{"id":7192,"date":"2025-03-19T21:47:18","date_gmt":"2025-03-19T21:47:18","guid":{"rendered":"https:\/\/fuentis.com\/?p=7192"},"modified":"2025-04-15T21:16:57","modified_gmt":"2025-04-15T21:16:57","slug":"wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms","status":"publish","type":"post","link":"https:\/\/fuentis.com\/en\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/","title":{"rendered":"WiBA: The way in the Basis-Absicherung with IT-Grundschutz und ISMS"},"content":{"rendered":"<h1>WiBA: The way in the Basis-Absicherung with IT-Grundschutz und ISMS<\/h1>\n<p>&nbsp;<\/p>\n<p><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"7201\" data-permalink=\"https:\/\/fuentis.com\/en\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/weg-in-die-basis-absicerhung-mit-der-fuentis-suite\/\" data-orig-file=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?fit=1200%2C630&amp;ssl=1\" data-orig-size=\"1200,630\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Die fuentis AG ist Ihr Partner, um mit der WiBA zu starten.\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Die fuentis AG ist Ihr Partner, um mit der WiBA zu starten.&lt;\/p&gt;\" data-large-file=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?fit=1024%2C538&amp;ssl=1\" class=\"wp-image-7201 aligncenter\" src=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?resize=655%2C345&#038;ssl=1\" alt=\"Mit fuentis als Partner l\u00e4sst sich WiBA digital und effizient umsetzen. Die Kombination aus strukturiertem ISMS-Tool und fachkundiger Beratung hilft Organisationen, WiBA nicht nur erfolgreich einzuf\u00fchren, sondern auch langfristig ein starkes Informationssicherheitsmanagement aufzubauen. Der erste Schritt in die Basis-Absicherung war noch nie so einfach!\" width=\"655\" height=\"345\" srcset=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?resize=300%2C158&amp;ssl=1 300w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?resize=1024%2C538&amp;ssl=1 1024w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?resize=768%2C403&amp;ssl=1 768w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?resize=18%2C9&amp;ssl=1 18w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?resize=24%2C13&amp;ssl=1 24w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?resize=36%2C19&amp;ssl=1 36w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?resize=48%2C25&amp;ssl=1 48w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/Weg-in-die-Basis-Absicerhung-mit-der-fuentis-Suite.jpg?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 655px) 100vw, 655px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>What is WiBA?<\/h2>\n<p class=\"p1\">WiBA stands for \u201cWeg in die Basis-Absicherung\u201d and provides a low-threshold entry point into information security. It was developed to help organizations\u2014especially small and medium-sized enterprises (SMEs) and public authorities\u2014implement recognized security standards such as IT-Grundschutz with minimal effort.<\/p>\n<p class=\"p1\">WiBA focuses on practical measures that offer high security value and can be implemented quickly and efficiently. It includes 19 topic-specific checklists with a total of around 250 audit questions, which can be processed either in Word format or using a specialized tool.<\/p>\n<p>&nbsp;<\/p>\n<h3>Who is WiBA suitable for?<\/h3>\n<p class=\"p1\">WiBA is particularly aimed at small and medium-sized organizations looking for a structured and practical introduction to information security. It is especially suitable for:<\/p>\n<ul>\n<li class=\"p1\">Municipal administrations and public institutions that want to establish an effective ISMS with limited resources.<\/li>\n<li class=\"p1\">Small and medium-sized enterprises (SMEs) seeking a cost-effective way to protect against cyberattacks and data loss.<\/li>\n<li class=\"p1\">Organizations without a dedicated IT security department that need a simple and adaptable approach to implementing IT-Grundschutz.<\/li>\n<\/ul>\n<p class=\"p1\">WiBA enables these organizations to gradually familiarize themselves with the fundamentals of information security without immediately introducing a full-fledged ISMS according to ISO 27001 or IT-Grundschutz. It helps achieve quick wins, reduce security risks, and ensure compliance with legal requirements.