{"id":9040,"date":"2023-10-25T14:17:36","date_gmt":"2023-10-25T12:17:36","guid":{"rendered":"https:\/\/flowbergit.pl\/cybersicherheit\/"},"modified":"2024-04-10T08:17:03","modified_gmt":"2024-04-10T06:17:03","slug":"cybersicherheit","status":"publish","type":"page","link":"https:\/\/flowbergit.pl\/de\/cybersicherheit\/","title":{"rendered":"Cybersicherheit"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uagb-block-c1f824fb alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-9a1be534 alignwide uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-823e275e\">\n<div class=\"wp-block-uagb-info-box uagb-block-c6e9366c uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">Cybersicherheit.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-2bc0dbf3\"><p class=\"uagb-heading-text\">Ein wirksamer Datenschutz erfordert geeignete technische und organisatorische L\u00f6sungen.<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__large-btn uagb-block-130adb74\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-a444ab93 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"#umow-sie\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">Kontakt<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-5e8f91fe wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"#soc\" rel=\"follow noopener\" target=\"_self\"><div class=\"uagb-button__link\">SOC<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-5297765a alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-283e4530\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-6a3c31dd\"><p class=\"uagb-heading-text\">Wichtigste Sicherheitsfaktoren<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-d636caac\"><h2 class=\"uagb-heading-text\">IT-Sicherheit<br>im Unternehmen<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-32413436\">\n<div class=\"wp-block-uagb-info-box uagb-block-6bba3fc8 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">Moderne Technologien bringen mit sich Vorteile, aber auch Risiken. Selbst wenn diese L\u00f6sungen das Risiko verringern, sollte man sich \u00fcber die potenziellen Sch\u00e4den im Klaren sein, die ein Unternehmen auch bei scheinbar allt\u00e4glichen Vorf\u00e4llen erleiden kann. Es ist zu betonen, dass der Menschfaktor selbst die besten IT-Sicherheitsl\u00f6sungen untergraben kann.  <\/p><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-20d0418d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-separator uagb-block-45398009\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-457d7a2b alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-044f1e2a\"><h3 class=\"uagb-heading-text\">Beispiele f\u00fcr Risiken<\/h3><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7b2fe103 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-separator uagb-block-6d09e3bd\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7d880235 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"accordion-carousel\">\n    <div id=\"accordion-carousel-two\" class=\"carousel slide carousel-fade\" data-ride=\"carousel\">\n    <div class=\"carousel-inner\">\n    <div class=\"carousel-item active\">\n    <div class=\"container\">\n    <div class=\"row\">\n    <h4 class=\"col-md-12\"><img decoding=\"async\" class=\"img-fluid\" src=\"\/wp-content\/uploads\/2023\/11\/zbyt-slabe-hasla.svg\"\/><br\/> <br\/><span style=\"color: #ffffff;\"> Zu schwache Passw\u00f6rter<\/span><\/h4>\n    <\/div>\n    <\/div>\n    <div class=\"container\">\n    <div class=\"row\">\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">H\u00e4ufig werden zu schwache Passw\u00f6rter verwendet, die sich auf ganze W\u00f6rter st\u00fctzen oder mit Zahlen kombiniert werden, was Risiken birgt. F\u00fcr die Erstellung sicherer Passw\u00f6rter sollten die leitenden Angestellten verantwortlich sein. Die Passw\u00f6rter k\u00f6nnen in physischer Form aufgeschrieben werden, so dass sie sowohl f\u00fcr den Mitarbeiter als auch f\u00fcr seinen Vorgesetzten zug\u00e4nglich sind. <br\/><\/p>\n    <\/div>\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">Die L\u00f6sung sind Passwort-Manager wie LastPass oder 1Password, die es erm\u00f6glichen, komplexe Passw\u00f6rter zu erstellen, die f\u00fcr jedes Konto unterschiedlich sind. Auf diese Weise muss sich der Nutzer nur ein einziges starkes Passwort merken, das ihm den Zugang zu den \u00fcbrigen Konten er\u00f6ffnet. <br\/><\/p>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/div>\n    <div class=\"carousel-item\">\n    <div class=\"container\">\n    <div class=\"row\">\n    <h4 class=\"col-md-12\"><img decoding=\"async\" class=\"img-fluid\" src=\"\/wp-content\/uploads\/2023\/11\/strony-wyludzajace-dane.svg\"\/><br\/> <br\/><span style=\"color: #ffffff;\"> Phishing-Seiten<\/span><\/h4>\n    <\/div>\n    <\/div>\n    <div class=\"container\">\n    <div class=\"row\">\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">Phishing-Seiten stellen eine potenzielle Bedrohung dar, wenn Arbeitnehmer das Internet am Arbeitsplatz zu Unterhaltungszwecken benutzen. Obwohl eine Pause von der Arbeit \u00f6fters n\u00f6tig ist, kann es im Hinblick auf die Cybersicherheit zu Problemen f\u00fchren. Es gibt Websites, die sich als bekannte Websites ausgeben, um Daten zu stehlen, was eine Gefahr f\u00fcr den Benutzer darstellt.  <br\/><\/p>\n    <\/div>\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">Im Falle von Unternehmensdaten kann dies katastrophale Folgen haben. Das Gleiche gilt f\u00fcr die E-Mail-Boxen, die anf\u00e4llig f\u00fcr SPAM und Phishing-Versuche sind. Aus diesem Grund sind IT-Sicherheitsschulungen f\u00fcr Mitarbeiter eine wichtige L\u00f6sung.  <br\/><\/p>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/div>\n    <div class=\"carousel-item\">\n    <div class=\"container\">\n    <div class=\"row\">\n    <h4 class=\"col-md-12\"><img decoding=\"async\" class=\"img-fluid\" src=\"\/wp-content\/uploads\/2023\/11\/przypadkowa-utrata-danych.svg\"\/><br\/> <br\/><span style=\"color: #ffffff;\"> Versehentlicher Datenverlust<\/span><\/h4>\n    <\/div>\n    <\/div>\n    <div class=\"container\">\n    <div class=\"row\">\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">Im Hinblick auf die zu leistende Arbeit ist es sehr wichtig, dass die Ergebnisse ordnungsgem\u00e4\u00df gespeichert werden. W\u00e4hrend die meisten Programme heutzutage eine automatische Speicherfunktion bieten, ist es bei einigen immer noch erforderlich, dies manuell zu tun. Es lohnt sich, die Mitarbeiter darauf aufmerksam zu machen, da dies dazu f\u00fchren kann, dass der Fortschritt bei einer bestimmten Aufgabe verloren geht, was sich direkt in Verlusten f\u00fcr das Unternehmen niederschl\u00e4gt.  <br\/><\/p>\n    <\/div>\n    <div class=\"col-md-6\">\n    <p style=\"color: #fff;\">Eine Erweiterung dieser Verantwortung sollte die regelm\u00e4\u00dfige Archivierung von Dateien auf dem Computer sein, d. h. die Erstellung eines so genannten &#8222;Backups&#8220;, das die Wiederherstellung von versehentlich verlorenen Dateien erm\u00f6glicht. <br\/><\/p>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/div>\n    <\/div>\n    <div class=\"container\">\n    <div class=\"row\">\n    <ol class=\"carousel-indicators black\">\n    <li class=\"active\" data-target=\"#accordion-carousel-two\" data-slide-to=\"0\">01<\/li>\n    <li data-target=\"#accordion-carousel-two\" data-slide-to=\"1\">02<\/li>\n    <li data-target=\"#accordion-carousel-two\" data-slide-to=\"2\">03<\/li>\n    <\/ol>\n\n    <button class=\"carousel-control-prev\" type=\"button\" data-target=\"#accordion-carousel-two\" data-slide=\"prev\">\n        <span class=\"carousel-control-prev-icon\" aria-hidden=\"true\"><svg width=\"20\" height=\"20\" viewbox=\"0 0 256 512\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><\/span>\n        <span class=\"sr-only\">Previous<\/span>\n    <\/button>\n    <button class=\"carousel-control-next\" type=\"button\" data-target=\"#accordion-carousel-two\" data-slide=\"next\">\n        <span class=\"carousel-control-next-icon\" aria-hidden=\"true\"><svg width=\"20\" height=\"20\" viewbox=\"0 0 256 512\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n        <span class=\"sr-only\">Next<\/span>\n    <\/button>\n\n    <\/div>\n    <\/div>\n    <\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"soc\" class=\"wp-block-uagb-container uagb-block-b1b65be8 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-cd1cf785\"><p class=\"uagb-heading-text\">Nasze us\u0142ugi<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-fe2e32d4\"><h3 class=\"uagb-heading-text\">Flowberg IT bietet SOC-Dienste<br>(Security Operation Center) an.<\/h3><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b8c5cf99 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-separator uagb-block-503c028a\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e83f6c55 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-cc5ab32c\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-deaf73fc\"><p class=\"uagb-heading-text\"><strong>Der Dienst hat die Aufgabe, die Sicherheit von Gesch\u00e4ftsprozessen zu \u00fcberwachen, die auf der IKT-Infrastruktur des Kunden ablaufen. Er erm\u00f6glicht eine schnelle Reaktion auf auftretende Ereignisse, die die Kontinuit\u00e4t der Gesch\u00e4ftsprozesse gef\u00e4hrden.<\/strong><\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-16864d2d\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-304cf7cb alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-separator uagb-block-b2779b5f\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e72a1eb1 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-c982965f\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-7ed983d4\"><p class=\"uagb-heading-text\"><strong>Der Dienst verringert die M\u00f6glichkeit, gesch\u00e4ftskritische Systeme zu gef\u00e4hrden, und minimiert die M\u00f6glichkeit, dass kundenkritische Daten gestohlen oder ver\u00f6ffentlicht werden. Die Arbeit des SOC liefert auch die Berichten, die den Zustand der IKT-Umgebung, in der die Gesch\u00e4ftsprozesse stattfinden, aufzeigen.