{"id":3164,"date":"2024-07-19T13:08:03","date_gmt":"2024-07-19T13:08:03","guid":{"rendered":"https:\/\/www.cyber-rs.de\/home-3\/"},"modified":"2025-02-12T13:25:20","modified_gmt":"2025-02-12T13:25:20","slug":"home-3","status":"publish","type":"page","link":"https:\/\/www.cyber-rs.de\/en\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3164\" class=\"elementor elementor-3164 elementor-2895\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b0e17f3 elementor-section-height-min-height elementor-section-content-middle elementor-section-full_width elementor-section-height-default elementor-section-items-middle\" data-id=\"b0e17f3\" data-element_type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ed124d5\" data-id=\"ed124d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e2f964 elementor-widget elementor-widget-heading\" data-id=\"7e2f964\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Are you safe?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-abafc67 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"abafc67\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-501a6b0\" data-id=\"501a6b0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-944f2a3 elementor-widget elementor-widget-heading\" data-id=\"944f2a3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We support you in mastering your daily IT threats<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbb129 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0dbb129\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">We test your infrastructure &ndash; Simply get in touch!<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9c83d6 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"a9c83d6\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/www.cyber-rs.de\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cb71212 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cb71212\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8ec70e0\" data-id=\"8ec70e0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d515eb0 elementor-widget elementor-widget-shortcode\" data-id=\"d515eb0\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\r\n\t<style type=\"text\/css\">\r\n\t\t#wpnw-ticker-style-1 {border-color: #81d742;}\r\n\t\t#wpnw-ticker-style-1 .wpnw-style-label {background-color: #81d742;}\r\n\t\t#wpnw-ticker-style-1 .wpnw-style-label-title {color: #fff;}\r\n\t\t#wpnw-ticker-style-1 .wpnw-style-label > span {border-color: transparent transparent transparent #81d742;}\r\n\t\t#wpnw-ticker-style-1 .wpnw-style-news a:hover {color: #81d742;}\r\n\t\t#wpnw-ticker-style-1 .wpnw-style-news a {color: #000000;}\r\n\t\t#wpnw-ticker-style-1 .wpos-controls .wpos-icons {background-color: #f6f6f6; border-color: #999999;}\r\n\t\t#wpnw-ticker-style-1 .wpos-controls .wpos-icons:hover {background-color: #eeeeee;}\r\n\t\t#wpnw-ticker-style-1 .wpos-controls .wpnw-arrows span,\r\n\t\t#wpnw-ticker-style-1 .wpos-controls .wpnw-pause .wpos-play {color: #999999;}\r\n\t\t#wpnw-ticker-style-1 .wpos-controls .wpnw-arrows:hover span,\r\n\t\t#wpnw-ticker-style-1 .wpos-controls .wpnw-pause:hover .wpos-play {color: #999999;}\r\n\t\t#wpnw-ticker-style-1 .wpos-controls .wpnw-pause span {background-color: #999999;}\r\n\t\t#wpnw-ticker-style-1 .wpos-controls .wpnw-pause:hover span {background-color: #999999;}\r\n\t<\/style>\r\n\r\n\t\r\n<div class=\"wpnaw-wrap wpnw-ticker-wrp wpnw-news-ticker wpos-news-ticker wpnw-clearfix \" id=\"wpnw-ticker-style-1\" data-conf='{\"ticker_effect\":\"typography\",\"autoplay\":\"true\",\"speed\":6000,\"font_style\":\"normal\",\"scroll_speed\":1}'>\r\n\r\n\t\t<div class=\"wpos-label wpnw-style-label\">\r\n\t\t<div class=\"wpnw-style-label-title\">Aktuelle Neuigkeiten<\/div>\r\n\t\t<span><\/span>\r\n\t<\/div>\r\n\t\r\n\t<div class=\"wpos-controls wpnw-style-controls\">\r\n\t\t\t\t<div class=\"wpos-icons wpnw-arrows\"><span class=\"wpos-arrow wpos-prev\"><\/span><\/div>\r\n\t\t\t\t<div class=\"wpos-icons wpnw-arrows\"><span class=\"wpos-arrow wpos-next\"><\/span><\/div>\r\n\t\t\t<\/div>\r\n\r\n\t<div class=\"wpos-news wpnw-news wpnw-style-news\">\r\n\t\t<ul>\r\n<li>\r\n\t\t\t<a class=\"wpnw-ticker-news wpos-ticker-news\" href=\"https:\/\/www.presseportal.de\/pm\/55903\/5957269\" target=\"_self\">WAZ: Reul warnt vor Bedrohung durch Cybercrime in NRW &ndash; Straftaten &uuml;ber das Internet im Jahr 2023 um 12% gestiegen.<\/a>\r\n\t<\/li>\r\n<li>\r\n\t\t\t<a class=\"wpnw-ticker-news wpos-ticker-news\" href=\"https:\/\/www.cyber-rs.de\/en\/news\/cyberkriminelle-sind-professionell-aggressiv-und-haben-immer-leistungsfaehigere-technik-2\/\" target=\"_self\">Aktueller Lagebericht des Bundesamts f&uuml;r Sicherheit in der Informationstechnik (BSI) zeigt eine besorgniserregende IT-Sicherheitslage in Deutschland<\/a>\r\n\t<\/li>\r\n\t\t<\/ul>\r\n\t<\/div>\r\n<\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ozdpeug elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ozdpeug\" data-element_type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fcwlain\" data-id=\"fcwlain\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ucsoudo elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ucsoudo\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-audmciy\" data-id=\"audmciy\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f15b5d elementor-widget elementor-widget-heading\" data-id=\"4f15b5d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber risks in Germany<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-sbdgmfl