{"id":74485,"date":"2024-06-24T16:46:48","date_gmt":"2024-06-24T14:46:48","guid":{"rendered":"https:\/\/www.skaylink.com\/?p=74485"},"modified":"2025-04-04T14:39:52","modified_gmt":"2025-04-04T12:39:52","slug":"you-have-been-hacked-und-jetzt","status":"publish","type":"post","link":"https:\/\/www.skaylink.com\/de\/insights\/blog\/you-have-been-hacked-und-jetzt\/","title":{"rendered":"\u201cYou\u2019ve been hacked\u201d \u2013 und jetzt?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"74485\" class=\"elementor elementor-74485\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5117b00e header-keyvisual-container e-flex e-con-boxed e-con e-parent\" data-id=\"5117b00e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16027d7e elementor-align-left elementor-widget elementor-widget-breadcrumbs\" data-id=\"16027d7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.skaylink.com\/de\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a6d397b e-con-full e-flex e-con e-child\" data-id=\"4a6d397b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-47e7e20c header-keyvisual-content e-con-full e-flex e-con e-child\" data-id=\"47e7e20c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48a7d75f elementor-widget elementor-widget-image\" data-id=\"48a7d75f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/AdobeStock_265661427-scaled.jpeg\" class=\"attachment-full size-full wp-image-74486\" alt=\"\" srcset=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/AdobeStock_265661427-scaled.jpeg 2560w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/AdobeStock_265661427-300x200.jpeg 300w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/AdobeStock_265661427-1024x683.jpeg 1024w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/AdobeStock_265661427-768x512.jpeg 768w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/AdobeStock_265661427-1536x1024.jpeg 1536w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/AdobeStock_265661427-2048x1365.jpeg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c859b49 e-con-full e-flex e-con e-child\" data-id=\"4c859b49\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e4b18e8 elementor-widget elementor-widget-text-editor\" data-id=\"4e4b18e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Blog<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34f43b72 elementor-widget elementor-widget-heading\" data-id=\"34f43b72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyberattacke \u201cYou\u2019ve been hacked\u201d \u2013 und jetzt?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-552d5e96 elementor-widget elementor-widget-text-editor\" data-id=\"552d5e96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCompromise Recovery \u2013 der schnellste &amp; effektivste Weg, bei Angriffen wieder Herr \u00fcber die eigene Infrastruktur zu werden \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50da9faf e-flex e-con-boxed e-con e-parent\" data-id=\"50da9faf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5b041b24 e-flex e-con-boxed e-con e-child\" data-id=\"5b041b24\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-43c731a4 e-flex e-con-boxed e-con e-child\" data-id=\"43c731a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fa81224 elementor-widget elementor-widget-text-editor\" data-id=\"7fa81224\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t24. Juni 2024\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e8fcb12 e-flex e-con-boxed e-con e-child\" data-id=\"5e8fcb12\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-53aa62a8 e-flex e-con-boxed e-con e-child\" data-id=\"53aa62a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c8dcb19 elementor-widget elementor-widget-author-box\" data-id=\"2c8dcb19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<span class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tAlexander Bogocz\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53074d31 e-flex e-con-boxed e-con e-child\" data-id=\"53074d31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f6bfcbf elementor-widget elementor-widget-author-box\" data-id=\"5f6bfcbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<span class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tSascha Habegger\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c721f74 e-flex e-con-boxed e-con e-parent\" data-id=\"3c721f74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3eadfcf8 e-con-full e-flex e-con e-child\" data-id=\"3eadfcf8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10345cc9 elementor-widget elementor-widget-text-editor\" data-id=\"10345cc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Und pl\u00f6tzlich geht nichts mehr! Eine Cyberattacke hat die Systeme