{"id":1350,"date":"2022-06-26T10:07:00","date_gmt":"2022-06-26T08:07:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=1350"},"modified":"2022-06-28T09:39:43","modified_gmt":"2022-06-28T07:39:43","slug":"profil-26-juni-2022","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/profil-26-juni-2022\/","title":{"rendered":"profil &#8211; 26. Juni 2022"},"content":{"rendered":"\n<p><strong>&#8220;Cyberangriffe sind der neuzeitliche Kokainhandel&#8221;<\/strong><\/p>\n\n\n\n<p>Die Angriffe auf \u00d6sterreichs IT-Infrastruktur h\u00e4ufen sich. Nach dem Land K\u00e4rnten war nun die MedUni Innsbruck dran. Die \u00f6ffentliche Verwaltung sei am schlechtesten vor Hackern gesch\u00fctzt, warnt der Sicherheitsexperte Ulrich Kallausch. Und mahnt schnelle Ma\u00dfnahmen ein.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"565\" height=\"724\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/06\/profil_S1.png\" alt=\"\" class=\"wp-image-1351\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/06\/profil_S1.png 565w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/06\/profil_S1-234x300.png 234w\" sizes=\"auto, (max-width: 565px) 100vw, 565px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"554\" height=\"723\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/06\/profil_S2.png\" alt=\"\" class=\"wp-image-1352\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/06\/profil_S2.png 554w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/06\/profil_S2-230x300.png 230w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"558\" height=\"728\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/06\/profil_S3.png\" alt=\"\" class=\"wp-image-1353\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/06\/profil_S3.png 558w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/06\/profil_S3-230x300.png 230w\" sizes=\"auto, (max-width: 558px) 100vw, 558px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Cyberangriffe sind der neuzeitliche Kokainhandel&#8221; Die Angriffe auf \u00d6sterreichs IT-Infrastruktur h\u00e4ufen sich. Nach dem Land K\u00e4rnten war nun die MedUni Innsbruck dran. Die \u00f6ffentliche Verwaltung sei am schlechtesten vor Hackern gesch\u00fctzt, warnt der Sicherheitsexperte Ulrich Kallausch. Und mahnt schnelle Ma\u00dfnahmen ein.<\/p>\n","protected":false},"author":12,"featured_media":463,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[126],"tags":[],"class_list":["post-1350","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presse"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/1350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=1350"}],"version-history":[{"count":2,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/1350\/revisions"}],"predecessor-version":[{"id":1365,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/1350\/revisions\/1365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/463"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=1350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=1350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=1350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}