{"id":593,"date":"2021-07-14T09:07:00","date_gmt":"2021-07-14T07:07:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=593"},"modified":"2021-07-16T12:50:27","modified_gmt":"2021-07-16T10:50:27","slug":"der-standard-14-07-2021","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/der-standard-14-07-2021\/","title":{"rendered":"Der Standard &#8211; 14.07.2021"},"content":{"rendered":"\n<p>\u00dcber Phishing-Mails k\u00f6nnen Hacker an wichtige Daten gelangen und so zum Beispiel das Unternehmen erpressen, wie ein Experte erl\u00e4utert.<\/p>\n\n\n\n<p>Rund eine Milliarde Dollar kostet Cyberkriminalit\u00e4t Firmen j\u00e4hrlich. Ein h\u00e4ufig genutztes Tool der Hacker sind Phishing-Mails, deren Urheber sich w\u00e4hrend der Pandemie weiter professionalisiert haben. Die Beratungsfirma Certitude hat sich auf Cyberkriminalit\u00e4t spezialisiert und betont in Form von Managing-Partner Marc Nimmerrichter, wie einfach es Hacker heute haben, an wichtige Firmendaten zu gelangen.<\/p>\n\n\n\n<p>Den gesamten Artikel des Standard finden Sie <a href=\"https:\/\/www.derstandard.at\/story\/2000128181068\/phishing-so-einfach-gelangen-hacker-an-firmendaten\" data-type=\"URL\" data-id=\"https:\/\/www.derstandard.at\/story\/2000128181068\/phishing-so-einfach-gelangen-hacker-an-firmendaten\">hier<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00dcber Phishing-Mails k\u00f6nnen Hacker an wichtige Daten gelangen und so zum Beispiel das Unternehmen erpressen, wie ein Experte erl\u00e4utert<\/p>\n","protected":false},"author":2,"featured_media":463,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[126],"tags":[121],"class_list":["post-593","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presse","tag-presse"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=593"}],"version-history":[{"count":3,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/593\/revisions"}],"predecessor-version":[{"id":605,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/593\/revisions\/605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/463"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}