<\/p>\n<p class=\"p1\">Although the use of WiBA is not mandatory, the BSI particularly recommends its adoption by municipalities and public authorities to effectively protect themselves against cyber threats.<\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"p1\">Benefits of WiBA \u2013 A Simple Entry into Information Security<\/h3>\n<p class=\"p1\">WiBA was specifically developed to provide smaller municipalities with a low-threshold entry into information security. It can be independently implemented by municipalities and is not restricted to any particular federal state. The focus is on achieving a higher level of security with minimal effort, without requiring in-depth methodological knowledge.<\/p>\n<p class=\"p1\">A key advantage of WiBA is its alignment with IT-Grundschutz. It is based on the IT-Grundschutz profile \u201cBasic Protection for Municipal Administrations\u201d, where requirements have been carefully selected, abstracted, and consolidated to create a practical solution tailored to the specific needs of smaller administrations.<\/p>\n<p class=\"p1\">Additional Benefits of WiBA:<\/p>\n<ul>\n<li class=\"p1\">Easy implementation \u2013 No complex planning, design, or documentation required<\/li>\n<li class=\"p1\">No prior methodological knowledge needed \u2013 Direct entry without a complex ISMS methodology<\/li>\n<li class=\"p1\">Focus on quick wins \u2013 Immediate improvements in information security<\/li>\n<li class=\"p1\">Minimal administrative effort \u2013 Targeted measures without unnecessary bureaucracy<\/li>\n<li class=\"p1\">Practical support through checklists \u2013 Includes topic-specific audit questions for easy implementation<\/li>\n<li class=\"p1\">Clear and concrete audit questions \u2013 Well-defined requirements for direct application<\/li>\n<li class=\"p1\">Flexible use \u2013 Can be applied regardless of the federal state or specific IT infrastructure<\/li>\n<\/ul>\n<p class=\"p1\">Thanks to this practical approach, WiBA is particularly suitable for municipalities that lack the extensive resources needed for a full-fledged ISMS according to ISO 27001 or IT-Grundschutz, but still want to improve their information security efficiently.<\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"p1\">How fuentis AG Supports the Implementation of WiBA<\/h3>\n<p class=\"p1\">fuentis AG supports not only municipalities but also all organizations looking to start their information security journey with WiBA. With an intuitive ISMS tool and years of expertise, fuentis enables an efficient implementation of WiBA requirements\u2014regardless of company size or industry. This ensures a structured and gradual development towards a comprehensive ISMS following recognized security standards.<\/p>\n<p class=\"p1\">Beyond providing an ISMS tool, fuentis AG also offers access to a large network of experts who can guide organizations through the process. Our goal is to make the path to basic security as simple and accessible as possible.<\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"p1\">Conclusion: WiBA as a Simple Entry into Information Security<\/h3>\n<p class=\"p1\">WiBA offers a low-threshold, practical solution that provides organizations with a structured entry into information security. Thanks to its focused approach, clearly defined checklists, and low entry barriers, even smaller municipalities, SMEs, and organizations with limited IT security expertise can quickly achieve a higher level of security.<\/p>\n<p class=\"p1\">With fuentis as a partner, WiBA can be implemented digitally and efficiently. The combination of a structured ISMS tool and expert consulting helps organizations successfully adopt WiBA and build a strong, long-term information security management system. The first step toward basic security has never been easier!<\/p>","protected":false},"excerpt":{"rendered":"<p>WiBA: Der Weg zur Basis-Absicherung mit IT-Grundschutz und ISMS &nbsp; &nbsp; Was ist WiBA? WiBA steht f\u00fcr \u201cWeg in die Basis-Absicherung\u201d und bietet einen niedrigschwelligen Einstieg in die Informationssicherheit. Es wurde entwickelt, um Organisationen \u2013 insbesondere kleinere und mittlere Unternehmen sowie Beh\u00f6rden \u2013 dabei zu unterst\u00fctzen, anerkannte Sicherheitsstandards wie den IT-Grundschutz mit minimalem Aufwand umzusetzen. [&hellip;]<\/p>\n","protected":false},"author":249796503,"featured_media":7200,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[1],"tags":[],"class_list":["post-7192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>WiBA | IT-Grundschutz | ISMS<\/title>\n<meta name=\"description\" content=\"Entdecken Sie den \u201cWeg in die Basis-Absicherung\u201d (WiBA) als praxisnahen Einstieg in ein ISMS gem\u00e4\u00df IT-Grundschutz.