{"id":3738,"date":"2026-02-16T20:00:00","date_gmt":"2026-02-16T18:00:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=3738"},"modified":"2026-02-23T15:50:32","modified_gmt":"2026-02-23T13:50:32","slug":"oo-nachrichten-feb-16th-2026-it-security-why-the-greatest-risk-often-lies-at-home","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/oo-nachrichten-feb-16th-2026-it-security-why-the-greatest-risk-often-lies-at-home\/","title":{"rendered":"O\u00d6 Nachrichten, Feb 16th 2026 &#8211; IT-Security: Why the Greatest Risk Often Lies at Home"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The article in the <strong>Ober\u00f6sterreichische Nachrichten<\/strong> reports on the results of an IT security study conducted by <strong>Certitude Consulting<\/strong> on behalf of the <strong>German Federal Office for Information Security (BSI)<\/strong>. The study addresses the increasing attack surface in the private sphere. With the growing interconnectedness of technical devices, the IT security risks for private households, which often lack structured protection mechanisms, are also rising. The article also quotes the assessment of our experts <strong>Marc Nimmerrichter<\/strong> and <strong>Werner Riegler<\/strong>. They point out that security gaps often arise from the interplay of technology, organization, and human behavior, and that potential consequences can range from identity theft and extortion to intimidation.<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The full article is available in German on <a href=\"https:\/\/www.nachrichten.at\/panorama\/web\/it-sicherheit-wieso-die-groesste-gefahr-in-den-eigenen-vier-waenden-lauert;art122,4138529\" target=\"_blank\" rel=\"noreferrer noopener\">nachrichten.at<\/a>.<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"841\" height=\"1024\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/02\/2026-02-16-OON-ISiH-1-841x1024.jpg\" alt=\"\" class=\"wp-image-3767\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/02\/2026-02-16-OON-ISiH-1-841x1024.jpg 841w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/02\/2026-02-16-OON-ISiH-1-246x300.jpg 246w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/02\/2026-02-16-OON-ISiH-1-768x935.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/02\/2026-02-16-OON-ISiH-1.jpg 1128w\" sizes=\"auto, (max-width: 841px) 100vw, 841px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The article in the Ober\u00f6sterreichische Nachrichten reports on the results of an IT security study conducted by Certitude Consulting on behalf of the German Federal Office for Information Security (BSI). The study addresses the increasing attack surface in the private sphere. With the growing interconnectedness of technical devices, the IT security risks for private households, [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":3739,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,128],"tags":[733,723],"class_list":["post-3738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise","category-press","tag-itsec-en","tag-itsecurity-en"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=3738"}],"version-history":[{"count":5,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3738\/revisions"}],"predecessor-version":[{"id":3770,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3738\/revisions\/3770"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/3739"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=3738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=3738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=3738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}