{"id":6286,"date":"2021-05-31T11:21:35","date_gmt":"2021-05-31T10:21:35","guid":{"rendered":"https:\/\/pq-as-a-service.com\/cyber-security-is-essential\/"},"modified":"2021-05-31T11:26:24","modified_gmt":"2021-05-31T10:26:24","slug":"cyber-security-is-essential","status":"publish","type":"post","link":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/","title":{"rendered":"Cyber security is essential"},"content":{"rendered":"<p>The topic of <a href=\"https:\/\/pq-as-a-service.com\/normen-der-netzqualitaet\/informations-und-datensicherheit\/\" target=\"_blank\" rel=\"noopener\">cyber security<\/a> is becoming increasingly important due to the constantly growing level of networking. Especially in the areas of energy and SmartGrid. Due to the threat situation, effective cyber security is essential there.<\/p>\n<div id=\"attachment_4869\" style=\"width: 293px\" class=\"wp-caption alignright\"><a href=\"https:\/\/pq-as-a-service.com\/normen-der-netzqualitaet\/informations-und-datensicherheit\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4869\" class=\"wp-image-4868 size-medium\" title=\"Cyber security is essential\" src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?resize=283%2C300&#038;ssl=1\" alt=\"Cyber security is essential\" width=\"283\" height=\"300\" srcset=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?resize=283%2C300&amp;ssl=1 283w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?resize=768%2C814&amp;ssl=1 768w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?resize=665%2C705&amp;ssl=1 665w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/Device-Secure.jpg?w=800&amp;ssl=1 800w\" sizes=\"auto, (max-width: 283px) 100vw, 283px\" \/><\/a><p id=\"caption-attachment-4869\" class=\"wp-caption-text\">Cyber security is essential<\/p><\/div>\n<h4>Potential risks (data theft &amp; data manipulation)<\/h4>\n<ul>\n<li>Hacking &amp; Cracking<\/li>\n<li>Listening<\/li>\n<li>Datamining<\/li>\n<li>Theft of passwords and other information<\/li>\n<li>Unauthorized access (intranet, end devices, servers, &#8230;)<\/li>\n<li>Modification of data &amp; data telegrams<\/li>\n<li>Delete data<\/li>\n<li>Changing configurations<\/li>\n<li>etc.<\/li>\n<\/ul>\n<h5>Data flow in the context of the 7 network layer<\/h5>\n<div id=\"attachment_1051\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/pq-as-a-service.com\/normen-der-netzqualitaet\/informations-und-datensicherheit\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1051\" class=\"wp-image-320 size-large\" title=\"Cyber security is essential \" src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/Anwendungsbereiche-2.jpg?resize=1024%2C594&#038;ssl=1\" alt=\"The seven network layers\" width=\"1024\" height=\"594\" srcset=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/Anwendungsbereiche-2.jpg?resize=1024%2C594&amp;ssl=1 1024w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/Anwendungsbereiche-2.jpg?resize=300%2C174&amp;ssl=1 300w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/Anwendungsbereiche-2.jpg?resize=768%2C446&amp;ssl=1 768w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/Anwendungsbereiche-2.jpg?resize=1536%2C891&amp;ssl=1 1536w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/Anwendungsbereiche-2.jpg?resize=2048%2C1188&amp;ssl=1 2048w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/Anwendungsbereiche-2.jpg?resize=1500%2C870&amp;ssl=1 1500w, https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2020\/09\/Anwendungsbereiche-2.jpg?resize=705%2C409&amp;ssl=1 705w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><p id=\"caption-attachment-1051\" class=\"wp-caption-text\">The seven network layers<\/p><\/div>\n<ul>\n<li>Electrical interconnections must communicate with each other<\/li>\n<li>Integration into the World Wide Web (www)<\/li>\n<li>Integration of more measuring points<\/li>\n<li>Users on grid level 7 (local distribution grid &lt;1kV) become (app) specialists (e.g. SmartHome, energy procurement, &#8230;)<\/li>\n<li>SmartGrid applications are becoming popular and also demanded<\/li>\n<li>Planning with simulation and trends are becoming increasingly important for the networks<\/li>\n<li>Dynamic load management (e.g. Redispatch, &#8230;)<\/li>\n<\/ul>\n<h3>The basic problem of cyber security<\/h3>\n<div id=\"attachment_4645\" style=\"width: 1510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/pq-as-a-service.com\/normen-der-netzqualitaet\/informations-und-datensicherheit\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4645\" class=\"wp-image-4644 size-featured\" title=\"Cyber security is essential\" src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/02\/pq-angry-basel.jpg?resize=1500%2C430&#038;ssl=1\" alt=\"Risks