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fuentis.com\/en\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WiBA: Der Weg zur Basis-Absicherung mit IT-Grundschutz und ISMS\" \/>\n<meta property=\"og:description\" content=\"Entdecken Sie den \u201cWeg in die Basis-Absicherung\u201d (WiBA) als praxisnahen Einstieg in ein ISMS gem\u00e4\u00df IT-Grundschutz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fuentis.com\/en\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/\" \/>\n<meta property=\"og:site_name\" content=\"fuentis\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/fuentisAG\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-19T21:47:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-15T21:16:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Srdan Manasijevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Entdecken Sie den \u201cWeg in die Basis-Absicherung\u201d (WiBA) als praxisnahen Einstieg in ein ISMS gem\u00e4\u00df IT-Grundschutz.\" \/>\n<meta name=\"twitter:creator\" content=\"@fuentisAG\" \/>\n<meta name=\"twitter:site\" content=\"@fuentisAG\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Srdan Manasijevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/\"},\"author\":{\"name\":\"Srdan Manasijevic\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/person\\\/b8e4b7a7ae41aff4c7a9849c181a65b8\"},\"headline\":\"WiBA: Der Weg zur Basis-Absicherung mit IT-Grundschutz und ISMS\",\"datePublished\":\"2025-03-19T21:47:18+00:00\",\"dateModified\":\"2025-04-15T21:16:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/\"},\"wordCount\":689,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/\",\"url\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/\",\"name\":\"WiBA | IT-Grundschutz | ISMS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1\",\"datePublished\":\"2025-03-19T21:47:18+00:00\",\"dateModified\":\"2025-04-15T21:16:57+00:00\",\"description\":\"Entdecken Sie den \u201cWeg in die Basis-Absicherung\u201d (WiBA) als praxisnahen Einstieg in ein ISMS gem\u00e4\u00df IT-Grundschutz.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1\",\"width\":1200,\"height\":630,\"caption\":\"Weg in die Basis-Absicherung\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/fuentis.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WiBA: Der Weg zur Basis-Absicherung mit IT-Grundschutz und ISMS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#website\",\"url\":\"https:\\\/\\\/fuentis.com\\\/\",\"name\":\"fuentis AG | fuentis Suite\",\"description\":\"Die IT-Compliance Plattform f\u00fcr ISO 27001, BSI IT-Grundschutz und Risikomanagement.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#organization\"},\"alternateName\":\"fuentis AG | Homepage\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fuentis.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#organization\",\"name\":\"fuentis AG\",\"alternateName\":\"fuentis\",\"url\":\"https:\\\/\\\/fuentis.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"fuentis AG\"},\"image\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/fuentisAG\\\/\",\"https:\\\/\\\/x.com\\\/fuentisAG\",\"https:\\\/\\\/mastodon.social\\\/@fuentisag\",\"https:\\\/\\\/de.linkedin.com\\\/company\\\/fuentis\",\"https:\\\/\\\/www.youtube.com\\\/@fuentisAG\",\"https:\\\/\\\/www.instagram.com\\\/fuentisag\\\/\"],\"description\":\"Fuentis vereint Cybersicherheit, Informationssicherheit und Datenschutz in einem Tool. Jetzt pers\u00f6nliches Angebot anfordern!\",\"email\":\"info@fuentis.com\",\"telephone\":\"+ 49 (331) 885 9211 -0\",\"legalName\":\"fuentis AG\",\"foundingDate\":\"2016-01-01\",\"vatID\":\"DE313123288\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/person\\\/b8e4b7a7ae41aff4c7a9849c181a65b8\",\"name\":\"Srdan Manasijevic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g\",\"caption\":\"Srdan Manasijevic\"},\"url\":\"https:\\\/\\\/fuentis.com\\\/en\\\/author\\\/srdan-manasijevic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"WiBA | IT-Grundschutz | ISMS","description":"Entdecken Sie den \u201cWeg in die Basis-Absicherung\u201d (WiBA) als praxisnahen Einstieg in ein ISMS gem\u00e4\u00df IT-Grundschutz.