{"id":981,"date":"2020-10-05T14:21:43","date_gmt":"2020-10-05T14:21:43","guid":{"rendered":"https:\/\/webdev.locaterisk.com\/?p=981"},"modified":"2024-02-12T11:04:49","modified_gmt":"2024-02-12T11:04:49","slug":"cyberkriminalitat-betrifft-uns-nicht-oder-doch-2","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/","title":{"rendered":"6 Measures to Protect Your Company from Cybercrime"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">6 Measures to Protect Your Company from Cybercrime<\/h1>\r\n            <p class=\"paragraph\"><strong>Every company should take these safety precautions:<\/strong><br><br>The quality and scope of cyberattacks on companies have increased steadily in recent years. In 2019 alone, criminal attacks on companies in Germany cost them around 102.9 billion euros annually, according to Bitkom. This amount is almost twice as high as in 2017, which is reason enough to take a closer look at the topic. After all, not all companies are as well protected as they think.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<div class=\"wp-block-lr-blog-image-text-article-module blog-image-text-article\"><div class=\"content\"><div class=\"image\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9-1.jpg\"\/><\/div><h6><\/h6><\/div><\/div>\n\n\n\n<p>New technologies and the Internet of Things are part of everyday life for companies in all industries. However, the use of the Internet and networked communication devices results in numerous risks such as identity theft, data espionage and virus attacks. Especially if you store personal data on your website, it is important to guarantee your customers the best possible protection against cyberattacks. Therefore, it is [...]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. up-to-dateness: always install the latest updates<\/h2>\n\n\n\n<p>Hackers often use bugs or security holes in the software to gain access to a system. Therefore, it is important to regularly install the latest updates. Performing updates promptly sounds trivial, but is nevertheless often forgotten. However, it is inevitable to keep all systems up to date at all times. Cyber criminals often exploit gaps in the operating system to gain access to data. A problem that you can eliminate relatively easily, since many technical gaps are eliminated with a patch or update. Furthermore, programs like an antivirus solution and a firewall are important to protect the system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. safety understanding of the employees<\/h2>\n\n\n\n<p>IT processes are becoming increasingly complex and only a few people are familiar with the area. Employees are therefore a frequent target of cyber attacks. It is particularly important to involve employees in the topic of IT security. This does not mean converting every employee into an IT specialist, but rather imparting a basic understanding. Employees must be regularly trained and educated in the handling of sensitive data. It must be clearly defined who is allowed to access which data. They must also be made aware of various problem situations, such as e-mails that contain potential viruses and have not been detected by the virus protection program.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. complex passwords<\/h2>\n\n\n\n<p>Use complex and thus secure passwords that consist of a mixture of numbers, special characters, and upper and lower case letters and, at best, do not form a single word. This makes it more difficult for hackers to guess the password. It also makes sense to create a username that is not easy for a cybercriminal to guess.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. download programs and data only from trusted sources<\/h2>\n\n\n\n<p>In many activities, data and programs need to be downloaded from the Internet on a regular basis. Before downloading, make sure that the source is trustworthy. At best, download the program from the website of the respective manufacturer and not from shady third-party providers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. make backups regularly<\/h2>\n\n\n\n<p>If the PC becomes infected despite all protective measures, important data may be lost. Therefore, create backup copies and test them regularly with regard to their up-to-dateness, functionality and consistency. Keep the backed-up data separate and not accessible via the network. Cloud applications offer one possibility for backup copies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. inform yourself!<\/h2>\n\n\n\n<p>Up-to-date information is the be-all and end-all! Find out regularly about current risks and dangers of cybercrime, the GDPR, and new ways to protect yourself.