{"id":8225,"date":"2023-06-19T13:24:18","date_gmt":"2023-06-19T12:24:18","guid":{"rendered":"https:\/\/systemtm.com\/?page_id=8225"},"modified":"2023-06-20T06:50:32","modified_gmt":"2023-06-20T05:50:32","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row_content&#8221; parallax=&#8221;content-moving-fade&#8221; parallax_image=&#8221;8231&#8243; css=&#8221;.vc_custom_1687177096143{padding-top: 100px !important;padding-bottom: 122px !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css=&#8221;.vc_custom_1446035084676{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column_text el_class=&#8221;container&#8221;]<\/p>\n<h1 style=\"color: white;\">D\u00fcrr Group Cybersecurity<\/h1>\n<h1 style=\"color: white;\">Incident Management (D.C.I.M.)<\/h1>\n<p style=\"color: white; font-size: 20px;\">The D\u00fcrr Group Cybersecurity Incident Management team is responsible<\/p>\n<p style=\"color: white; font-size: 20px;\">for the IT security of our whole Group.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3><strong>D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.)<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4>System TM A\/S is member of the HOMAG Group and hence a part of D\u00fcrr Group. The D\u00fcrr Group Cybersecurity Incident Management team is responsible for the IT security of our whole Group.<\/h4>\n<p>For the D\u00fcrr Group, cybersecurity is an essential component of stable, well-functioning and successful production. The security of the data, products and services we provide for our customers takes top priority. D\u00fcrr Group Cybersecurity Incident Management identifies and launches actions to enhance the security of our products and services every day.[\/vc_column_text][vc_column_text]<strong>D\u00fcrr IT Service GmbH<\/strong><\/p>\n<p>Carl-Benz-Str. 34<br \/>\n74321 Bietigheim-Bissingen<br \/>\nGermany<\/p>\n<p><a href=\"mailto:cybersecurity@durr.com\">cybersecurity@durr.com<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4><strong>Vulnerability Management<\/strong><\/h4>\n<p>Security vulnerabilities can arise wherever computer-based systems are deployed. Should you identify any security gap in one of our products or services, please do not hesitate to notify us using the form below. We will ensure that the security gap is closed immediately. The disclosure of any vulnerability will of course be treated as strictly confidential.[\/vc_column_text][vc_btn title=&#8221;Vulnerability reporting form&#8221; style=&#8221;classic&#8221; color=&#8221;inverse&#8221; link=&#8221;url:https%3A%2F%2Fwww.durr-group.com%2Fen%2Fcybersecurity&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content&#8221; parallax=&#8221;content-moving-fade&#8221; parallax_image=&#8221;8231&#8243; css=&#8221;.vc_custom_1687177096143{padding-top: 100px !important;padding-bottom: 122px !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css=&#8221;.vc_custom_1446035084676{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column_text el_class=&#8221;container&#8221;] D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.) The D\u00fcrr Group Cybersecurity Incident Management team is responsible for the IT security of our whole Group. [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.) [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text] System [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":25,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-contact.php","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-8225","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>System TM Cybersecurity<\/title>\n<meta name=\"description\" content=\"System TM A\/S is part of the D\u00fcrr Group, whose Cybersecurity Incident Management team is responsible for the IT security of our whole Group.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"System TM Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"System TM A\/S is part of the D\u00fcrr Group, whose Cybersecurity Incident Management team is responsible for the IT security of our whole Group.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"System TM A\/S\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/systemtm\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-20T05:50:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/systemtm.com\/wp-content\/uploads\/2017\/06\/Page_1203_John_Brash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/\",\"url\":\"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/\",\"name\":\"System TM Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/systemtm.com\/#website\"},\"datePublished\":\"2023-06-19T12:24:18+00:00\",\"dateModified\":\"2023-06-20T05:50:32+00:00\",\"description\":\"System TM A\/S is part of the D\u00fcrr Group, whose Cybersecurity Incident Management team is responsible for the IT security of our whole Group.\",\"breadcrumb\":{\"@id\":\"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/systemtm.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service\",\"item\":\"https:\/\/systemtm.com\/service-and-support\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/systemtm.com\/#website\",\"url\":\"https:\/\/systemtm.com\/\",\"name\":\"System TM A\/S\",\"description\":\"Optimization of staff and wood resources\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/systemtm.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"System TM Cybersecurity","description":"System TM A\/S is part of the D\u00fcrr Group, whose Cybersecurity Incident Management team is responsible for the IT security of our whole Group.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"System TM Cybersecurity","og_description":"System TM A\/S is part of the D\u00fcrr Group, whose Cybersecurity Incident Management team is responsible for the IT security of our whole Group.","og_url":"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/","og_site_name":"System TM A\/S","article_publisher":"https:\/\/www.facebook.com\/systemtm\/","article_modified_time":"2023-06-20T05:50:32+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/systemtm.com\/wp-content\/uploads\/2017\/06\/Page_1203_John_Brash.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/","url":"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/","name":"System TM Cybersecurity","isPartOf":{"@id":"https:\/\/systemtm.com\/#website"},"datePublished":"2023-06-19T12:24:18+00:00","dateModified":"2023-06-20T05:50:32+00:00","description":"System TM A\/S is part of the D\u00fcrr Group, whose Cybersecurity Incident Management team is responsible for the IT security of our whole Group.","breadcrumb":{"@id":"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/systemtm.com\/service-and-support\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/systemtm.com\/service-and-support\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/systemtm.com\/"},{"@type":"ListItem","position":2,"name":"Service","item":"https:\/\/systemtm.com\/service-and-support\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/systemtm.com\/#website","url":"https:\/\/systemtm.com\/","name":"System TM A\/S","description":"Optimization of staff and wood resources","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/systemtm.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Aislinn Esterle","author_link":"https:\/\/systemtm.com\/author\/aislinne\/"},"uagb_comment_info":0,"uagb_excerpt":"[vc_row full_width=&#8221;stretch_row_content&#8221; parallax=&#8221;content-moving-fade&#8221; parallax_image=&#8221;8231&#8243; css=&#8221;.vc_custom_1687177096143{padding-top: 100px !important;padding-bottom: 122px !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css=&#8221;.vc_custom_1446035084676{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column_text el_class=&#8221;container&#8221;] D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.) The D\u00fcrr Group Cybersecurity Incident Management team is responsible for the IT security of our whole Group. [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.) [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text] System&hellip;","_links":{"self":[{"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages\/8225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/comments?post=8225"}],"version-history":[{"count":13,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages\/8225\/revisions"}],"predecessor-version":[{"id":8250,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages\/8225\/revisions\/8250"}],"up":[{"embeddable":true,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages\/25"}],"wp:attachment":[{"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/media?parent=8225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}