats, new solutions - CosH Information Technology","description":"Artificial intelligence offers companies a multitude of advantages that go far beyond mere process automation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity 2025 \u2013 New threats, new solutions - CosH Information Technology","og_description":"Artificial intelligence offers companies a multitude of advantages that go far beyond mere process automation.","og_url":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/","og_site_name":"CosH Information Technology","article_published_time":"2025-06-13T07:45:32+00:00","article_modified_time":"2025-11-24T08:50:24+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png","type":"image\/png"}],"author":"Erik","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Erik","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/#article","isPartOf":{"@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/"},"author":{"name":"Erik","@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d"},"headline":"Cybersecurity 2025 \u2013 New threats, new solutions","datePublished":"2025-06-13T07:45:32+00:00","dateModified":"2025-11-24T08:50:24+00:00","mainEntityOfPage":{"@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/"},"wordCount":3866,"commentCount":0,"image":{"@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png","keywords":["best practice","cybersecurity","daily work routine","digital","Innovation","IT","online","opportunities","solutions","threats"],"articleSection":["Blog posts","News","Topics Specials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/","url":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/","name":"Cybersecurity 2025 \u2013 New threats, new solutions - CosH Information Technology","isPartOf":{"@id":"https:\/\/cosh.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/#primaryimage"},"image":{"@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png","datePublished":"2025-06-13T07:45:32+00:00","dateModified":"2025-11-24T08:50:24+00:00","author":{"@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d"},"description":"Artificial intelligence offers companies a multitude of advantages that go far beyond mere process automation.","breadcrumb":{"@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/#primaryimage","url":"https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png","contentUrl":"https:\/\/cosh.de\/wp-content\/uploads\/2025\/06\/Wie-Teams-die-Herrschaft-ueber-die-Telefonwelt-uebernimmt-1.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/cosh.de\/en\/cybersecurity-2025-new-threats-new-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cosh.de\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity 2025 \u2013 New threats, new solutions"}]},{"@type":"WebSite","@id":"https:\/\/cosh.de\/#website","url":"https:\/\/cosh.de\/","name":"CosH Information Technology","description":"IT-Dienstleister &amp; Service Provider N\u00fcrnberg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cosh.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cosh.de\/#\/schema\/person\/a0bf426883c8134df8afaa886fd91e1d","name":"Erik","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a14a3fbf34ab6a1c50a52bbd767dca7a6892c30567cc97e95ae848947ed235aa?s=96&d=mm&r=g","caption":"Erik"},"sameAs":["https:\/\/cosh.de"],"url":"https:\/\/cosh.de\/en\/author\/e-kapfensteincosh-de\/"}]}},"_links":{"self":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/16178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/comments?post=16178"}],"version-history":[{"count":3,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/16178\/revisions"}],"predecessor-version":[{"id":16181,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/posts\/16178\/revisions\/16181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media\/15467"}],"wp:attachment":[{"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/media?parent=16178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/categories?post=16178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cosh.de\/en\/wp-json\/wp\/v2\/tags?post=16178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}