elementor-widget elementor-widget-menu-anchor\" data-id=\"sbdgmfl\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"explore\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-unvkxrt elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"unvkxrt\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-sdwiuoh\" data-id=\"sdwiuoh\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-uygdcpv elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-header\" data-id=\"uygdcpv\" data-element_type=\"widget\" data-settings='{\"_animation\":\"fadeIn\",\"_animation_delay\":0}' data-widget_type=\"themo-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-header-wrap\">\n        <div class=\"elementor-icon-box-wrapper \">\n                            <div class=\"elementor-icon-box-content\">\n                    <h2 class=\"elementor-icon-box-title\">\n                        117 million                    <\/h2>\n                                        <p class=\"elementor-icon-box-description\">new types of malware were registered last year alone.<\/p>\n\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-yotrdnw\" data-id=\"yotrdnw\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-hqvcped elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-header\" data-id=\"hqvcped\" data-element_type=\"widget\" data-settings='{\"_animation\":\"fadeIn\",\"_animation_delay\":250}' data-widget_type=\"themo-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-header-wrap\">\n        <div class=\"elementor-icon-box-wrapper \">\n                            <div class=\"elementor-icon-box-content\">\n                    <h2 class=\"elementor-icon-box-title\">\n                        46%                    <\/h2>\n                                        <p class=\"elementor-icon-box-description\">rank digitization as a driving factor in vulnerability to cyber risks.<\/p>\n\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-hwrmokk\" data-id=\"hwrmokk\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-drddoao elementor-view-default elementor-position-top elementor-invisible elementor-widget elementor-widget-themo-header\" data-id=\"drddoao\" data-element_type=\"widget\" data-settings='{\"_animation\":\"fadeIn\",\"_animation_delay\":500}' data-widget_type=\"themo-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-header-wrap\">\n        <div class=\"elementor-icon-box-wrapper \">\n                            <div class=\"elementor-icon-box-content\">\n                    <h2 class=\"elementor-icon-box-title\">\n                        67%                    <\/h2>\n                                        <p class=\"elementor-icon-box-description\">consider <a href=\"https:\/\/www.cyber-rs.de\/en\/glossar\/ddos-attack\/\" target=\"_self\" title=\"A DDoS attack (Distributed Denial of Service) is a cyber attack that aims to make a system - usually a web server or online service - inaccessible by overloading its resources. To do this, the server or network is flooded with an enormous amount of data traffic from many different sources at the same time,&hellip;\" class=\"encyclopedia\">DDoS attack<\/a>s to be a security risk with significant impact.<\/p>\n\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-pxnaret elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"pxnaret\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-mvxtuad\" data-id=\"mvxtuad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ovkccum elementor-widget elementor-widget-spacer\" data-id=\"ovkccum\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-mjrmqiw elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"mjrmqiw\" data-element_type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-poqrspb\" data-id=\"poqrspb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-amxojbv elementor-widget elementor-widget-spacer\" data-id=\"amxojbv\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-zelhats elementor-widget__width-initial elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-header\" data-id=\"zelhats\" data-element_type=\"widget\" data-widget_type=\"themo-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-header-wrap\">\n        <div class=\"elementor-icon-box-wrapper \">\n                            <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        Our solutions - to protect you from attacks                    <\/h3>\n                                        <p class=\"elementor-icon-box-description\">\n<\/p>\n\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-hzidhql elementor-widget elementor-widget-spacer\" data-id=\"hzidhql\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-lydtkjx elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"lydtkjx\" data-element_type=\"section\" data-settings='{\"animation\":\"fadeInUp\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-uaxqqfp\" data-id=\"uaxqqfp\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-hyoipjm elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-service-block\" data-id=\"hyoipjm\" data-element_type=\"widget\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-md\">\n                        <span class=\"elementor-icon \">\n                            <i aria-hidden=\"true\" class=\"th-linea icon th-linea icon-arrows-circle-check\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h5 class=\"elementor-icon-box-title\">\n                        <span><\/span>\n                    <\/h5>\n                    <p class=\"elementor-icon-box-description\">Continuously updated security feed with more than 190,000 vulnerability tests and policies<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-uvhvnpt\" data-id=\"uvhvnpt\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-noywuny elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-service-block\" data-id=\"noywuny\" data-element_type=\"widget\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-md\">\n                        <span class=\"elementor-icon \">\n                            <i aria-hidden=\"true\" class=\"th-linea icon th-linea icon-basic-elaboration-document-refresh\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h5 class=\"elementor-icon-box-title\">\n                        <span><\/span>\n                    <\/h5>\n                    <p class=\"elementor-icon-box-description\">Choose from three product lines depending on the size of your company from\n(or even combine them):\nHardware, virtual &amp; cloud services<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-flkfgmk\" data-id=\"flkfgmk\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-vzxkiae elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-service-block\" data-id=\"vzxkiae\" data-element_type=\"widget\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-md\">\n                        <span class=\"elementor-icon \">\n                            <i aria-hidden=\"true\" class=\"th-linea icon th-linea icon-basic-settings\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h5 class=\"elementor-icon-box-title\">\n                        <span><\/span>\n                    <\/h5>\n                    <p class=\"elementor-icon-box-description\">Professional Services through Greenbone Networks and Partners  <\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-qpnkjnk elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"qpnkjnk\" data-element_type=\"section\" data-settings='{\"animation\":\"fadeInUp\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-dwwjtwl\" data-id=\"dwwjtwl\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-lchobvv elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-service-block\" data-id=\"lchobvv\" data-element_type=\"widget\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-md\">\n                        <span class=\"elementor-icon \">\n                            <i aria-hidden=\"true\" class=\"th-linea icon th-linea icon-basic-clockwise\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h5 class=\"elementor-icon-box-title\">\n                        <span><\/span>\n                    <\/h5>\n                    <p class=\"elementor-icon-box-description\">Proof of Concept (POC) in the cloud usable within 15 minutes<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-wrsgguj\" data-id=\"wrsgguj\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ikqwqow elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-service-block\" data-id=\"ikqwqow\" data-element_type=\"widget\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-md\">\n                        <span class=\"elementor-icon \">\n                            <i aria-hidden=\"true\" class=\"th-trip travelpack th-trip travelpack-person-plus\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h5 class=\"elementor-icon-box-title\">\n                        <span><\/span>\n                    <\/h5>\n                    <p class=\"elementor-icon-box-description\">Extensive partner network - accompanies you in all questions<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-gxkuunk\" data-id=\"gxkuunk\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-jarmvxa elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-service-block\" data-id=\"jarmvxa\" data-element_type=\"widget\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-md\">\n                        <span class=\"elementor-icon \">\n                            <i aria-hidden=\"true\" class=\"th-linea icon th-linea icon-ecommerce-safe\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h5 class=\"elementor-icon-box-title\">\n                        <span><\/span>\n                    <\/h5>\n                    <p class=\"elementor-icon-box-description\">We guarantee digital sovereignty nor DSGVO guidelines - Vulnerability Management Made in Germany<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-cppxrdn elementor-widget elementor-widget-spacer\" data-id=\"cppxrdn\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-mglgmkh elementor-widget elementor-widget-spacer\" data-id=\"mglgmkh\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ugykijp elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"ugykijp\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fayjbcx\" data-id=\"fayjbcx\" data-element_type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ddaaqrq elementor-widget elementor-widget-spacer\" data-id=\"ddaaqrq\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-nrlqanx\" data-id=\"nrlqanx\" data-element_type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-qhdvxey elementor-position-left elementor-view-default elementor-widget elementor-widget-themo-header\" data-id=\"qhdvxey\" data-element_type=\"widget\" data-widget_type=\"themo-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-header-wrap\">\n        <div class=\"elementor-icon-box-wrapper \">\n                            <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        What is vulnerability management?                    <\/h3>\n                                        <p class=\"elementor-icon-box-description\">In today's digital world, vulnerability management and cyber security are critical for businesses. Cyberattacks are on the rise and can have a devastating impact on businesses, from financial losses to reputational damage. <a href=\"https:\/\/www.cyber-rs.de\/en\/glossar\/vulnerability-management-2\/\" target=\"_self\" title=\"Vulnerability management refers to the process of identifying, assessing and eliminating security gaps in an IT infrastructure or software. The aim of vulnerability management is to minimize the risk of attacks on a system by identifying and eliminating security gaps before they can be exploited by attackers. Typically, vulnerability management begins with a comprehensive risk&hellip;\" class=\"encyclopedia\">Vulnerability management<\/a> is an important aspect of cyber security and refers to the identification, assessment and remediation of vulnerabilities in IT systems.<\/p>\n\n                                            <div class=\"th-btn-wrap\">\n                                                            <a class=\"btn-1 btn th-btn btn-standard-primary\" href=\"\/schwachstellenmangement\">\n                                                                            Learn more                                                                    <\/a>\n                            \n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ikypdom elementor-section-full_width elementor-reverse-mobile elementor-section-height-default elementor-section-height-default\" data-id=\"ikypdom\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-uapbayh\" data-id=\"uapbayh\" data-element_type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-vlbotzy elementor-position-left elementor-view-default elementor-widget elementor-widget-themo-header\" data-id=\"vlbotzy\" data-element_type=\"widget\" data-widget_type=\"themo-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-header-wrap\">\n        <div class=\"elementor-icon-box-wrapper \">\n                            <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        Three core functions: Discover, Analyze, Report                    <\/h3>\n                                        <p class=\"elementor-icon-box-description\">Our approach comprises three essential core functions to improve your security situation:\n\n1. Proactive discovery of systems and services\n2. Analyze the detected targets as an attacker would\n3. Report findings and propose solutions<\/p>\n\n                                            <div class=\"th-btn-wrap\">\n                                                            <a class=\"btn-1 btn th-btn btn-standard-primary\" href=\"\/ueber-uns\/ueber-crs\/\">\n                                                                            Learn more                                                                    <\/a>\n                            \n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-hywjide\" data-id=\"hywjide\" data-element_type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-pqrnkcf elementor-widget elementor-widget-spacer\" data-id=\"pqrnkcf\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-figzxhj elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"figzxhj\" data-element_type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-wahfqlk\" data-id=\"wahfqlk\" data-element_type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-shdbbcz elementor-widget elementor-widget-spacer\" data-id=\"shdbbcz\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-nhrmanq\" data-id=\"nhrmanq\" data-element_type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-jvimcyk elementor-position-left elementor-view-default elementor-widget elementor-widget-themo-header\" data-id=\"jvimcyk\" data-element_type=\"widget\" data-widget_type=\"themo-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-header-wrap\">\n        <div class=\"elementor-icon-box-wrapper \">\n                            <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        Why is vulnerability management important?                    <\/h3>\n                                        <p class=\"elementor-icon-box-description\">Vulnerabilities can be caused by faulty software, lack of security updates, or lack of security measures. Attackers can exploit these vulnerabilities to penetrate a system, steal data or cause damage. Regular monitoring and remediation of vulnerabilities is therefore essential to minimize the risk of cyberattacks.<\/p>\n\n                                            <div class=\"th-btn-wrap\">\n                                                            <a class=\"btn-1 btn th-btn btn-standard-primary\" href=\"\/schwachstellenmanagement\">\n                                                                            Learn more                                                                    <\/a>\n                            \n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-sgdxmdc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"sgdxmdc\" data-element_type=\"section\" data-settings='{\"background_background\":\"gradient\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fujpacm\" data-id=\"fujpacm\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aunxldj elementor-widget