{"id":1346,"date":"2024-11-01T15:13:12","date_gmt":"2024-11-01T14:13:12","guid":{"rendered":"https:\/\/wirtschaftsschutz.at\/?page_id=1346"},"modified":"2024-11-10T15:01:00","modified_gmt":"2024-11-10T14:01:00","slug":"threats","status":"publish","type":"page","link":"https:\/\/wirtschaftsschutz.at\/en\/economic-espionage\/threats\/","title":{"rendered":"Threats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1346\" class=\"elementor elementor-1346\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-13b0f5e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13b0f5e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-153fd60\" data-id=\"153fd60\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-97d9301 elementor-drop-cap-yes color-scheme-inherit text-left elementor-drop-cap-view-default elementor-widget elementor-widget-text-editor\" data-id=\"97d9301\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;drop_cap&quot;:&quot;yes&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Economic espionage threats<\/strong><\/h2><p>State actors and business competitors actively seek information that is critical to national and economic security, your company\u2019s global competitiveness and your organisation\u2019s mission and vision.<\/p><p>Their main target is sensitive or proprietary information such as financial, trade or economic policy data. Groundbreaking research findings, new technological developments and industry-specific information are also of particular interest.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-95ae85f\" data-id=\"95ae85f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cfa4fd content-align-cta-default elementor-widget elementor-widget-eael-cta-box\" data-id=\"8cfa4fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-cta-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"eael-call-to-action cta-basic bg-lite cta-preset-1\">\n        <h2 class=\"title eael-cta-heading\">Effective protection<\/h2><p>We develop customised security plans and take care of your corporate security.<\/p><p>Together with our clients, we devise a comprehensive and integrated solution that protects your sensitive information and safeguards your company against the manifold threats posed by modern economic espionage.<\/p><a href=\"https:\/\/wirtschaftsschutz.at\/en\/contact\/\" class=\"cta-button cta-preset-1  effect-2\">Contact us for a consultation<\/a>\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6cef95f elementor-section-height-min-height wd-section-stretch elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"6cef95f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9a9404e\" data-id=\"9a9404e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-c36b020 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c36b020\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-591f8aa\" data-id=\"591f8aa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f371d5 elementor-widget elementor-widget-wd_text_block\" data-id=\"4f371d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wd_text_block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<link rel=\"stylesheet\" id=\"wd-text-block-css\" href=\"https:\/\/wirtschaftsschutz.at\/wp-content\/themes\/woodmart\/css\/parts\/el-text-block.min.css?ver=7.4.3\" type=\"text\/css\" media=\"all\" \/> \t\t\t\t\t<div class=\"wd-text-block reset-last-child text-left\">\n\t\t\t\n\t\t\t<h2>Threat targets<\/h2>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-58e5e2c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58e5e2c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-cb1c750\" data-id=\"cb1c750\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-960e11a elementor-widget__width-initial elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"960e11a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-960e11a\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"960e11a\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"you-and-your-employees\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1571\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">You and your employees<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1571\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"you-and-your-employees\"><p>You and your employees have access to facilities, computer networks, sensitive information, resources, technology, research findings and other data that are of particular interest to foreign intelligence services and competitors.<\/p><p>These actors take an interest in you because you have connections and access. You use social media accounts and company and\/or personal smartphones, and your social and professional networks include people in sensitive positions. Maybe you also travel domestically and internationally.<\/p><p>All of these factors constitute potential vulnerabilities.<\/p><p>sozialen und beruflichen Netzwerke umfassen Personen in sensiblen Positionen. M\u00f6glicherweise reisen Sie sowohl im Inland als auch international.<\/p><p>All diese Faktoren stellen potenzielle Schwachstellen dar.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"your-emails\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1572\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Your emails<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1572\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"your-emails\"><p>Phishing is a widespread method of compromising computer networks and gaining access to valuable information.<\/p><p>You may receive a seemingly genuine, plausible or official-looking email, text message or pop-up window designed to trick you into clicking on a link or attachment. If you do so, attackers will be able to bypass your network\u2019s technical defences, upload malware or otherwise infiltrate your network and steal your data.