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fuentis.com\/en\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/","og_locale":"en_GB","og_type":"article","og_title":"WiBA: Der Weg zur Basis-Absicherung mit IT-Grundschutz und ISMS","og_description":"Entdecken Sie den \u201cWeg in die Basis-Absicherung\u201d (WiBA) als praxisnahen Einstieg in ein ISMS gem\u00e4\u00df IT-Grundschutz.","og_url":"https:\/\/fuentis.com\/en\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/","og_site_name":"fuentis","article_publisher":"https:\/\/www.facebook.com\/fuentisAG\/","article_published_time":"2025-03-19T21:47:18+00:00","article_modified_time":"2025-04-15T21:16:57+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp","type":"image\/webp"}],"author":"Srdan Manasijevic","twitter_card":"summary_large_image","twitter_description":"Entdecken Sie den \u201cWeg in die Basis-Absicherung\u201d (WiBA) als praxisnahen Einstieg in ein ISMS gem\u00e4\u00df IT-Grundschutz.","twitter_creator":"@fuentisAG","twitter_site":"@fuentisAG","twitter_misc":{"Written by":"Srdan Manasijevic","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/#article","isPartOf":{"@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/"},"author":{"name":"Srdan Manasijevic","@id":"https:\/\/fuentis.com\/#\/schema\/person\/b8e4b7a7ae41aff4c7a9849c181a65b8"},"headline":"WiBA: Der Weg zur Basis-Absicherung mit IT-Grundschutz und ISMS","datePublished":"2025-03-19T21:47:18+00:00","dateModified":"2025-04-15T21:16:57+00:00","mainEntityOfPage":{"@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/"},"wordCount":689,"commentCount":0,"publisher":{"@id":"https:\/\/fuentis.com\/#organization"},"image":{"@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1","articleSection":["Uncategorized"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/","url":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/","name":"WiBA | IT-Grundschutz | ISMS","isPartOf":{"@id":"https:\/\/fuentis.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/#primaryimage"},"image":{"@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1","datePublished":"2025-03-19T21:47:18+00:00","dateModified":"2025-04-15T21:16:57+00:00","description":"Entdecken Sie den \u201cWeg in die Basis-Absicherung\u201d (WiBA) als praxisnahen Einstieg in ein ISMS gem\u00e4\u00df IT-Grundschutz.","breadcrumb":{"@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/#primaryimage","url":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1","width":1200,"height":630,"caption":"Weg in die Basis-Absicherung"},{"@type":"BreadcrumbList","@id":"https:\/\/fuentis.com\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fuentis.com\/"},{"@type":"ListItem","position":2,"name":"WiBA: Der Weg zur Basis-Absicherung mit IT-Grundschutz und ISMS"}]},{"@type":"WebSite","@id":"https:\/\/fuentis.com\/#website","url":"https:\/\/fuentis.com\/","name":"fuentis AG | fuentis Suite","description":"Die IT-Compliance Plattform f\u00fcr ISO 27001, BSI IT-Grundschutz und Risikomanagement.","publisher":{"@id":"https:\/\/fuentis.com\/#organization"},"alternateName":"fuentis AG | Homepage","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fuentis.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fuentis.com\/#organization","name":"fuentis AG","alternateName":"fuentis","url":"https:\/\/fuentis.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fuentis.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"fuentis AG"},"image":{"@id":"https:\/\/fuentis.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/fuentisAG\/","https:\/\/x.com\/fuentisAG","https:\/\/mastodon.social\/@fuentisag","https:\/\/de.linkedin.com\/company\/fuentis","https:\/\/www.youtube.com\/@fuentisAG","https:\/\/www.instagram.com\/fuentisag\/"],"description":"Fuentis vereint Cybersicherheit, Informationssicherheit und Datenschutz in einem Tool. Jetzt pers\u00f6nliches Angebot anfordern!","email":"info@fuentis.com","telephone":"+ 49 (331) 885 9211 -0","legalName":"fuentis AG","foundingDate":"2016-01-01","vatID":"DE313123288","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/fuentis.com\/#\/schema\/person\/b8e4b7a7ae41aff4c7a9849c181a65b8","name":"Srdan