<\/strong><\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-9b71e10f\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-3173e9da\"><p class=\"uagb-heading-text\">Die Berichte geben Aufschluss \u00fcber die H\u00e4ufigkeit, das Ausma\u00df der Bedrohung und den Grad der Widerstandsf\u00e4higkeit der IKT-Infrastruktur gegen\u00fcber neu auftretenden Vorf\u00e4llen. Gleichzeitig enthalten sie Empfehlungen zu Ma\u00dfnahmen, die erforderlich sind, um neue Bedrohungen zu minimieren.<\/p><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bcc2cfd1 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-15dd1514\"><p class=\"uagb-heading-text\">SOC-Aufgaben<\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-343586ad alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-67efc3bf\">\n<div class=\"wp-block-uagb-info-box uagb-block-a5bfc598 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/rozproszone-srodowiska-1.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Audit der IT-Sicherheitspolitik des Unternehmens<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-647e77c1\">\n<div class=\"wp-block-uagb-info-box uagb-block-e0f9e49f uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/monitoring-zdarzen.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">\u00dcberwachung von IKT-Sicherheitsvorf\u00e4llen<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a3e7ea81\">\n<div class=\"wp-block-uagb-info-box uagb-block-c496e423 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/audyt-i-zalecenia.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Audit und Empfehlungen zu Sicherheitsrichtlinien auf der Grundlage der \u00dcberwachung von Vorf\u00e4llen<\/h4><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ec1ebf3c alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-a83564dd\">\n<div class=\"wp-block-uagb-info-box uagb-block-33fef5e2 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/implementacja-systemow.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Empfehlungen f\u00fcr die Gestaltung und Umsetzung von L\u00f6sungen f\u00fcr Systeme, die kritische Daten verarbeiten<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d5dd06e5\">\n<div class=\"wp-block-uagb-info-box uagb-block-004763c5 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/monitoring-dostepu-danych.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">\u00dcberwachung des Zugriffs auf gesch\u00e4ftskritische Daten<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-0666d322\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-48b36a96 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-f386cd37\"><p class=\"uagb-heading-text\">SOC-Vorteile<\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6cceb6fc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-ab211844\">\n<div class=\"wp-block-uagb-info-box uagb-block-60b1eb2f uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/monitoring-zdarzen-24.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">24\/7-\u00dcberwachung von IT-Sicherheitsvorf\u00e4llen<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6b96e058\">\n<div class=\"wp-block-uagb-info-box uagb-block-a4fccedb uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/cykliczny-audyt.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Zyklische Pr\u00fcfung und Anpassung der Sicherheitsrichtlinien des Unternehmens<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-634830da\">\n<div class=\"wp-block-uagb-info-box uagb-block-6b22bcfa uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/audyt-i-zalecenia-bezpieczenstwa.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Audit und Empfehlungen zu Sicherheitsrichtlinien auf der Grundlage der \u00dcberwachung von Vorf\u00e4llen<\/h4><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-135b18db alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-59b9bfff\">\n<div class=\"wp-block-uagb-info-box uagb-block-1f34530a uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/procedury-zachowan.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Einf\u00fchrung und Erl\u00e4uterung von Verfahren f\u00fcr das Verhalten in Krisensituationen<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-10cb61a9\">\n<div class=\"wp-block-uagb-info-box uagb-block-b3e59a31 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/kompleksowa-informacja.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Umfassende Informationen \u00fcber den Zustand der IT-Sicherheitsinfrastruktur<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6153833a\">\n<div class=\"wp-block-uagb-info-box uagb-block-4f6f056b uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/minimalizacja-kosztow.