{"id":4534,"date":"2026-04-07T08:01:19","date_gmt":"2026-04-07T06:01:19","guid":{"rendered":"https:\/\/www.astrum-it.de\/digitaler-totalausfall-warum-it-sicherheit-chefsache-ist\/"},"modified":"2026-04-14T13:16:20","modified_gmt":"2026-04-14T11:16:20","slug":"digitaler-totalausfall-warum-it-sicherheit-chefsache-ist","status":"publish","type":"post","link":"https:\/\/www.astrum-it.de\/en\/digitaler-totalausfall-warum-it-sicherheit-chefsache-ist\/","title":{"rendered":"\u201cTotal Digital Collapse\u201d \u2013 Why IT Security Is a Top Priority"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1456px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><div id=\"attachment_4426\" style=\"width: 227px\" class=\"wp-caption alignright\"><img decoding=\"async\" aria-describedby=\"caption-attachment-4426\" class=\"wp-image-4426\" src=\"https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-scaled.jpg\" alt=\"\" width=\"217\" height=\"272\" srcset=\"https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-200x250.jpg 200w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-400x500.jpg 400w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-600x750.jpg 600w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-768x960.jpg 768w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-800x1000.jpg 800w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-819x1024.jpg 819w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-1200x1500.jpg 1200w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-1229x1536.jpg 1229w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-1639x2048.jpg 1639w, https:\/\/www.astrum-it.de\/wp-content\/uploads\/2026\/03\/astrum_it-3463-scaled.jpg 2048w\" sizes=\"(max-width: 217px) 100vw, 217px\" \/><p id=\"caption-attachment-4426\" class=\"wp-caption-text\">Head of Managed Services &amp; Senior IT Consultant at ASTRUM IT<\/p><\/div>\n<p><strong>Patrick, what motivated you to write a book on IT security for small and medium-sized businesses right now?<\/strong><\/p>\n<p><strong>Patrick:<\/strong> In my day-to-day work at ASTRUM IT, I see that many small and medium-sized businesses still believe they are \u201ctoo small\u201d to be targeted by attackers. The opposite is true: SMEs in particular often lack clear structures and emergency plans. With this book, I want to show that cybersecurity is an existential management issue. It\u2019s about understanding where liability risks lurk and how to build true digital resilience through pragmatic steps. That\u2019s exactly what we implement every day in projects at ASTRUM IT.<\/p>\n<p><strong>You say: \u201cIT security isn\u2019t a project, but a mindset.\u201d What does that mean in the day-to-day operations of a company?<\/strong><\/p>\n<p><strong>Patrick:<\/strong> Sustainable IT security only works if it\u2019s conceived as an ongoing process: clear responsibilities, recurring audits, and emergency plans that are tested time and again. This means that risk analyses or backup tests are firmly integrated into the annual cycle. At ASTRUM IT, we support this with structured IT security audits and cybersecurity consulting, while always keeping a close eye on the current threat landscape and regulatory developments.<\/p>\n<p><strong>How do you specifically view ASTRUM IT\u2019s role for small and medium-sized businesses?<\/strong><\/p>\n<p><strong>Patrick:<\/strong> ASTRUM IT supports companies from analysis through to operational implementation: We identify which systems are business-critical and where vulnerabilities lie. This ranges from managed services to disaster recovery plans. We explicitly do not see ourselves as NIS 2 consultants and do not actively offer this type of consulting. Our focus is on operational IT. However, as a responsible partner, it is our duty to protect our clients: If we notice vulnerabilities in day-to-day operations that are relevant to NIS 2, for example, we proactively point out this potential for improvement. If questions arise, we then support our clients on a case-by-case basis and to the best of our ability.<\/p>\n<p><strong>In your experience, in which areas do small and medium-sized businesses most often underestimate the risks?<\/strong><\/p>\n<p><strong>Patrick:<\/strong> A major issue is preparing for emergencies. Many companies have backups, but rarely test how quickly they can actually get back up and running. Another risk is a lack of security awareness. At ASTRUM IT, we lead by example and rely on intensive awareness initiatives as well as technical safeguards for our own employees to ensure that our team remains part of a robust security chain. We incorporate this internal experience into our general consulting for clients to raise awareness of human risk factors there as well.<\/p>\n<p><strong>What are the three measures that business owners should tackle first today?<\/strong><\/p>\n<p><strong>Patrick:<\/strong> First, an honest assessment of business-critical systems is needed. Building on that, tested backup strategies and clear responsibilities should be established. As a third step, I recommend an external perspective, such as through an IT security audit. Here, operational requirements\u2014as also stipulated by the NIS 2 Directive\u2014are naturally incorporated into our work, as we always take a holistic view of security.<\/p>\n<p><strong>What is your key message to small and medium-sized businesses?<\/strong><\/p>\n<p><strong>Patrick<\/strong>: Today, IT security is key to a company\u2019s long-term viability. It must be understood as an integral part of the corporate culture and treated by management as a leadership priority. Investing in IT security today strengthens a company\u2019s ability to innovate and compete.<\/p>\n<p><strong>Thank you very much, Patrick, for the interview!<\/strong><\/p>\n<p>It\u2019s time to act fast! Make your company resilient against digital threats. For more information about our services, please visit our <a href=\"https:\/\/www.astrum-it.de\/en\/products\/it-hosting\/\" target=\"_blank\" rel=\"noopener\">Webseite.<\/a><\/p>\n<p><strong>About the Author<\/strong><\/p>\n<p>Author: Patrick Fabisz<br \/>\nTitle: \u201cDigital Total Collapse \u2013 Why IT Security Is Not an IT Project, but a Survival Strategy for Small and Medium-Sized Businesses\u201d<br \/>\nPublication Date: April 1, 2026<br \/>\nAvailable on Amazon<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":4425,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[120],"tags":[],"class_list":["post-4534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogbeitrag-interview-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/posts\/4534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/comments?post=4534"}],"version-history":[{"count":2,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/posts\/4534\/revisions"}],"predecessor-version":[{"id":4536,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/posts\/4534\/revisions\/4536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/media\/4425"}],"wp:attachment":[{"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/media?parent=4534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/categories?post=4534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.astrum-it.de\/en\/wp-json\/wp\/v2\/tags?post=4534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}