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"your-social-media\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-1573\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Your social media<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1573\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"your-social-media\"><p>Social media provide a platform that adversaries and competitors may use to gain your trust.<\/p><p>Attackers may create fake profiles to connect with you, follow you or pose as a former acquaintance, job recruiter or someone with shared interests. Their aim is to deceive you and find out more about you or your job.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"your-travels\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-1574\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Your travels<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1574\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"your-travels\"><p>Never assume that you have electronic privacy when abroad.<\/p><p>Internet caf\u00e9s, hotel business centres, hotel Wi-Fi networks and even charging stations at international airports are potential access points to your devices and therefore to your communications. Always take your electronic devices with you (hotel safes are not fully secure) and always check whether your connection is indeed secure.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"your-infromation\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-1575\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Your infromation<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1575\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"your-infromation\"><p>Information is the backbone of any business. Business strategies, customer data, technical drawings or research findings \u2013 the loss or disclosure of such information may have catastrophic consequences. Often the objective of economic espionage is to steal precisely this type of sensitive information and pass it on to competitors or foreign states.<\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-dfd8227\" data-id=\"dfd8227\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2800809 elementor-widget__width-initial elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"2800809\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t            <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-2800809\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"2800809\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n            <div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"your-data-storage-devices\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-4191\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Your data storage devices<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-4191\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"your-data-storage-devices\"><p>Data storage devices play an important role in economic security as they contain valuable physical or digital information. Protecting data storage devices \u2013 whether hard drives, cloud storage or USB flash drives \u2013 takes both physical security measures and advanced IT security protocols. If these data storage devices are inadequately protected, sensitive information may fall into the wrong hands.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"your-knowledge\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-4192\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Your knowledge<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-4192\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"your-knowledge\"><p>In many cases, knowledge is the result of many years of research and development. Your know-how is the foundation of your innovations and your competitive advantage. Knowledge security requires more than merely protecting the information: the processes involved and the people who have that knowledge must be protected as well. This is where measures such as non-disclosure agreements (NDAs) and economic security training come into play.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"your-property\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-4193\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Your property<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-4193\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"your-property\"><p>Your company\u2019s property, such as machinery, prototypes or production facilities, may also be targeted by economic espionage. A comprehensive security and surveillance strategy which both manages access to such physical objects and monitors their location and use is necessary to protect your property.<\/p><\/div>\n\t\t\t\t\t<\/div><div class=\"eael-accordion-list\">\n\t\t\t\t\t<div id=\"your-infrastructure\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-4194\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Your infrastructure<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-4194\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"your-infrastructure\"><p>Infrastructure refers to the entirety of physical and digital systems that allow your business to run effectively. This includes buildings, IT systems, communication networks and more. Securing this infrastructure against attacks, sabotage or unauthorised access is crucial to ensure continuous operations and prevent economic losses.