des eigenen Unternehmens lahmgelegt. Dabei ist es egal, ob die Daten verschl\u00fcsselt, exfiltriert oder Sicherungskopien unbrauchbar gemacht wurden: Der Schaden ist gro\u00df, der damit verbundene \u00c4rger kann sich lange hinziehen. Ein Angriff kann dabei manchmal \u00fcber Monate unbemerkt vorbereitet worden sein, bevor die eigentliche Attacke startet. Das hei\u00dft, die Angreifer*innen sitzen schon seit l\u00e4ngerem verborgen im eigenen System und haben Einsicht sowie Kontrolle \u00fcber viele Tools, Apps und Konten. Nun gilt es, schnell und strategisch vorzugehen, um nicht die gesamte Infrastruktur zu verlieren. Der Weg hei\u00dft Compromise Recovery:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f85bda1 elementor-widget elementor-widget-heading\" data-id=\"7f85bda1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Kontrolle zur\u00fcckgewinnen \u2013 und langfristig behalten!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d21393a elementor-widget elementor-widget-text-editor\" data-id=\"2d21393a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.skaylink.com\/de\/cloud-sicherheit-compliance\/compromise-recovery\/\">Compromise Recovery<\/a> bedeutet, einer Organisation nach einer Infiltrierung ihrer Systeme die Kontrolle \u00fcber ihre Umgebung so zur\u00fcckzugeben, dass sie sie dauerhaft beh\u00e4lt. Dies wird in der Regel dadurch erreicht, dass etliche Sicherheitseinstellungen, Arbeitsabl\u00e4ufe und Nutzungsgewohnheiten ge\u00e4ndert werden. Innerhalb k\u00fcrzester Zeit muss dabei oft nachgeholt werden, was zuvor lange Zeit vers\u00e4umt wurde. Eine Herausforderung, auch f\u00fcr die Administrator*innen der betroffenen Organisation. Sie m\u00fcssen meist ihre Arbeitsweise umstellen und besser verstehen, wo es im System besonders gef\u00e4hrdete Bruchstellen gibt.<\/p><p>Bei Compromise Recovery ist der wichtigste erste Schritt immer, die Authentifizierung-Services wiederherzustellen und die Auswirkungen von z. B. Ransomware zu begrenzen. So gehen unsere Expert*innen in der Regel vor:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-735482a6 elementor-widget elementor-widget-image\" data-id=\"735482a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE4Rc2O\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"312\" src=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/Compromise-Recovery.png\" class=\"attachment-large size-large wp-image-74491\" alt=\"\" srcset=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/Compromise-Recovery.png 929w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/Compromise-Recovery-300x117.png 300w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/Compromise-Recovery-768x299.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">So sieht ein Compromise Recovery nach Empfehlung von Microsoft aus. <\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48b3e13 e-flex e-con-boxed e-con e-parent\" data-id=\"48b3e13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1a2284d e-con-full e-flex e-con e-child\" data-id=\"1a2284d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4142f1b elementor-widget elementor-widget-heading\" data-id=\"4142f1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strategie gewinnt: Angreifer*innen \u00fcberwachen &amp; rasch entfernen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-844f57a elementor-widget elementor-widget-text-editor\" data-id=\"844f57a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sind Angreifer*innen bereits im System, ist es zun\u00e4chst wichtig, von ihnen unbemerkt zu verstehen, wie sie hereinkamen, wo sie bereits sitzen und was genau sie tun. Erst dann k\u00f6nnen sie in einer raschen Aktion entfernt und dauerhaft ausgesperrt werden. Erfolgreiches Compromise Recovery basiert daher auf vier S\u00e4ulen:<\/p><ol><li>Umfang der Kompromittierung erfassen, etwa indem Reaktionen auf Vorf\u00e4lle und Risikoindikatoren erfasst und ausgewertet werden<\/li><li>Angreifer*innen mithilfe passender Threat-Protection-Produkte taktisch \u00fcberwachen<\/li><li>Systeme durch geeignete Kontrollen abh\u00e4rten, um die Angriffsfl\u00e4che von User*innen mit hochprivilegierten Zugriffen zu verringern und so zu verhindern, dass die Angreifer*innen erneut die Kontrolle \u00fcbernehmen<\/li><li>Angreifer*innen aus den Systemen schnell vertreiben bei zeitgleicher Bereitstellung neu aufgebauter Systeme<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a3d0d3 elementor-widget elementor-widget-text-editor\" data-id=\"5a3d0d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Segmentieren der Systeme ist dabei essenziell. Die Priorisierung ist einfacher und neue Systeme k\u00f6nnen passgenau vorbereitet werden. Die Administration mit ihren Prozessen und Abl\u00e4ufen hat dabei stets Priorit\u00e4t 1: Hier wollen Angreifer*innen unbedingt hineingelangen, um m\u00f6glichst umf\u00e4ngliche Kontrolle zu haben. Und bei einer erfolgreichen Attacke ist die Administration in der Regel bereits infiltriert.