Manasijevic","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g","caption":"Srdan Manasijevic"},"url":"https:\/\/fuentis.com\/en\/author\/srdan-manasijevic\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1",1200,630,false],"thumbnail":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=300%2C158&ssl=1",300,158,true],"medium_large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=768%2C403&ssl=1",768,403,true],"large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1024%2C538&ssl=1",1024,538,true],"1536x1536":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1",1200,630,true],"2048x2048":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1",1200,630,true],"trp-custom-language-flag":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=18%2C9&ssl=1",18,9,true],"newspack-article-block-landscape-large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=1200%2C630&ssl=1",1200,630,true],"newspack-article-block-portrait-large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=900%2C630&ssl=1",900,630,true],"newspack-article-block-square-large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=1200%2C630&ssl=1",1200,630,true],"newspack-article-block-landscape-medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=800%2C600&ssl=1",800,600,true],"newspack-article-block-portrait-medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=600%2C630&ssl=1",600,630,true],"newspack-article-block-square-medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=800%2C630&ssl=1",800,630,true],"newspack-article-block-landscape-intermediate":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=600%2C450&ssl=1",600,450,true],"newspack-article-block-portrait-intermediate":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=450%2C600&ssl=1",450,600,true],"newspack-article-block-square-intermediate":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=600%2C600&ssl=1",600,600,true],"newspack-article-block-landscape-small":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=400%2C300&ssl=1",400,300,true],"newspack-article-block-portrait-small":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=300%2C400&ssl=1",300,400,true],"newspack-article-block-square-small":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=400%2C400&ssl=1",400,400,true],"newspack-article-block-landscape-tiny":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=200%2C150&ssl=1",200,150,true],"newspack-article-block-portrait-tiny":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=150%2C200&ssl=1",150,200,true],"newspack-article-block-square-tiny":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?resize=200%2C200&ssl=1",200,200,true],"newspack-article-block-uncropped":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1",1200,630,true],"menu-24x24":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=24%2C13&ssl=1",24,13,true],"menu-36x36":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=36%2C19&ssl=1",36,19,true],"menu-48x48":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=48%2C25&ssl=1",48,25,true]},"uagb_author_info":{"display_name":"Srdan Manasijevic","author_link":"https:\/\/fuentis.com\/en\/author\/srdan-manasijevic\/"},"uagb_comment_info":0,"uagb_excerpt":"WiBA: Der Weg zur Basis-Absicherung mit IT-Grundschutz und ISMS &nbsp; &nbsp; Was ist WiBA? WiBA steht f\u00fcr \u201cWeg in die Basis-Absicherung\u201d und bietet einen niedrigschwelligen Einstieg in die Informationssicherheit. Es wurde entwickelt, um Organisationen \u2013 insbesondere kleinere und mittlere Unternehmen sowie Beh\u00f6rden \u2013 dabei zu unterst\u00fctzen, anerkannte Sicherheitsstandards wie den IT-Grundschutz mit minimalem Aufwand umzusetzen.&hellip;","jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pfIFB2-1S0","jetpack-related-posts":[{"id":6147,"url":"https:\/\/fuentis.com\/en\/was-ist-der-it-grundschutz\/","url_meta":{"origin":7192,"position":0},"title":"What is IT-Grundschutz++?","author":"Srdan Manasijevic","date":"October 29, 2024","format":false,"excerpt":"Was ist der IT-Grundschutz++? Der\u00a0Grundschutz++\u00a0ist ein erweitertes und neues Konzept des IT-Grundschutzes des Bundesamtes f\u00fcr Sicherheit in der Informationstechnik (BSI). Es dient dazu, Unternehmen bei der Implementierung von IT-Sicherheitsma\u00dfnahmen zu unterst\u00fctzen, indem es eine strukturierte und pragmatische Vorgehensweise