elementor-widget-menu-anchor\" data-id=\"aunxldj\" data-element_type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"how-it-works\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-okivqzx elementor-widget elementor-widget-spacer\" data-id=\"okivqzx\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ggbtcru elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-header\" data-id=\"ggbtcru\" data-element_type=\"widget\" data-widget_type=\"themo-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-header-wrap\">\n        <div class=\"elementor-icon-box-wrapper \">\n                            <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        Quick Facts                    <\/h3>\n                                        <p class=\"elementor-icon-box-description\"><\/p>\n\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-kvidpfn elementor-widget elementor-widget-spacer\" data-id=\"kvidpfn\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-hdlbxdo elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"hdlbxdo\" data-element_type=\"section\" data-settings='{\"animation\":\"fadeInUp\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-jqypede\" data-id=\"jqypede\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-yosdach elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-service-block\" data-id=\"yosdach\" data-element_type=\"widget\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-md\">\n                        <span class=\"elementor-icon \">\n                            <i aria-hidden=\"true\" class=\"fas fa-download\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h5 class=\"elementor-icon-box-title\">\n                        <span>&gt; 50.000<\/span>\n                    <\/h5>\n                    <p class=\"elementor-icon-box-description\">Installations<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-pwndhis\" data-id=\"pwndhis\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-gcaujid elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-service-block\" data-id=\"gcaujid\" data-element_type=\"widget\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-md\">\n                        <span class=\"elementor-icon \">\n                            <i aria-hidden=\"true\" class=\"fas fa-angle-down\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h5 class=\"elementor-icon-box-title\">\n                        <span>99,9%<\/span>\n                    <\/h5>\n                    <p class=\"elementor-icon-box-description\">Reduction of the attack possibilities<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-vgjansr\" data-id=\"vgjansr\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fcvidfy elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-service-block\" data-id=\"fcvidfy\" data-element_type=\"widget\" data-widget_type=\"themo-service-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-service-block-w\">\n            <div class=\"elementor-icon-box-wrapper th-show-icon\">\n                                    <div class=\"elementor-icon-box-icon th-icon-size-md\">\n                        <span class=\"elementor-icon \">\n                            <i aria-hidden=\"true\" class=\"fas fa-ruler-horizontal\"><\/i>                        <\/span>\n                    <\/div>\n                                <div class=\"elementor-icon-box-content\">\n                    <h5 class=\"elementor-icon-box-title\">\n                        <span>&gt; 1.000<\/span>\n                    <\/h5>\n                    <p class=\"elementor-icon-box-description\">Auditable compliance rules<\/p>\n                <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-odixfyx elementor-widget elementor-widget-spacer\" data-id=\"odixfyx\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-zsvidfz elementor-widget elementor-widget-spacer\" data-id=\"zsvidfz\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-svhbxri elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"svhbxri\" data-element_type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ipxxlur\" data-id=\"ipxxlur\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-iyldubw elementor-widget elementor-widget-spacer\" data-id=\"iyldubw\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-qowkthm elementor-view-default elementor-position-top elementor-widget elementor-widget-themo-header\" data-id=\"qowkthm\" data-element_type=\"widget\" data-widget_type=\"themo-header.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-header-wrap\">\n        <div class=\"elementor-icon-box-wrapper \">\n                            <div class=\"elementor-icon-box-content\">\n                    <h3 class=\"elementor-icon-box-title\">\n                        Our magazine articles                    <\/h3>\n                                        <p class=\"elementor-icon-box-description\">Take a look at our current publications here.<\/p>\n\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-hqdwaig elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"hqdwaig\" data-element_type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-crxnbvt\" data-id=\"crxnbvt\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-pnjeisl elementor-widget elementor-widget-themo-blog\" data-id=\"pnjeisl\" data-element_type=\"widget\" data-widget_type=\"themo-blog.