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89d98bd elementor-widget elementor-widget-text-editor\" data-id=\"89d98bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Um zuk\u00fcnftige Angriffe zu verhindern, ist es wichtig, geeignete Monitoring-Tools einzuf\u00fchren und entsprechend zu schulen. Nur so k\u00f6nnen die Verantwortlichen im Unternehmen Risiken erkennen und lernen, worauf sie achten m\u00fcssen. Dies kann im Compromise Recovery mit einer Analyse des Angriffs und der taktischen \u00dcberwachung der Angreifer*innen verbunden sein. So lernen Administrator*innen direkt, weshalb die Attacke erfolgreich war \u2013 und wie man in Zukunft f\u00fcr Angreifer*innen m\u00f6glichst unattraktiv wird, z. B. durch Multifaktor-Authentifizierung.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-421cfeb elementor-widget elementor-widget-image\" data-id=\"421cfeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/recover-from-identity-compromise\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"202\" src=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/Cyberattacke.png\" class=\"attachment-large size-large wp-image-74502\" alt=\"\" srcset=\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/Cyberattacke.png 1013w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/Cyberattacke-300x76.png 300w, https:\/\/www.skaylink.com\/wp-content\/uploads\/2024\/05\/Cyberattacke-768x194.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Die wichtigsten Handlungsschritte nach einer Cyberattacke<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1cd60f6 e-flex e-con-boxed e-con e-parent\" data-id=\"1cd60f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f538c3c e-con-full e-flex e-con e-child\" data-id=\"f538c3c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36cb39b elementor-widget elementor-widget-heading\" data-id=\"36cb39b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hilfe im Worst Case mit nachhaltigem Effekt<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d804783 elementor-widget elementor-widget-text-editor\" data-id=\"d804783\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Durch professionelles Compromise Recovery muss nicht die gesamte Infrastruktur neu aufgesetzt werden. Das macht Unternehmen nach Angriffen schneller wieder einsatzf\u00e4hig. Eine deutlich verbesserte Admin-Umgebung und neue Sicherheitsprozesse sorgen zudem nachhaltig f\u00fcr mehr Sicherheit. Die Vorteile:\u00a0<\/p><ul><li>Rasche R\u00fcckgewinnung der Kontrolle \u00fcber die eigenen Systeme<\/li><li>Gesch\u00e4rfte Risikowahrnehmung f\u00fcr fr\u00fchzeitige Abwehr von Angriffen<\/li><li>Effektive Kontrollen und Absicherung hoch privilegierter Identit\u00e4ten zur Vermeidung weiterer erfolgreicher Attacken<\/li><\/ul><p>Das Thema Cyberkriminalit\u00e4t und Cyberspionage ist so aktuell wie nie. Auch unter guten Voraussetzungen kann es immer zu einem erfolgreichen Angriff kommen. Skaylink gilt als Teilnehmer der Allianz f\u00fcr Cyber-Sicherheit und Mitglied der Microsoft Intelligent Security Association als anerkannter Experte auf diesem Gebiet. Wir sind sowohl f\u00fcr AWS Security Services als auch f\u00fcr Microsoft Identity &amp; Access Management und Threat Protection zertifiziert. Compromise Recovery geh\u00f6rt f\u00fcr unsere Spezialist*innen zum Alltag. Sie sind akut betroffen und brauchen dringend Hilfe? Oder m\u00f6chten Sie Ihre Systeme pr\u00e4ventiv auf den neuesten Stand bringen?\u00a0 Wir sind f\u00fcr Sie da! <a href=\"https:\/\/www.skaylink.com\/de\/cloud-sicherheit-compliance\/cyber-security-center\/\">Melden Sie sich einfach bei uns.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b92d1ee e-flex e-con-boxed e-con e-parent\" data-id=\"b92d1ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0af5eee e-con-full e-flex e-con e-child\" data-id=\"0af5eee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17d6634 elementor-widget elementor-widget-heading\" data-id=\"17d6634\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Checkliste: Die wichtigsten Schritte bei einer Cyberattacke<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4efb92a elementor-widget elementor-widget-text-editor\" data-id=\"4efb92a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li>Haben Sie in Ihrer Organisation das n\u00f6tige Wissen zur Analyse bzw. Wiederherstellung? Holen Sie sich ggf. bereits in der Anfangsphase des Angriffs Unterst\u00fctzung von Expert*innen f\u00fcr Threat Intelligence oder Anbietern von Schadsoftware-Analysen! Wenden Sie sich zudem an die zust\u00e4ndigen Strafverfolgungsbeh\u00f6rden.