{"id":797,"date":"2021-11-07T10:29:00","date_gmt":"2021-11-07T08:29:00","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=797"},"modified":"2022-02-10T12:45:52","modified_gmt":"2022-02-10T10:45:52","slug":"profil-07-11-2021","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/de\/profil-07-11-2021\/","title":{"rendered":"Profil &#8211; 07.11.2021"},"content":{"rendered":"\n<p>Die Angriffe von Hackern auf Unternehmen h\u00e4ufen sich. Aleksandar Lacarak ist ein IT-Sicherheitsberater, der sich auf L\u00f6segeldverhandlungen spezialisiert hat. Mit seinem Kollegen Ulrich Kallausch spricht er \u00fcber eine weithin untersch\u00e4tze Bedrohung: Was passiert bei einer &#8220;Ransomware&#8221;- Attacke? Und sollen Betroffene nun bezahlen oder nicht?<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-4-574x1024.jpg\" alt=\"\" class=\"wp-image-1031\" width=\"619\" height=\"1103\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-4-574x1024.jpg 574w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-4-168x300.jpg 168w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-4-768x1370.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-4-861x1536.jpg 861w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-4-1148x2048.jpg 1148w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-4-scaled.jpg 1435w\" sizes=\"auto, (max-width: 619px) 100vw, 619px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-5-732x1024.jpg\" alt=\"\" class=\"wp-image-1033\" width=\"667\" height=\"933\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-5-732x1024.jpg 732w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-5-215x300.jpg 215w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-5-768x1074.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-5-1099x1536.jpg 1099w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-5-1465x2048.jpg 1465w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-5-scaled.jpg 1831w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"721\" height=\"1024\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-6-721x1024.jpg\" alt=\"\" class=\"wp-image-1034\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-6-721x1024.jpg 721w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-6-211x300.jpg 211w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-6-768x1091.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-6-1081x1536.jpg 1081w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-6-1442x2048.jpg 1442w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2022\/02\/Profil-07.11.2021-6-scaled.jpg 1802w\" sizes=\"auto, (max-width: 721px) 100vw, 721px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Die Angriffe von Hackern auf Unternehmen h\u00e4ufen sich. Aleksandar Lacarak ist ein IT-Sicherheitsberater, der sich auf L\u00f6segeldverhandlungen spezialisiert hat. Mit seinem Kollegen Ulrich Kallausch spricht er \u00fcber eine weithin untersch\u00e4tze Bedrohung: Was passiert bei einer &#8220;Ransomware&#8221;- Attacke? Und sollen Betroffene nun bezahlen oder nicht?<\/p>\n","protected":false},"author":6,"featured_media":463,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[126],"tags":[121],"class_list":["post-797","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-presse","tag-presse"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=797"}],"version-history":[{"count":4,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/797\/revisions"}],"predecessor-version":[{"id":1036,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/797\/revisions\/1036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/463"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}