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                                <section class=\"th-masonry-blog th-blog-3-col\">\n\n                        <div class=\"mas-blog row\">\n                            <div class=\"mas-blog-post-sizer col-sm-6 col-md-4\"><\/div>\n                                                                                            <div class=\"mas-blog-post col-sm-6 col-md-4 post-2694 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized\">\n                                        \t\t<a href=\"https:\/\/www.cyber-rs.de\/en\/increasing-it-security\/\">\n\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"850\" src=\"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security.png\" class=\"img-responsive wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security.png 1280w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security-300x199.png 300w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security-1024x680.png 1024w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security-768x510.png 768w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security-45x30.png 45w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security-120x80.png 120w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security-394x262.png 394w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security-915x608.png 915w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security-1240x823.png 1240w\" sizes=\"(max-width: 1280px) 100vw, 1280px\">    \t<\/a>\n    <div class=\"post-inner\">\n\n        <h3 class=\"post-title\"><a href=\"https:\/\/www.cyber-rs.de\/en\/increasing-it-security\/\">Increasing IT security<\/a><\/h3>\n    \t<div class=\"post-meta\"><span class=\"show-author\">Posted by <a href=\"https:\/\/www.cyber-rs.de\/en\/author\/jan_crs_4713\/\" title=\"Posts by Jan H&ouml;ttges\" rel=\"author\">Jan H&ouml;ttges<\/a><\/span> <span class=\"show-date\"><span class=\"pre-date\">on<\/span> <time class=\"published\" datetime=\"2024-05-28T09:45:16+00:00\">May 28, 2024<\/time><\/span> <span class=\"is-sticky\">| Featured<\/span> <span class=\"show-comments\"><\/span><\/div>\n\t            \t<div class=\"entry-content post-excerpt\">\n\t\t\t\t\t<p><a href=\"https:\/\/www.cyber-rs.de\/en\/glossar\/cybercrime\/\" target=\"_self\" title=\"Cybercrime refers to criminal offenses that are committed using computer systems, the internet or other digital technologies. These crimes can be committed by individuals, groups or organizations and can take a variety of forms, including: Phishing: The attempt to steal sensitive information such as usernames, passwords or credit card numbers through fake websites or emails.&hellip;\" class=\"encyclopedia\">Cybercrime<\/a> has risen continuously in recent years. Cyber criminals exploit various vulnerabilities: Users &ndash; hackers gain access to systems via phishing emails or careless handling of passwords -&gt; Regular training, including phishing training, helps to raise employee awareness. However, regular &hellip; <a href=\"https:\/\/www.cyber-rs.de\/en\/increasing-it-security\/\">Read More<\/a><\/p>\n                <\/div>\n\t\t\t\t\n\n\n<\/div>\n                                <\/div>\n\n                                                                                            <div class=\"mas-blog-post col-sm-6 col-md-4 post-2696 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized\">\n                                        \t\t<a href=\"https:\/\/www.cyber-rs.de\/en\/the-importance-of-cyber-resilience-how-to-protect-your-business-from-cyber-threats\/\">\n\t\t\t<img decoding=\"async\" width=\"640\" height=\"426\" src=\"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/09\/circles-6915521_640.jpg\" class=\"img-responsive wp-post-image\" alt=\"\" srcset=\"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/09\/circles-6915521_640.jpg 640w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/09\/circles-6915521_640-300x200.jpg 300w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/09\/circles-6915521_640-45x30.jpg 45w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/09\/circles-6915521_640-120x80.jpg 120w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/09\/circles-6915521_640-394x262.jpg 394w\" sizes=\"(max-width: 640px) 100vw, 640px\">    \t<\/a>\n    <div class=\"post-inner\">\n\n        <h3 class=\"post-title\"><a href=\"https:\/\/www.cyber-rs.de\/en\/the-importance-of-cyber-resilience-how-to-protect-your-business-from-cyber-threats\/\">The importance of cyber resilience: how to protect your business from cyber threats<\/a><\/h3>\n    \t<div class=\"post-meta\"><span class=\"show-author\">Posted by <a href=\"https:\/\/www.cyber-rs.de\/en\/author\/jan_crs_4713\/\" title=\"Posts by Jan H&ouml;ttges\" rel=\"author\">Jan H&ouml;ttges<\/a><\/span> <span class=\"show-date\"><span class=\"pre-date\">on<\/span> <time class=\"published\" datetime=\"2023-09-04T10:36:27+00:00\">September 4, 2023<\/time><\/span> <span class=\"is-sticky\">| Featured<\/span> <span class=\"show-comments\"><\/span><\/div>\n\t            \t<div class=\"entry-content post-excerpt\">\n\t\t\t\t\t<p>Cyber resilience is the ability of companiesrecognize cyber threats, counteract them and recover from the effects of a cyber attack. It is a holistic approach that aims to minimize the impact of cyberattacks and maintain business operations. In contrast to &hellip; <a href=\"https:\/\/www.cyber-rs.de\/en\/the-importance-of-cyber-resilience-how-to-protect-your-business-from-cyber-threats\/\">Read More<\/a><\/p>\n                <\/div>\n\t\t\t\t\n\n\n<\/div>\n                                <\/div>\n\n                                                                                            <div class=\"mas-blog-post col-sm-6 col-md-4 post-2698 post type-post status-publish format-standard has-post-thumbnail hentry category-uncategorized\">\n                                        \t\t<a href=\"https:\/\/www.cyber-rs.de\/en\/protecting-your-company-from-cyber-threats-the-importance-of-vulnerability-management\/\">\n\t\t\t<img decoding=\"async\" width=\"1280\" height=\"837\" src=\"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1.jpg\" class=\"img-responsive wp-post-image\" alt=\"Computer-Tastatur auf der ein Zahlenschloss steht\" srcset=\"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1.jpg 1280w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1-300x196.jpg 300w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1-1024x670.jpg 1024w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1-768x502.jpg 768w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1-46x30.jpg 46w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1-122x80.jpg 122w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1-394x258.jpg 394w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1-915x598.jpg 915w, https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/07\/computer-1591018_1280-1-1240x811.jpg 1240w\" sizes=\"(max-width: 1280px) 100vw, 1280px\">    \t<\/a>\n    <div class=\"post-inner\">\n\n        <h3 class=\"post-title\"><a href=\"https:\/\/www.cyber-rs.de\/en\/protecting-your-company-from-cyber-threats-the-importance-of-vulnerability-management\/\">Protecting your company from cyber threats: The importance of vulnerability management<\/a><\/h3>\n    \t<div class=\"post-meta\"><span class=\"show-author\">Posted by <a href=\"https:\/\/www.cyber-rs.de\/en\/author\/info_pp9sgtsl\/\" title=\"Posts by Bernd Guenssler\" rel=\"author\">Bernd Guenssler<\/a><\/span> <span class=\"show-date\"><span class=\"pre-date\">on<\/span> <time class=\"published\" datetime=\"2023-07-18T07:13:07+00:00\">July 18, 2023<\/time><\/span> <span class=\"is-sticky\">| Featured<\/span> <span class=\"show-comments\"><\/span><\/div>\n\t            \t<div class=\"entry-content post-excerpt\">\n\t\t\t\t\t<p>In an increasingly networked and digitalized world, it is crucial for companies to protect their systems and data from cyber threats. Cyber threats are constantly on the rise and can cause considerable damage. One effective method of minimizing the risk &hellip; <a href=\"https:\/\/www.cyber-rs.de\/en\/protecting-your-company-from-cyber-threats-the-importance-of-vulnerability-management\/\">Read More<\/a><\/p>\n                <\/div>\n\t\t\t\t\n\n\n<\/div>\n                                <\/div>\n\n                                                    <\/div>\n                                            <\/section>\n\n                    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-22f2afc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"22f2afc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54165fe\" data-id=\"54165fe\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-htjlwdj elementor-invisible elementor-widget elementor-widget-themo-testimonial\" data-id=\"htjlwdj\" data-element_type=\"widget\" data-settings='{\"_animation\":\"fadeInDown\"}' data-widget_type=\"themo-testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        \n\t\t<div class=\"elementor-testimonial-wrapper th-testimonial-w th-txt-lg\">\n\n            \n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-content\">\"With Greenbone, you can identify potential vulnerabilities in your IT infrastructure early on and close gateways for hackers before they are detected. All at a fraction of the cost,\nthat a cyberattack would cause.\n\n\nMeet even the highest safety standards without costly implementation!\"<\/div>\n\t\t\t\n            \n\t\t\t\n                    <div class=\"elementor-testimonial-meta\">\n\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n                    \n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Jan H&ouml;ttges<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Managing Director<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ttjjuqf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ttjjuqf\" data-element_type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-oznjors\" data-id=\"oznjors\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fbrjshq elementor-widget elementor-widget-spacer\" data-id=\"fbrjshq\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-njmyxqf elementor-invisible elementor-widget elementor-widget-themo-call-to-action\" data-id=\"njmyxqf\" data-element_type=\"widget\" data-settings='{\"_animation\":\"fadeIn\"}' data-widget_type=\"themo-call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"th-cta\">\n\t\t\t\t\t        <div class=\"th-cta-text\">\n\t\t            <span>We have aroused your interest?<\/span>\n\t\t        <\/div>\n\t\t    \n                        <div class=\"th-cta-btn\">\n\n                                    <a class=\"btn-1 btn th-btn btn-ghost-light\" href=\"\/kontakt\">\n                                                    Test now for free!                                            <\/a>\n                \n                            <\/div>\n            \t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-rqrdwbj elementor-widget elementor-widget-spacer\" data-id=\"rqrdwbj\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Are you safe? We support you in mastering your daily IT threats We test your infrastructure &#8211; Simply get in touch! Contact Cyber risks in Germany 117 million new types of malware were registered last year alone. 