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Neue Technologien und das Internet der Dinge geh\u00f6ren zum Alltag der Unternehmen s\u00e4mtlicher Branchen. Aus der Nutzung des Internets und vernetzter Kommunikationsger\u00e4te resultieren jedoch zahlreiche Risiken wie Identit\u00e4tsdiebstahl, Datenspionage und Virenangriffe. Insbesondere, wenn Sie personenbezogene Daten auf Ihrer Webseite speichern, ist es wichtig, Ihren Kunden den bestm\u00f6glichen Schutz vor Cyberangriffen zu garantieren. Daher ist es [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1164,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-981","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Ma\u00dfnahmen zum Schutz vor Cyberkriminalit\u00e4t - LocateRisk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Ma\u00dfnahmen zum Schutz vor Cyberkriminalit\u00e4t - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Neue Technologien und das Internet der Dinge geh\u00f6ren zum Alltag der Unternehmen s\u00e4mtlicher Branchen. Aus der Nutzung des Internets und vernetzter Kommunikationsger\u00e4te resultieren jedoch zahlreiche Risiken wie Identit\u00e4tsdiebstahl, Datenspionage und Virenangriffe. Insbesondere, wenn Sie personenbezogene Daten auf Ihrer Webseite speichern, ist es wichtig, Ihren Kunden den bestm\u00f6glichen Schutz vor Cyberangriffen zu garantieren. Daher ist es [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-05T14:21:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-12T11:04:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lukas Baumann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lukas Baumann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/\"},\"author\":{\"name\":\"Lukas Baumann\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/be285cd2771072ea30354332ce8b19cf\"},\"headline\":\"6 Ma\u00dfnahmen zum Schutz vor Cyberkriminalit\u00e4t\",\"datePublished\":\"2020-10-05T14:21:43+00:00\",\"dateModified\":\"2024-02-12T11:04:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/\"},\"wordCount\":677,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_Generisch_03-1.jpg\",\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/\",\"name\":\"6 Ma\u00dfnahmen zum Schutz vor Cyberkriminalit\u00e4t - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_Generisch_03-1.jpg\",\"datePublished\":\"2020-10-05T14:21:43+00:00\",\"dateModified\":\"2024-02-12T11:04:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_Generisch_03-1.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_Generisch_03-1.jpg\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Ma\u00dfnahmen zum Schutz vor Cyberkriminalit\u00e4t\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/be285cd2771072ea30354332ce8b19cf\",\"name\":\"Lukas Baumann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g\",\"caption\":\"Lukas Baumann\"},\"sameAs\":[\"http:\\\/\\\/www.locaterisk.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Measures to protect against cybercrime - LocateRisk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/","og_locale":"en_US","og_type":"article","og_title":"6 Ma\u00dfnahmen zum Schutz vor Cyberkriminalit\u00e4t - LocateRisk","og_description":"Neue Technologien und das Internet der Dinge geh\u00f6ren zum Alltag der Unternehmen s\u00e4mtlicher Branchen. Aus der Nutzung des Internets und vernetzter Kommunikationsger\u00e4te resultieren jedoch zahlreiche Risiken wie Identit\u00e4tsdiebstahl, Datenspionage und Virenangriffe. Insbesondere, wenn Sie personenbezogene Daten auf Ihrer Webseite speichern, ist es wichtig, Ihren Kunden den bestm\u00f6glichen Schutz vor Cyberangriffen zu garantieren. Daher ist es [&hellip;]","og_url":"https:\/\/locaterisk.com\/en\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/","og_site_name":"LocateRisk","article_published_time":"2020-10-05T14:21:43+00:00","article_modified_time":"2024-02-12T11:04:49+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg","type":"image\/jpeg"}],"author":"Lukas Baumann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lukas Baumann","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/"},"author":{"name":"Lukas Baumann","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/be285cd2771072ea30354332ce8b19cf"},"headline":"6 Ma\u00dfnahmen zum Schutz vor Cyberkriminalit\u00e4t","datePublished":"2020-10-05T14:21:43+00:00","dateModified":"2024-02-12T11:04:49+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/"},"wordCount":677,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg","articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/","url":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/","name":"6 Measures to protect against cybercrime - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg","datePublished":"2020-10-05T14:21:43+00:00","dateModified":"2024-02-12T11:04:49+00:00","breadcrumb":{"@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/cyberkriminalitat-betrifft-uns-nicht-oder-doch-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"6 Ma\u00dfnahmen zum Schutz vor Cyberkriminalit\u00e4t"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/be285cd2771072ea30354332ce8b19cf","name":"Lukas Baumann","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c10e053effbd842a0cb8e0fdb227381472ec76a6419d29b4eaa27b5bbb937098?s=96&d=mm&r=g","caption":"Lukas Baumann"},"sameAs":["http:\/\/www.locaterisk.com"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=981"}],"version-history":[{"count":26,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/981\/revisions"}],"predecessor-version":[{"id":2069,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/981\/revisions\/2069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/1164"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}