{"id":627,"date":"2021-08-28T14:52:00","date_gmt":"2021-08-28T12:52:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=627"},"modified":"2021-09-08T16:13:55","modified_gmt":"2021-09-08T14:13:55","slug":"kurier-28-08-2021","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/kurier-28-08-2021\/","title":{"rendered":"Kurier &#8211; 28.08.2021"},"content":{"rendered":"\n<p>Immer mehr Unternehmen werden Opfer von Cyberangriffen. Treffen kann es alle &#8211;  egal ob kleine Firma oder gro\u00dfer Konzern. Drei F\u00e4lle, die Einblicke in den Ablauf digitaler Angriffe geben &#8211; und was Spezialisten zur Abwehr raten. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1-1024x691.jpg\" alt=\"\" class=\"wp-image-628\" width=\"904\" height=\"609\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1-1024x691.jpg 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1-300x203.jpg 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1-1536x1037.jpg 1536w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1-2048x1383.jpg 2048w\" sizes=\"auto, (max-width: 904px) 100vw, 904px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2-1024x681.jpg\" alt=\"\" class=\"wp-image-629\" width=\"913\" height=\"607\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2-1024x681.jpg 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2-300x199.jpg 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2-768x510.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2-1536x1021.jpg 1536w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2-2048x1361.jpg 2048w\" sizes=\"auto, (max-width: 913px) 100vw, 913px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"638\" height=\"1024\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1_text-638x1024.jpg\" alt=\"\" class=\"wp-image-652\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1_text-638x1024.jpg 638w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1_text-187x300.jpg 187w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1_text-768x1233.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-1_text.jpg 944w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"846\" height=\"860\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2_text.jpg\" alt=\"\" class=\"wp-image-653\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2_text.jpg 846w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2_text-295x300.jpg 295w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2021\/09\/Kurier-2_text-768x781.jpg 768w\" sizes=\"auto, (max-width: 846px) 100vw, 846px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Immer mehr Unternehmen werden Opfer von Cyberangriffen. Treffen kann es alle &#8211; egal ob kleine Firma oder gro\u00dfer Konzern. Drei F\u00e4lle, die Einblicke in den Ablauf digitaler Angriffe geben &#8211; und was Spezialisten zur Abwehr raten.<\/p>\n","protected":false},"author":2,"featured_media":463,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[126],"tags":[121],"class_list":["post-627","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presse","tag-presse"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=627"}],"version-history":[{"count":3,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/627\/revisions"}],"predecessor-version":[{"id":654,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/627\/revisions\/654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/463"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}