cyber attacks\" width=\"1500\" height=\"430\" \/><\/a><p id=\"caption-attachment-4645\" class=\"wp-caption-text\">Risks in the energy infrastructure during cyber attacks<\/p><\/div>\n<ul>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Individual approaches take up only partial aspects of essential cyber security<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">IT experts mostly have a technical focus and less on the overall context<\/li>\n<li id=\"tw-target-text\" class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><span lang=\"de\">ISO\/IEC27001 on cyber security provides a complete, holistic management system and is very complex<\/span><\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">IEC62443 on cyber security is in principle only applicable to the subarea of industrial automation<\/li>\n<li class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><span lang=\"de\">There is still no IT security standard according to IEC for power quality instruments as well as power monitoring devices at device level. This is currently in the committees of EC TC 85 \/ WG 20 &#8211; Equipment for measuring and monitoring of steady state and dynamic quantities in Power Distribution Systems under the project title: &#8220;Cybersecurity aspects of devices used for power metering and monitoring, power quality monitoring, data collection and analysis &#8220;is discussed.<\/span><\/li>\n<\/ul>\n<h3>Potential solutions on cyber security<\/h3>\n<div id=\"attachment_5291\" style=\"width: 1510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/pq-as-a-service.com\/daten-und-manipulationssicherheit\/\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5291\" class=\"wp-image-5290 size-featured\" title=\"Cyber security is essential\" src=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/04\/Cyber_Happy.jpg?resize=1500%2C430&#038;ssl=1\" alt=\"Cyber security is essential - and here are the solutions\" width=\"1500\" height=\"430\" \/><\/a><p id=\"caption-attachment-5291\" class=\"wp-caption-text\">Cyber security is essential and here possible solutions are presented<\/p><\/div>\n<p>In this blog, solution approaches are to be found at the level of measuring devices, which are also used in sub-areas of software solutions. From this, approaches from ISO\/IEC27001 (Annex A; Reference measure objectives and measures) can be found, such as. For instance:<\/p>\n<ul>\n<li><span lang=\"de\">Access control for systems and applications<\/span><\/li>\n<li><span lang=\"de\">Cryptographic measures<\/span><\/li>\n<li><span lang=\"de\">Physical and environmental security<\/span><\/li>\n<li><span lang=\"de\"> Protection from malware<br \/>\n<\/span><\/li>\n<li><span lang=\"de\"> Data backup<\/span><\/li>\n<li><span lang=\"de\"> Logging and monitoring<\/span><\/li>\n<\/ul>\n<h5>The following approaches should make a significant contribution to a significant increase in safety at the level of measuring instruments:<\/h5>\n<ul>\n<li class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><a href=\"https:\/\/www.youtube.com\/watch?v=yahwTPn1UVg\" target=\"_blank\" rel=\"noopener\">Assign role-based access rights (RBAC)<\/a><\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Use transport encrypted websites (https)<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Client whitelist for limiting access to end devices<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Audit log for seamless monitoring of changes and operations<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">SysLog to secure the operations (tracking)<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Apply certified firmware updates to measuring instruments and software<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><a href=\"https:\/\/www.youtube.com\/watch?v=tRl3lICm8js\" target=\"_blank\" rel=\"noopener\">Decentralised data loggers as redundancy outside the IT system<\/a><\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Use secure connections in mobile applications<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><a href=\"https:\/\/www.youtube.com\/watch?v=QUuA1W0BQvg\" target=\"_blank\" rel=\"noopener\">Uninterruptible power supply (centralised\/decentralised)<\/a><\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\">Use metrologically certified measuring instruments<\/li>\n<li dir=\"ltr\" data-placeholder=\"\u00dcbersetzung\"><a href=\"https:\/\/www.camillebauer.com\/proven-concept-selection.pdf\" target=\"_blank\" rel=\"noopener\">Non-\u00b5P Measurement Devices<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/pq-as-a-service.com\/daten-und-manipulationssicherheit\/\" target=\"_blank\" rel=\"noopener\">Learn more while klicking.