bietet. Der Fokus liegt auf der Identifikation von Bedrohungen, der Risikobewertung und\u2026","rel":"","context":"In &quot;IT-Grundschutz&quot;","block_context":{"text":"IT-Grundschutz","link":"https:\/\/fuentis.com\/en\/category\/it-grundschutz\/"},"img":{"alt_text":"Dokumentenpyramide IT-Grundschutz von fuentis","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Bild-Dokumentenpyramide-IT-Grundschutz.webp?fit=1200%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Bild-Dokumentenpyramide-IT-Grundschutz.webp?fit=1200%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Bild-Dokumentenpyramide-IT-Grundschutz.webp?fit=1200%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Bild-Dokumentenpyramide-IT-Grundschutz.webp?fit=1200%2C1200&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/Bild-Dokumentenpyramide-IT-Grundschutz.webp?fit=1200%2C1200&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6235,"url":"https:\/\/fuentis.com\/en\/bsi-it-grundschutz-vs-iso-27001-was-ist-der-unterschied\/","url_meta":{"origin":7192,"position":1},"title":"BSI IT-Grundschutz vs. ISO 27001: What's the difference?","author":"Srdan Manasijevic","date":"November 5, 2024","format":false,"excerpt":"BSI IT-Grundschutz vs. ISO 27001: Was ist der Unterschied? Informationssicherheit gewinnt f\u00fcr Unternehmen zunehmend an Bedeutung. Die Absicherung sensibler Daten und die Gew\u00e4hrleistung von Datenschutz sind nicht nur f\u00fcr das Vertrauen von Kunden und Partnern entscheidend, sondern auch oft gesetzlich vorgeschrieben. Zwei der bekanntesten Standards zur Umsetzung eines effektiven Informationssicherheitsmanagementsystems\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"fuentis Suite 4 - ISMS Plattform","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Slide-2-Instagram-23.10.2024.webp?fit=1080%2C1080&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Slide-2-Instagram-23.10.2024.webp?fit=1080%2C1080&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Slide-2-Instagram-23.10.2024.webp?fit=1080%2C1080&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Slide-2-Instagram-23.10.2024.webp?fit=1080%2C1080&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Slide-2-Instagram-23.10.2024.webp?fit=1080%2C1080&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7249,"url":"https:\/\/fuentis.com\/en\/weg-in-die-basis-absicherung-wiba-mit-fuentis\/","url_meta":{"origin":7192,"position":2},"title":"Weg in die Basis-Absicherung (WiBA) with fuentis","author":"Srdan Manasijevic","date":"March 24, 2025","format":false,"excerpt":"Weg in die Basis-Absicherung (WiBA) mit fuentis Was ist WiBA? WiBA steht f\u00fcr \u201cWeg in die Basis-Absicherung\u201d und bietet einen niedrigschwelligen Einstieg in die Informationssicherheit. Es wurde entwickelt, um Organisationen \u2013 insbesondere kleinere und mittlere Unternehmen sowie Beh\u00f6rden \u2013 dabei zu unterst\u00fctzen, anerkannte Sicherheitsstandards wie den IT-Grundschutz mit minimalem Aufwand\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"fuentis AG - OG Image - Weg in die Basis Absicherung mit der fuentis Suite 4 - 1.00","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-mit-der-fuentis-Suite-4-1.00-1.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-mit-der-fuentis-Suite-4-1.00-1.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-mit-der-fuentis-Suite-4-1.00-1.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-mit-der-fuentis-Suite-4-1.00-1.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-mit-der-fuentis-Suite-4-1.00-1.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7265,"url":"https:\/\/fuentis.com\/en\/photo-security-iso27001-isms\/","url_meta":{"origin":7192,"position":3},"title":"Securing Photos in the Digital Age","author":"Srdan Manasijevic","date":"March 28, 2025","format":false,"excerpt":"Fotos absichern im digitalen Zeitalter: Warum Metadaten wichtig sind Einleitung Jedes Foto erz\u00e4hlt eine Geschichte \u2013 aber nicht nur die, die man sieht. Moderne Bilder enthalten unsichtbare Daten, sogenannte Metadaten, wie Standort, Ger\u00e4tetyp, Aufnahmezeit und sogar Benutzerinformationen. Diese Informationen sind zwar n\u00fctzlich zum Organisieren und Bearbeiten, k\u00f6nnen jedoch beim Hochladen\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"Fotos enthalten versteckte Metadaten, die sensible Informationen