<\/p><\/div>\n\t\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Economic espionage threats State actors and business competitors actively seek information that is critical to national and economic security, your<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1345,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1346","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threats - Wirtschaftsschutz<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/wirtschaftspionage-bedrohung\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threats - Wirtschaftsschutz\" \/>\n<meta property=\"og:description\" content=\"Economic espionage threats State actors and business competitors actively seek information that is critical to national and economic security, your\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/wirtschaftspionage-bedrohung\/\" \/>\n<meta property=\"og:site_name\" content=\"Wirtschaftsschutz\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-10T14:01:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/wirtschaftsspionage\\\/wirtschaftspionage-bedrohung\\\/\",\"url\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/wirtschaftsspionage\\\/wirtschaftspionage-bedrohung\\\/\",\"name\":\"Threats - Wirtschaftsschutz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/#website\"},\"datePublished\":\"2024-11-01T14:13:12+00:00\",\"dateModified\":\"2024-11-10T14:01:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/wirtschaftsspionage\\\/wirtschaftspionage-bedrohung\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wirtschaftsschutz.at\\\/wirtschaftsspionage\\\/wirtschaftspionage-bedrohung\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/wirtschaftsspionage\\\/wirtschaftspionage-bedrohung\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Economic espionage\",\"item\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/wirtschaftsspionage\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/#website\",\"url\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/\",\"name\":\"Wirtschaftsschutz\",\"description\":\"Gemeinsam sch\u00fctzen wir den Wirtschaftsstandort \u00d6sterreich\",\"publisher\":{\"@id\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/#organization\",\"name\":\"Wirtschaftsschutz\",\"url\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Wirtschaftsschutz-Logo-350px-Breite.png\",\"contentUrl\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Wirtschaftsschutz-Logo-350px-Breite.png\",\"width\":350,\"height\":150,\"caption\":\"Wirtschaftsschutz\"},\"image\":{\"@id\":\"https:\\\/\\\/wirtschaftsschutz.at\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threats - Wirtschaftsschutz","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/wirtschaftspionage-bedrohung\/","og_locale":"en_US","og_type":"article","og_title":"Threats - Wirtschaftsschutz","og_description":"Economic espionage threats State actors and business competitors actively seek information that is critical to national and economic security, your","og_url":"https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/wirtschaftspionage-bedrohung\/","og_site_name":"Wirtschaftsschutz","article_modified_time":"2024-11-10T14:01:00+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/wirtschaftspionage-bedrohung\/","url":"https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/wirtschaftspionage-bedrohung\/","name":"Threats - Wirtschaftsschutz","isPartOf":{"@id":"https:\/\/wirtschaftsschutz.at\/#website"},"datePublished":"2024-11-01T14:13:12+00:00","dateModified":"2024-11-10T14:01:00+00:00","breadcrumb":{"@id":"https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/wirtschaftspionage-bedrohung\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/wirtschaftspionage-bedrohung\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/wirtschaftspionage-bedrohung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/wirtschaftsschutz.at\/en\/"},{"@type":"ListItem","position":2,"name":"Economic espionage","item":"https:\/\/wirtschaftsschutz.at\/wirtschaftsspionage\/"},{"@type":"ListItem","position":3,"name":"Threats"}]},{"@type":"WebSite","@id":"https:\/\/wirtschaftsschutz.at\/#website","url":"https:\/\/wirtschaftsschutz.at\/","name":"Wirtschaftsschutz","description":"Gemeinsam sch\u00fctzen wir den Wirtschaftsstandort \u00d6sterreich","publisher":{"@id":"https:\/\/wirtschaftsschutz.at\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wirtschaftsschutz.at\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wirtschaftsschutz.at\/#organization","name":"Wirtschaftsschutz","url":"https:\/\/wirtschaftsschutz.at\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wirtschaftsschutz.at\/#\/schema\/logo\/image\/","url":"https:\/\/wirtschaftsschutz.at\/wp-content\/uploads\/2021\/09\/Wirtschaftsschutz-Logo-350px-Breite.png","contentUrl":"https:\/\/wirtschaftsschutz.at\/wp-content\/uploads\/2021\/09\/Wirtschaftsschutz-Logo-350px-Breite.png","width":350,"height":150,"caption":"Wirtschaftsschutz"},"image":{"@id":"https:\/\/wirtschaftsschutz.at\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/wirtschaftsschutz.at\/en\/wp-json\/wp\/v2\/pages\/1346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wirtschaftsschutz.at\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wirtschaftsschutz.at\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wirtschaftsschutz.at\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wirtschaftsschutz.at\/en\/wp-json\/wp\/v2\/comments?post=1346"}],"version-history":[{"count":0,"href":"https:\/\/wirtschaftsschutz.at\/en\/wp-json\/wp\/v2\/pages\/1346\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/wirtschaftsschutz.at\/en\/wp-json\/wp\/v2\/pages\/1345"}],"wp:attachment":[{"href":"https:\/\/wirtschaftsschutz.at\/en\/wp-json\/wp\/v2\/media?parent=1346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}