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The topic of cyber security is becoming increasingly important due to the constantly growing level of networking. Especially in the areas of energy and SmartGrid. Due to the threat situation, effective cyber security is essential there. Potential risks (data theft &amp; data manipulation) Hacking &amp; Cracking Listening Datamining Theft of passwords and other information Unauthorized [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4857,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[75,76,106],"tags":[270,269,177,207,122,77,130],"class_list":["post-6286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expand-expertise","category-practical-examples","category-whitepapers-technical-reports","tag-blackout-en","tag-cyber-attack-en","tag-cyber-security-en","tag-energy-monitoring-en","tag-load-management","tag-power-quality","tag-smart-grid-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber security is essential - Power Quality Wissen<\/title>\n<meta name=\"description\" content=\"The topic of cyber security is essential due to the ever-increasing networking in the energy sector, and thus for measuring devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security is essential - Power Quality Wissen\" \/>\n<meta property=\"og:description\" content=\"The topic of cyber security is essential due to the ever-increasing networking in the energy sector, and thus for measuring devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/\" \/>\n<meta property=\"og:site_name\" content=\"Power Quality Wissen\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-31T10:21:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-31T10:26:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sascha Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sascha Engel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/\"},\"author\":{\"name\":\"Sascha Engel\",\"@id\":\"https:\/\/pq-as-a-service.com\/#\/schema\/person\/b447a19e69ea4e5c28fe19b2111853f8\"},\"headline\":\"Cyber security is essential\",\"datePublished\":\"2021-05-31T10:21:35+00:00\",\"dateModified\":\"2021-05-31T10:26:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/\"},\"wordCount\":496,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1\",\"keywords\":[\"Blackout\",\"Cyber Attack\",\"Cyber Security\",\"energy monitoring\",\"Load management\",\"Power Quality\",\"Smart Grid\"],\"articleSection\":[\"Expand expertise\",\"Practical examples\",\"Whitepapers &amp; Technical Reports\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/\",\"url\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/\",\"name\":\"Cyber security is essential - Power Quality Wissen\",\"isPartOf\":{\"@id\":\"https:\/\/pq-as-a-service.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1\",\"datePublished\":\"2021-05-31T10:21:35+00:00\",\"dateModified\":\"2021-05-31T10:26:24+00:00\",\"author\":{\"@id\":\"https:\/\/pq-as-a-service.com\/#\/schema\/person\/b447a19e69ea4e5c28fe19b2111853f8\"},\"description\":\"The topic of cyber security is essential due to the ever-increasing networking in the energy sector, and thus for measuring devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1\",\"width\":1500,\"height\":440,\"caption\":\"Threat from cyber attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/pq-as-a-service.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber security is essential\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pq-as-a-service.com\/#website\",\"url\":\"https:\/\/pq-as-a-service.com\/\",\"name\":\"Power Quality as a Service\",\"description\":\"Powered by CAMILLE BAUER METRAWATT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pq-as-a-service.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/pq-as-a-service.com\/#\/schema\/person\/b447a19e69ea4e5c28fe19b2111853f8\",\"name\":\"Sascha Engel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pq-as-a-service.