46% rank digitization &hellip; <a href=\"https:\/\/www.cyber-rs.de\/en\/protecting-your-company-from-cyber-threats-the-importance-of-vulnerability-management\/\">Read More<\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-3164","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Home - Cyber Resilience Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber-rs.de\/en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home\" \/>\n<meta property=\"og:description\" content=\"Are you safe? We support you in mastering your daily IT threats We test your infrastructure &#8211; Simply get in touch! Contact Cyber risks in Germany 117 million new types of malware were registered last year alone. 46% rank digitization &hellip; Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber-rs.de\/en\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-12T13:25:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/\",\"name\":\"Home - Cyber Resilience Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyber-rs.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Cyber-Security.png\",\"datePublished\":\"2024-07-19T13:08:03+00:00\",\"dateModified\":\"2025-02-12T13:25:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Cyber-Security.png\",\"contentUrl\":\"https:\\\/\\\/www.cyber-rs.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Cyber-Security.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/home-3\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/\",\"name\":\"Cyber Resilience Solutions\",\"description\":\"Wir helfen Ihnen, die t\u00e4glichen IT-Bedrohungen zu meistern.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#organization\",\"name\":\"Cyber Resilience Solutions\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cyber-rs.de\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png\",\"contentUrl\":\"https:\\\/\\\/www.cyber-rs.de\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png\",\"width\":1293,\"height\":161,\"caption\":\"Cyber Resilience Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyber-rs.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/76985476\\\/admin\\\/feed\\\/posts\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Home - Cyber Resilience Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber-rs.de\/en\/","og_locale":"en_US","og_type":"article","og_title":"Home","og_description":"Are you safe? We support you in mastering your daily IT threats We test your infrastructure &#8211; Simply get in touch! Contact Cyber risks in Germany 117 million new types of malware were registered last year alone. 46% rank digitization &hellip; Read More","og_url":"https:\/\/www.cyber-rs.de\/en\/","og_site_name":"Cyber Resilience Solutions","article_modified_time":"2025-02-12T13:25:20+00:00","og_image":[{"url":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyber-rs.de\/en\/","url":"https:\/\/www.cyber-rs.de\/en\/","name":"Home - Cyber Resilience Solutions","isPartOf":{"@id":"https:\/\/www.cyber-rs.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber-rs.de\/en\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber-rs.de\/en\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security.png","datePublished":"2024-07-19T13:08:03+00:00","dateModified":"2025-02-12T13:25:20+00:00","breadcrumb":{"@id":"https:\/\/www.cyber-rs.de\/en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber-rs.de\/en\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber-rs.de\/en\/#primaryimage","url":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security.png","contentUrl":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2024\/05\/Cyber-Security.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber-rs.de\/en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.cyber-rs.de\/en\/home-3\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber-rs.de\/en\/#website","url":"https:\/\/www.cyber-rs.de\/en\/","name":"Cyber Resilience Solutions","description":"Wir helfen Ihnen, die t\u00e4glichen IT-Bedrohungen zu meistern.","publisher":{"@id":"https:\/\/www.cyber-rs.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber-rs.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber-rs.de\/en\/#organization","name":"Cyber Resilience Solutions","url":"https:\/\/www.cyber-rs.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber-rs.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/06\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png","contentUrl":"https:\/\/www.cyber-rs.de\/wp-content\/uploads\/2023\/06\/cropped-cropped-cropped-CRS-Logo-png-200ppi-1.png","width":1293,"height":161,"caption":"Cyber Resilience Solutions"},"image":{"@id":"https:\/\/www.cyber-rs.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/76985476\/admin\/feed\/posts\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/pages\/3164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/comments?post=3164"}],"version-history":[{"count":25,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/pages\/3164\/revisions"}],"predecessor-version":[{"id":3498,"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/pages\/3164\/revisions\/3498"}],"wp:attachment":[{"href":"https:\/\/www.cyber-rs.de\/en\/wp-json\/wp\/v2\/media?parent=3164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}