<\/li><li>\u00dcberpr\u00fcfen Sie Ihre Systeme, um zu erkennen, wo die Angreifer*innen \u00fcberall sitzen.<\/li><li>Stellen Sie zuerst unternehmenskritische Systeme wieder her. Stellen Sie unbedingt sicher, dass Sie auch Ihre Back-ups auf Korrumpierung untersuchen, bevor sie zur Wiederherstellung genutzt werden.\u00a0<\/li><li>Sobald die gesch\u00e4ftskritischen Systeme wieder in Betrieb sind, stellen Sie die anderen Systeme wieder her. Spezialist*innen f\u00fcr Compromise Recovery k\u00f6nnen Sie bei einer\u00a0 sinnvollen Priorisierung unterst\u00fctzen.<\/li><li>Bringen Sie Ihre Sicherheitsstandards auf aktuellen Stand und denken Sie daran, die Nutzer*innen entsprechend schulen zu lassen, um neue Angriffe zu vermeiden.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5cf5e680 e-flex e-con-boxed e-con e-parent\" data-id=\"5cf5e680\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b3e2dd elementor-hidden-desktop elementor-widget elementor-widget-heading\" data-id=\"1b3e2dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Case Stories<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74e5fe86 elementor-arrows-position-inside elementor-widget elementor-widget-loop-carousel\" data-id=\"74e5fe86\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:70874,&quot;slides_to_show&quot;:&quot;1&quot;,&quot;speed&quot;:800,&quot;_skin&quot;:&quot;post&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;.elementor-loop-container&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-carousel.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"swiper elementor-loop-container elementor-grid\" role=\"list\" dir=\"ltr\">\n\t\t\t\t<div class=\"swiper-wrapper\" aria-live=\"polite\">\n\t\t<style id=\"loop-dynamic-70874\">.e-loop-item-49460 .elementor-element.elementor-element-534ce23f:not(.elementor-motion-effects-element-type-background), .e-loop-item-49460 .elementor-element.elementor-element-534ce23f > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2023\/05\/Depositphotos-18858376.jpg\");}<\/style><style id=\"loop-70874\">.elementor-70874 .elementor-element.elementor-element-55762ecb{--display:flex;--min-height:550px;--flex-direction:row;--container-widget-width:calc( ( 1 - var( --container-widget-flex-grow ) ) * 100% );--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--align-items:stretch;--gap:0px 0px;--row-gap:0px;--column-gap:0px;--overflow:hidden;--margin-top:0%;--margin-bottom:0%;--margin-left:0%;--margin-right:0%;--padding-top:0rem;--padding-bottom:0rem;--padding-left:0rem;--padding-right:0rem;}.elementor-70874 .elementor-element.elementor-element-534ce23f{--display:flex;--padding-top:0px;--padding-bottom:0px;--padding-left:0px;--padding-right:0px;}.elementor-70874 .elementor-element.elementor-element-534ce23f:not(.elementor-motion-effects-element-type-background), .elementor-70874 .elementor-element.elementor-element-534ce23f > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-position:center center;background-size:cover;}.elementor-70874 .elementor-element.elementor-element-373b26ac{--display:flex;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;--justify-content:center;--gap:0px 0px;--row-gap:0px;--column-gap:0px;}.elementor-70874 .elementor-element.elementor-element-373b26ac.e-con{--align-self:center;}.elementor-70874 .elementor-element.elementor-element-0fe0875{--display:flex;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;--justify-content:center;--gap:0px 0px;--row-gap:0px;--column-gap:0px;}.elementor-70874 .elementor-element.elementor-element-0fe0875.e-con{--align-self:center;}.elementor-widget-text-editor{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-size:var( --e-global-typography-text-font-size );font-weight:var( --e-global-typography-text-font-weight );text-decoration:var( --e-global-typography-text-text-decoration );line-height:var( --e-global-typography-text-line-height );color:var( --e-global-color-text );}.