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1bbd2ed3d78858e93cda294b2a96ca362b3eb6495da7fb59a5304ae169f068f9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1bbd2ed3d78858e93cda294b2a96ca362b3eb6495da7fb59a5304ae169f068f9?s=96&d=mm&r=g\",\"caption\":\"Sascha Engel\"},\"description\":\"Board Member, CEO\/Managing Director and Author, Camille Bauer Metrawatt AG\",\"sameAs\":[\"http:\/\/www.camillebauer.com\"],\"url\":\"https:\/\/pq-as-a-service.com\/en\/author\/sascha-engel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber security is essential - Power Quality Wissen","description":"The topic of cyber security is essential due to the ever-increasing networking in the energy sector, and thus for measuring devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/","og_locale":"en_US","og_type":"article","og_title":"Cyber security is essential - Power Quality Wissen","og_description":"The topic of cyber security is essential due to the ever-increasing networking in the energy sector, and thus for measuring devices.","og_url":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/","og_site_name":"Power Quality Wissen","article_published_time":"2021-05-31T10:21:35+00:00","article_modified_time":"2021-05-31T10:26:24+00:00","og_image":[{"width":1500,"height":440,"url":"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1","type":"image\/jpeg"}],"author":"Sascha Engel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sascha Engel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#article","isPartOf":{"@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/"},"author":{"name":"Sascha Engel","@id":"https:\/\/pq-as-a-service.com\/#\/schema\/person\/b447a19e69ea4e5c28fe19b2111853f8"},"headline":"Cyber security is essential","datePublished":"2021-05-31T10:21:35+00:00","dateModified":"2021-05-31T10:26:24+00:00","mainEntityOfPage":{"@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/"},"wordCount":496,"commentCount":0,"image":{"@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1","keywords":["Blackout","Cyber Attack","Cyber Security","energy monitoring","Load management","Power Quality","Smart Grid"],"articleSection":["Expand expertise","Practical examples","Whitepapers &amp; Technical Reports"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/","url":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/","name":"Cyber security is essential - Power Quality Wissen","isPartOf":{"@id":"https:\/\/pq-as-a-service.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#primaryimage"},"image":{"@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1","datePublished":"2021-05-31T10:21:35+00:00","dateModified":"2021-05-31T10:26:24+00:00","author":{"@id":"https:\/\/pq-as-a-service.com\/#\/schema\/person\/b447a19e69ea4e5c28fe19b2111853f8"},"description":"The topic of cyber security is essential due to the ever-increasing networking in the energy sector, and thus for measuring devices.","breadcrumb":{"@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#primaryimage","url":"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1","contentUrl":"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1","width":1500,"height":440,"caption":"Threat from cyber attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/pq-as-a-service.com\/en\/cyber-security-is-essential\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/pq-as-a-service.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber security is essential"}]},{"@type":"WebSite","@id":"https:\/\/pq-as-a-service.com\/#website","url":"https:\/\/pq-as-a-service.com\/","name":"Power Quality as a Service","description":"Powered by CAMILLE BAUER METRAWATT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pq-as-a-service.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pq-as-a-service.com\/#\/schema\/person\/b447a19e69ea4e5c28fe19b2111853f8","name":"Sascha Engel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pq-as-a-service.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1bbd2ed3d78858e93cda294b2a96ca362b3eb6495da7fb59a5304ae169f068f9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1bbd2ed3d78858e93cda294b2a96ca362b3eb6495da7fb59a5304ae169f068f9?s=96&d=mm&r=g","caption":"Sascha Engel"},"description":"Board Member, CEO\/Managing Director and Author, Camille Bauer Metrawatt AG","sameAs":["http:\/\/www.camillebauer.com"],"url":"https:\/\/pq-as-a-service.com\/en\/author\/sascha-engel\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/pq-as-a-service.com\/wp-content\/uploads\/2021\/03\/angry-error.jpg?fit=1500%2C440&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/posts\/6286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/comments?post=6286"}],"version-history":[{"count":4,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/posts\/6286\/revisions"}],"predecessor-version":[{"id":6289,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/posts\/6286\/revisions\/6289"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/media\/4857"}],"wp:attachment":[{"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/media?parent=6286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/categories?post=6286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pq-as-a-service.com\/en\/wp-json\/wp\/v2\/tags?post=6286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}