{"id":1121,"date":"2023-02-09T14:56:09","date_gmt":"2023-02-09T13:56:09","guid":{"rendered":"https:\/\/www.nameshield.com\/de\/?page_id=1121"},"modified":"2024-08-09T17:33:44","modified_gmt":"2024-08-09T15:33:44","slug":"cyberattacken","status":"publish","type":"page","link":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/","title":{"rendered":"Cyberattacken"},"content":{"rendered":"\n<div class=\"wp-block-columns eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"eplus-wrapper\">Die Gefah\u00adren, die durch Cyber\u00adat\u00adta\u00adcken ent\u00adste\u00adhen sind in aller Mun\u00adde. Wie aber gehen Angrei\u00adfer kon\u00adkret vor? Eine ers\u00adte \u00dcber\u00adsicht m\u00f6g\u00adli\u00adcher Atta\u00adcken haben wir in unse\u00adrem Info\u00adblatt \u201eCyber\u00adat\u00adta\u00adcken\u201c f\u00fcr Sie zusam\u00admen\u00adge\u00adstellt.<\/p>\n\n\n\n<p class=\"eplus-wrapper\">Um Ihnen das Info\u00adblatt zukom\u00admen las\u00adsen zu k\u00f6n\u00adnen, ben\u00f6\u00adti\u00adgen wir Ihren Namen und Ihre E\u2011Mail Adres\u00adse \u2013 vie\u00adlen Dank!<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><div class=\"wp-block-image eplus-skwyE5 eplus-wrapper\">\n<figure class=\"alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\" alt=\"Cyberattacken\" class=\"wp-image-4632\" style=\"width:227px;height:237px\"><\/figure>\n<\/div><\/div>\n<\/div>\n\n\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"eu1\",\n    portalId: \"139723310\",\n    formId: \"5ee26ca1-034e-4711-b151-fedede7a53b3\"\n  });\n<\/script>\n\n\n\n<p class=\"eplus-wrapper\"><\/p>\n\n\n\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Die Gefah\u00adren, die durch Cyber\u00adat\u00adta\u00adcken ent\u00adste\u00adhen sind in aller Mun\u00adde. Wie aber gehen Angrei\u00adfer kon\u00adkret vor? Eine ers\u00adte \u00dcber\u00adsicht m\u00f6g\u00adli\u00adcher Atta\u00adcken haben wir in unse\u00adrem Info\u00adblatt \u201eCyber\u00adat\u00adta\u00adcken\u201c f\u00fcr Sie zusam\u00admen\u00adge\u00adstellt. Um Ihnen das Info\u00adblatt zukom\u00admen las\u00adsen zu k\u00f6n\u00adnen, ben\u00f6\u00adti\u00adgen wir Ihren Namen und Ihre E\u2011Mail Adres\u00adse \u2013 vie\u00adlen Dank!<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1094,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false,"editor_plus_copied_stylings":"{}","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-1121","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattacken - Nameshield<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattacken - Nameshield\" \/>\n<meta property=\"og:description\" content=\"Die Gefah\u00adren, die durch Cyber\u00adat\u00adta\u00adcken ent\u00adste\u00adhen sind in aller Mun\u00adde. Wie aber gehen Angrei\u00adfer kon\u00adkret vor? Eine ers\u00adte \u00dcber\u00adsicht m\u00f6g\u00adli\u00adcher Atta\u00adcken haben wir in unse\u00adrem Info\u00adblatt \u201eCyber\u00adat\u00adta\u00adcken\u201c f\u00fcr Sie zusam\u00admen\u00adge\u00adstellt. Um Ihnen das Info\u00adblatt zukom\u00admen las\u00adsen zu k\u00f6n\u00adnen, ben\u00f6\u00adti\u00adgen wir Ihren Namen und Ihre E\u2011Mail Adres\u00adse \u2013 vie\u00adlen Dank!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/\" \/>\n<meta property=\"og:site_name\" content=\"Nameshield\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-09T15:33:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/in-5-minuten-erklaert\\\/cyberattacken\\\/\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/in-5-minuten-erklaert\\\/cyberattacken\\\/\",\"name\":\"Cyberattacken - Nameshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/in-5-minuten-erklaert\\\/cyberattacken\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/in-5-minuten-erklaert\\\/cyberattacken\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\",\"datePublished\":\"2023-02-09T13:56:09+00:00\",\"dateModified\":\"2024-08-09T15:33:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/in-5-minuten-erklaert\\\/cyberattacken\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/in-5-minuten-erklaert\\\/cyberattacken\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/in-5-minuten-erklaert\\\/cyberattacken\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\",\"contentUrl\":\"https:\\\/\\\/www.nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/in-5-minuten-erklaert\\\/cyberattacken\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ressourcen\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"&#8230; In 5 Minuten erkl\u00e4rt\",\"item\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/ressourcen\\\/in-5-minuten-erklaert\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacken\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/\",\"name\":\"Nameshield\",\"description\":\"Online Assets Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nameshield.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattacken - Nameshield","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/","og_locale":"de_DE","og_type":"article","og_title":"Cyberattacken - Nameshield","og_description":"Die Gefah\u00adren, die durch Cyber\u00adat\u00adta\u00adcken ent\u00adste\u00adhen sind in aller Mun\u00adde. Wie aber gehen Angrei\u00adfer kon\u00adkret vor? Eine ers\u00adte \u00dcber\u00adsicht m\u00f6g\u00adli\u00adcher Atta\u00adcken haben wir in unse\u00adrem Info\u00adblatt \u201eCyber\u00adat\u00adta\u00adcken\u201c f\u00fcr Sie zusam\u00admen\u00adge\u00adstellt. Um Ihnen das Info\u00adblatt zukom\u00admen las\u00adsen zu k\u00f6n\u00adnen, ben\u00f6\u00adti\u00adgen wir Ihren Namen und Ihre E\u2011Mail Adres\u00adse \u2013 vie\u00adlen Dank!","og_url":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/","og_site_name":"Nameshield","article_modified_time":"2024-08-09T15:33:44+00:00","og_image":[{"url":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/","url":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/","name":"Cyberattacken - Nameshield","isPartOf":{"@id":"https:\/\/www.nameshield.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/#primaryimage"},"image":{"@id":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png","datePublished":"2023-02-09T13:56:09+00:00","dateModified":"2024-08-09T15:33:44+00:00","breadcrumb":{"@id":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/#primaryimage","url":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png","contentUrl":"https:\/\/www.nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/cyberattacken\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.nameshield.com\/de\/"},{"@type":"ListItem","position":2,"name":"Ressourcen","item":"https:\/\/www.nameshield.com\/de\/ressourcen\/"},{"@type":"ListItem","position":3,"name":"&#8230; In 5 Minuten erkl\u00e4rt","item":"https:\/\/www.nameshield.com\/de\/ressourcen\/in-5-minuten-erklaert\/"},{"@type":"ListItem","position":4,"name":"Cyberattacken"}]},{"@type":"WebSite","@id":"https:\/\/www.nameshield.com\/de\/#website","url":"https:\/\/www.nameshield.com\/de\/","name":"Nameshield","description":"Online Assets Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nameshield.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/1121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/comments?post=1121"}],"version-history":[{"count":6,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/1121\/revisions"}],"predecessor-version":[{"id":1555,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/1121\/revisions\/1555"}],"up":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/pages\/1094"}],"wp:attachment":[{"href":"https:\/\/www.nameshield.com\/de\/wp-json\/wp\/v2\/media?parent=1121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}