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:var( --e-global-color-primary );}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap, .elementor-widget-text-editor.elementor-drop-cap-view-default .elementor-drop-cap{color:var( --e-global-color-primary );border-color:var( --e-global-color-primary );}.elementor-70874 .elementor-element.elementor-element-66b75a3{font-family:var( --e-global-typography-019d6db-font-family ), Sans-serif;font-size:var( --e-global-typography-019d6db-font-size );font-weight:var( --e-global-typography-019d6db-font-weight );text-decoration:var( --e-global-typography-019d6db-text-decoration );line-height:var( --e-global-typography-019d6db-line-height );letter-spacing:var( --e-global-typography-019d6db-letter-spacing );word-spacing:var( --e-global-typography-019d6db-word-spacing );color:var( --e-global-color-c37e4b1 );}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );color:var( --e-global-color-primary );}.elementor-70874 .elementor-element.elementor-element-b58affb .elementor-heading-title{font-family:var( --e-global-typography-849cb99-font-family ), Sans-serif;font-size:var( --e-global-typography-849cb99-font-size );font-weight:var( --e-global-typography-849cb99-font-weight );text-decoration:var( --e-global-typography-849cb99-text-decoration );line-height:var( --e-global-typography-849cb99-line-height );letter-spacing:var( --e-global-typography-849cb99-letter-spacing );word-spacing:var( --e-global-typography-849cb99-word-spacing );color:var( --e-global-color-text );}.elementor-70874 .elementor-element.elementor-element-b58affb > .elementor-widget-container{margin:0em 0em 3em 0em;}.elementor-70874 .elementor-element.elementor-element-29d94ff{font-family:var( --e-global-typography-9ae4c6f-font-family ), Sans-serif;font-size:var( --e-global-typography-9ae4c6f-font-size );font-weight:var( --e-global-typography-9ae4c6f-font-weight );text-decoration:var( --e-global-typography-9ae4c6f-text-decoration );line-height:var( --e-global-typography-9ae4c6f-line-height );letter-spacing:var( --e-global-typography-9ae4c6f-letter-spacing );word-spacing:var( --e-global-typography-9ae4c6f-word-spacing );}.elementor-70874 .elementor-element.elementor-element-29d94ff > .elementor-widget-container{margin:0em 0em 2em 0em;}.elementor-widget-button .elementor-button{font-family:var( --e-global-typography-accent-font-family ), Sans-serif;font-size:var( --e-global-typography-accent-font-size );font-weight:var( --e-global-typography-accent-font-weight );line-height:var( --e-global-typography-accent-line-height );background-color:var( --e-global-color-accent );}.elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button-content-wrapper{flex-direction:row-reverse;}.elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button .elementor-button-content-wrapper{gap:10px;}.elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button{fill:var( --e-global-color-599c03e );color:var( --e-global-color-599c03e );background-color:var( --e-global-color-primary );border-radius:8px 8px 8px 8px;}.elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button:hover, .elementor-70874 .elementor-element.elementor-element-79b359c .elementor-button:focus{background-color:var( --e-global-color-75b740e );}@media(min-width:577px){.elementor-70874 .elementor-element.elementor-element-534ce23f{--width:50%;}.elementor-70874 .elementor-element.elementor-element-373b26ac{--width:8.33333%;}.elementor-70874 .elementor-element.elementor-element-0fe0875{--width:33.333333%;}}@media(max-width:992px) and (min-width:577px){.elementor-70874 .elementor-element.elementor-element-534ce23f{--width:100%;}.elementor-70874 .elementor-element.elementor-element-373b26ac{--width:100%;}.elementor-70874 .elementor-element.elementor-element-0fe0875{--width:100%;}}@media(max-width:992px){.elementor-70874 .elementor-element.elementor-element-55762ecb{--min-height:0px;--flex-wrap:wrap;}.elementor-70874 .elementor-element.elementor-element-534ce23f{--min-height:280px;}.elementor-70874 .elementor-element.elementor-element-0fe0875{--padding-top:30px;--padding-bottom:0px;--padding-left:0px;--padding-right:0px;}.elementor-widget-text-editor{font-size:var( --e-global-typography-text-font-size );line-height:var( --e-global-typography-text-line-height );}.elementor-70874 .elementor-element.elementor-element-66b75a3{font-size:var( --e-global-typography-019d6db-font-size );line-height:var( --e-global-typography-019d6db-line-height );letter-spacing:var( --e-global-typography-019d6db-letter-spacing );word-spacing:var( --e-global-typography-019d6db-word-spacing );}.elementor-70874 .elementor-element.elementor-element-b58affb .elementor-heading-title{font-size:var( --e-global-typography-849cb99-font-size );line-height:var( --e-global-typography-849cb99-line-height );letter-spacing:var( --e-global-typography-849cb99-letter-spacing );word-spacing:var( --e-global-typography-849cb99-word-spacing );}.elementor-70874 .elementor-element.elementor-element-29d94ff{font-size:var( --e-global-typography-9ae4c6f-font-size );line-height:var( --e-global-typography-9ae4c6f-line-height );letter-spacing:var( --e-global-typography-9ae4c6f-letter-spacing );word-spacing:var( --e-global-typography-9ae4c6f-word-spacing );}.elementor-widget-button .elementor-button{font-size:var( --e-global-typography-accent-font-size );line-height:var( --e-global-typography-accent-line-height );}}@media(max-width:576px){.elementor-70874 .elementor-element.elementor-element-534ce23f{--min-height:210px;}.elementor-70874 .elementor-element.elementor-element-373b26ac{--padding-top:12%;--padding-bottom:12%;--padding-left:7%;--padding-right:7%;}.elementor-widget-text-editor{font-size:var( --e-global-typography-text-font-size );line-height:var( --e-global-typography-text-line-height );}.elementor-70874 .elementor-element.elementor-element-66b75a3{font-size:var( --e-global-typography-019d6db-font-size );line-height:var( --e-global-typography-019d6db-line-height );letter-spacing:var( --e-global-typography-019d6db-letter-spacing );word-spacing:var( --e-global-typography-019d6db-word-spacing );}.elementor-70874 .elementor-element.elementor-element-b58affb .elementor-heading-title{font-size:var( --e-global-typography-849cb99-font-size );line-height:var( --e-global-typography-849cb99-line-height );letter-spacing:var( --e-global-typography-849cb99-letter-spacing );word-spacing:var( --e-global-typography-849cb99-word-spacing );}.elementor-70874 .elementor-element.elementor-element-29d94ff{font-size:var( --e-global-typography-9ae4c6f-font-size );line-height:var( --e-global-typography-9ae4c6f-line-height );letter-spacing:var( --e-global-typography-9ae4c6f-letter-spacing );word-spacing:var( --e-global-typography-9ae4c6f-word-spacing );}.elementor-widget-button .elementor-button{font-size:var( --e-global-typography-accent-font-size );line-height:var( --e-global-typography-accent-line-height );}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"70874\" class=\"elementor elementor-70874 elementor-57266 elementor-57266 swiper-slide e-loop-item e-loop-item-49460 post-49460 post type-post status-publish format-standard has-post-thumbnail hentry category-blog tag-microsoft tag-security\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-55762ecb e-flex e-con-boxed e-con e-parent\" data-id=\"55762ecb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-534ce23f e-con-full e-flex e-con e-child\" data-id=\"534ce23f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-373b26ac e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"373b26ac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fe0875 e-con-full e-flex e-con e-child\" data-id=\"0fe0875\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66b75a3 elementor-widget elementor-widget-text-editor\" data-id=\"66b75a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBlog\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b58affb elementor-widget elementor-widget-heading\" data-id=\"b58affb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die wichtigste Verteidigungslinie f\u00fcr Cybersicherheit<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29d94ff elementor-widget elementor-widget-text-editor\" data-id=\"29d94ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWeshalb jedes Unternehmen eine Identity &amp; Access-Strategie braucht \u2013 und wie Microsoft Entra dabei helfen kann\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79b359c elementor-widget elementor-widget-button\" data-id=\"79b359c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.skaylink.com\/de\/insights\/blog\/entra-verteidigungslinie-fuer-cybersicherheit\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"skaylinkicon- skaylink-icon-arrow\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Weiterlesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-70874\">.e-loop-item-42285 .elementor-element.elementor-element-534ce23f:not(.elementor-motion-effects-element-type-background), .e-loop-item-42285 .elementor-element.elementor-element-534ce23f > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2022\/12\/shutterstock-1240786747.jpg\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"70874\" class=\"elementor elementor-70874 elementor-57266 elementor-57266 swiper-slide e-loop-item e-loop-item-42285 post-42285 post type-post status-publish format-standard has-post-thumbnail hentry category-blog tag-microsoft tag-security\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-55762ecb e-flex e-con-boxed e-con e-parent\" data-id=\"55762ecb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-534ce23f e-con-full e-flex e-con e-child\" data-id=\"534ce23f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-373b26ac e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"373b26ac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fe0875 e-con-full e-flex e-con e-child\" data-id=\"0fe0875\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66b75a3 elementor-widget elementor-widget-text-editor\" data-id=\"66b75a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBlog\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b58affb elementor-widget elementor-widget-heading\" data-id=\"b58affb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die Top 5-Verdachtsf\u00e4lle in der IT-Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29d94ff elementor-widget elementor-widget-text-editor\" data-id=\"29d94ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tJeden Tag analysiert das CSC gro\u00dfe Mengen von Verdachtsf\u00e4llen, um Kunden zu sch\u00fctzen. Diese f\u00fcnf Szenarien sind typisch f\u00fcr Angriffe. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79b359c elementor-widget elementor-widget-button\" data-id=\"79b359c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.skaylink.com\/de\/insights\/blog\/top-5-verdachtsfalle-it-security\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"skaylinkicon- skaylink-icon-arrow\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Weiterlesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-70874\">.e-loop-item-31422 .elementor-element.elementor-element-534ce23f:not(.elementor-motion-effects-element-type-background), .e-loop-item-31422 .elementor-element.elementor-element-534ce23f > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/www.skaylink.com\/wp-content\/uploads\/2022\/05\/Depositphotos-1481723.png\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"70874\" class=\"elementor elementor-70874 elementor-57266 elementor-57266 swiper-slide e-loop-item e-loop-item-31422 post-31422 post type-post status-publish format-standard has-post-thumbnail hentry category-blog tag-microsoft tag-security\" data-elementor-post-type=\"elementor_library\" role=\"group\" aria-roledescription=\"slide\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-55762ecb e-flex e-con-boxed e-con e-parent\" data-id=\"55762ecb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-534ce23f e-con-full e-flex e-con e-child\" data-id=\"534ce23f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-373b26ac e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"373b26ac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fe0875 e-con-full e-flex e-con e-child\" data-id=\"0fe0875\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66b75a3 elementor-widget elementor-widget-text-editor\" data-id=\"66b75a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBlog\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b58affb elementor-widget elementor-widget-heading\" data-id=\"b58affb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Zero Trust<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29d94ff elementor-widget elementor-widget-text-editor\" data-id=\"29d94ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWas bedeutet Zero Trust? Und wie kann dieses Modell die Security Posture Ihres Unternehmens optimieren?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79b359c elementor-widget elementor-widget-button\" data-id=\"79b359c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.skaylink.com\/de\/insights\/blog\/zero-trust\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"skaylinkicon- skaylink-icon-arrow\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Weiterlesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Voriger\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"skaylinkicon- skaylink-icon-arrow-circle-left\"><\/i>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"N\u00e4chster\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"skaylinkicon- skaylink-icon-arrow-circle-right\"><\/i>\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Compromise Recovery \u2013 der schnellste &#038; effektivste Weg, bei Angriffen wieder Herr \u00fcber die eigene Infrastruktur zu werden <\/p>\n","protected":false},"author":23,"featured_media":74486,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[26],"tags":[71,125,126],"class_list":["post-74485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-aws","tag-microsoft","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/posts\/74485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/comments?post=74485"}],"version-history":[{"count":61,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/posts\/74485\/revisions"}],"predecessor-version":[{"id":84979,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/posts\/74485\/revisions\/84979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/media\/74486"}],"wp:attachment":[{"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/media?parent=74485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/categories?post=74485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.skaylink.com\/de\/wp-json\/wp\/v2\/tags?post=74485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}