{"id":3850,"date":"2026-03-22T21:00:00","date_gmt":"2026-03-22T19:00:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=3850"},"modified":"2026-03-24T11:58:07","modified_gmt":"2026-03-24T09:58:07","slug":"tiroler-tageszeitung-digital-dependencies-in-private-households","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/tiroler-tageszeitung-digital-dependencies-in-private-households\/","title":{"rendered":"Tiroler Tageszeitung &#8211; Digital Dependencies in Households"},"content":{"rendered":"\n<p>In an interview with the <em>Tiroler Tageszeitung<\/em> our Cybersecurity experts <strong>Werner Riegler<\/strong> and <strong>Marc Nimmerrichter<\/strong> discuss a risk that has often been underestimated: <strong>digital dependencies within private households<\/strong>.<\/p>\n\n\n\n<p>Unfortunately, the increasing digitalization of private households brings with it new attack vectors that few people are aware of. For example, in many households, technical systems are managed by just one person. This can create dependencies that are sometimes exploited in the event of a separation.<\/p>\n\n\n\n<p>A study by Certitude Consulting and the German Federal Office for Information Security (BSI), highlights this societal risk, which has received little attention until now.<\/p>\n\n\n\n<p>You can read the full article at the following link (in German only):<br><strong><a href=\"https:\/\/www.tt.com\/artikel\/30930343\/wenn-der-ex-oder-der-partner-die-digitale-abhaengigkeit-missbraucht\">Wenn der Ex oder der Partner die digitale Abh\u00e4ngigkeit missbraucht<\/a><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"798\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-1-2-1024x798.png\" alt=\"\" class=\"wp-image-3879\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-1-2-1024x798.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-1-2-300x234.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-1-2-768x599.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-1-2.png 1198w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"298\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-2-2-1024x298.png\" alt=\"\" class=\"wp-image-3880\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-2-2-1024x298.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-2-2-300x87.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-2-2-768x223.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-2-2.png 1218w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"573\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-3-2-1024x573.png\" alt=\"\" class=\"wp-image-3881\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-3-2-1024x573.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-3-2-300x168.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-3-2-768x429.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-3-2.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"248\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-4-1-1024x248.png\" alt=\"\" class=\"wp-image-3882\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-4-1-1024x248.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-4-1-300x73.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-4-1-768x186.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-4-1.png 1212w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"118\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-5_NEU_2-2-1024x118.png\" alt=\"\" class=\"wp-image-3883\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-5_NEU_2-2-1024x118.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-5_NEU_2-2-300x35.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-5_NEU_2-2-768x88.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-5_NEU_2-2.png 1207w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"102\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-6-2-1024x102.png\" alt=\"\" class=\"wp-image-3884\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-6-2-1024x102.png 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-6-2-300x30.png 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-6-2-768x77.png 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2026\/03\/Bild-6-2.png 1179w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>In an interview with the Tiroler Tageszeitung our Cybersecurity experts Werner Riegler and Marc Nimmerrichter discuss a risk that has often been underestimated: digital dependencies within private households. Unfortunately, the increasing digitalization of private households brings with it new attack vectors that few people are aware of. For example, in many households, technical systems are [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":3739,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,128],"tags":[764,762,760],"class_list":["post-3850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise","category-press","tag-bsi-studie","tag-cyber-security","tag-it-security"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=3850"}],"version-history":[{"count":7,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3850\/revisions"}],"predecessor-version":[{"id":3885,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3850\/revisions\/3885"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/3739"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=3850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=3850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=3850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}