preisgeben k\u00f6nnen. Erfahren Sie, wie Einzelpersonen und Organisationen Bilder durch intelligente Tools und ISMS-Praktiken sch\u00fctzen k\u00f6nnen.","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/PhotoSecure-and-fuentis-ISMS-ISO-27001.webp?fit=1200%2C853&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/PhotoSecure-and-fuentis-ISMS-ISO-27001.webp?fit=1200%2C853&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/PhotoSecure-and-fuentis-ISMS-ISO-27001.webp?fit=1200%2C853&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/PhotoSecure-and-fuentis-ISMS-ISO-27001.webp?fit=1200%2C853&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/PhotoSecure-and-fuentis-ISMS-ISO-27001.webp?fit=1200%2C853&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6433,"url":"https:\/\/fuentis.com\/en\/was-ist-ein-isms-tool-2025\/","url_meta":{"origin":7192,"position":4},"title":"What is an ISMS tool?","author":"Srdan Manasijevic","date":"December 16, 2024","format":false,"excerpt":"Was ist ein ISMS Tool? Ein ISMS-Tool (Informationssicherheitsmanagementsystem Tool) ist eine spezialisierte Software, die Unternehmen dabei unterst\u00fctzt, ihre Informationssicherheitsprozesse systematisch zu organisieren, zu \u00fcberwachen und zu verbessern. Ein ISMS (Informationssicherheitsmanagementsystem) hat das Ziel, alle Aspekte der Informationssicherheit zu managen, Risiken zu minimieren und die Einhaltung gesetzlicher oder regulatorischer Vorgaben sicherzustellen.\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"Was ist ein ISMS Tool? Ein ISMS Tool wir die fuentis Suite der fuentis AG, hilft bei einer Implementierung eines ISMS. Es spart kosten und steigert Ihre Effizienz.","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Was-ist-ein-ISMS-Tool-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Was-ist-ein-ISMS-Tool-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Was-ist-ein-ISMS-Tool-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Was-ist-ein-ISMS-Tool-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Was-ist-ein-ISMS-Tool-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":8010,"url":"https:\/\/fuentis.com\/en\/wer-braucht-eine-iso-27001-zertifizierung\/","url_meta":{"origin":7192,"position":5},"title":"Wer braucht eine ISO 27001 Zertifizierung?","author":"Srdan Manasijevic","date":"September 10, 2025","format":false,"excerpt":"Die neue Compliance-Realit\u00e4t in Deutschland Seit der NIS2-Richtlinie fragen sich Tausende von Unternehmen in Deutschland zum ersten Mal: Brauchen wir eine ISO 27001 Zertifizierung? Die Antwort ist komplexer, als die meisten denken und oft \u00fcberraschend. Durch NIS2 sind pl\u00f6tzlich neue Sektoren wie Sozialversicherung, Gesundheit und erweiterte Energiewirtschaft compliance-pflichtig, w\u00e4hrend gleichzeitig\u2026","rel":"","context":"In &quot;ISO 27001&quot;","block_context":{"text":"ISO 27001","link":"https:\/\/fuentis.com\/en\/category\/iso-27001\/"},"img":{"alt_text":"Erfahren Sie, wann eine ISO 27001 Zertifizierung Pflicht ist, wie sie sich vom BSI IT-Grundschutz unterscheidet und welche L\u00f6sung f\u00fcr Ihr Unternehmen passt.","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/09\/Wer-bruacht-ISO-27001.png?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/09\/Wer-bruacht-ISO-27001.png?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/09\/Wer-bruacht-ISO-27001.png?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/09\/Wer-bruacht-ISO-27001.png?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/09\/Wer-bruacht-ISO-27001.png?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts\/7192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/users\/249796503"}],"replies":[{"embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/comments?post=7192"}],"version-history":[{"count":12,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts\/7192\/revisions"}],"predecessor-version":[{"id":7206,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts\/7192\/revisions\/7206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/media\/7200"}],"wp:attachment":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/media?parent=7192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/categories?post=7192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/tags?post=7192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}