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Minimierung der Kosten f\u00fcr die IKT-Sicherheit im Zusammenhang mit post-aktiven Aktivit\u00e4ten<\/h4><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2c4fc1dd alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-409e7fef\">\n<div class=\"wp-block-uagb-info-box uagb-block-a935dbdf uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/cyberbezpieczenstwo.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Eine korrekte Analyse der Ausgangslage und des Informationssicherheitsbedarfs der Institution oder des Unternehmens<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-dfe8daf1\">\n<div class=\"wp-block-uagb-info-box uagb-block-c847f18b uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/wdrozenie-systemu.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Einf\u00fchrung eines Risikomanagementsystems<\/h4><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-dd85bf34\">\n<div class=\"wp-block-uagb-info-box uagb-block-0a6a1c10 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/flowbergit.pl\/wp-content\/uploads\/2023\/11\/wdrozenie-polityki.svg\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title\">Einf\u00fchrung einer Informationssicherheitspolitik unter Einhaltung von Richtlinien und Vorschriften<\/h4><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"umow-sie\" class=\"wp-block-uagb-container uagb-block-f1ad4d9f alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-21913c9e alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-7267e014\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-c81f7d90\"><p class=\"uagb-heading-text\">Sprechen Sie mit mir \u00fcber das SOC-Angebot f\u00fcr Ihr Unternehmen<\/p><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-745b194f\"><p class=\"uagb-heading-text\"><strong>Tomasz Or\u0142owski<\/strong> | Leiter der Cybersicherheitsl\u00f6sungenabteilung<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7f040da5\"><div data-uniq='69ebd17e4bbc4' class='uniq-69ebd17e4bbc4 formcraft-css form-live align-left'><script> window.formcraftLogic = window.formcraftLogic || {}; window.formcraftLogic[27] = []; <\/script><div class=\"fc-pagination-cover fc-pagination-1\">\n\t\t\t\t<div class=\"fc-pagination width-100\">\n\t\t\t\t\t<!-- ngRepeat: page in Builder.FormElements track by $index --><div class=\"pagination-trigger \" data-index=\"0\">\n\t\t\t\t\t\t<span class=\"page-number\"><span >1<\/span><\/span>\n\t\t\t\t\t\t<span class=\"page-name \">Step 1<\/span>\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div><!-- end ngRepeat: page in Builder.FormElements track by $index -->\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t<style scoped=\"scoped\" >\n\t\t\t@media (max-width : 480px) {\n\t\t\t\t.fc_modal-dialog-27 .fc-pagination-cover .fc-pagination\n\t\t\t\t{\n\t\t\t\t\tbackground-color: none !important;\n\t\t\t\t}\n\t\t\t}\n\t\t\t\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .submit-cover .submit-button,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .fileupload-cover .button-file,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover .button,\n\t\t\t.formcraft-datepicker .ui-datepicker-header,\n\t\t\t.formcraft-datepicker .ui-datepicker-title\n\t\t\t{\n\t\t\t\tbackground: #000000;\n\t\t\t\tcolor: #ffffff;\n\t\t\t}\n\t\t\t.formcraft-datepicker td .ui-state-active,\n\t\t\t.formcraft-datepicker td .ui-state-hover,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .slider-cover .ui-slider-range\n\t\t\t{\n\t\t\t\tbackground: #000000;\n\t\t\t}\n\t\t\t#ui-datepicker-div.formcraft-datepicker .ui-datepicker-header,\n\t\t\t.formcraft-css .fc-form .field-cover>div.full hr\n\t\t\t{\n\t\t\t\tborder-color: #000000;\n\t\t\t}\n\t\t\t#ui-datepicker-div.formcraft-datepicker .ui-datepicker-prev:hover,\n\t\t\t#ui-datepicker-div.formcraft-datepicker .ui-datepicker-next:hover,\n\t\t\t#ui-datepicker-div.formcraft-datepicker select.ui-datepicker-month:hover,\n\t\t\t#ui-datepicker-div.formcraft-datepicker select.ui-datepicker-year:hover\n\t\t\t{\n\t\t\t\tbackground-color: #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-pagination>div.active .page-number,\n\t\t\t.formcraft-css .form-cover-builder .fc-pagination>div:first-child .page-number\n\t\t\t{\n\t\t\t\tbackground-color: #4488ee;\n\t\t\t\tcolor: #ffffff;\n\t\t\t}\n\t\t\t#ui-datepicker-div.formcraft-datepicker table.ui-datepicker-calendar th,\n\t\t\t#ui-datepicker-div.formcraft-datepicker table.ui-datepicker-calendar td.ui-datepicker-today a,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .star-cover label,\n\t\t\thtml .formcraft-css .fc-form.label-floating .form-element .field-cover.has-focus>span,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .customText-cover a,\n\t\t\t.formcraft-css .prev-next>div span:hover\n\t\t\t{\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .customText-cover a:hover\n\t\t\t{\n\t\t\t\tcolor: #000000;\n\t\t\t}\n\t\t\thtml .formcraft-css .fc-form.fc-form-27.label-floating .form-element .field-cover > span\n\t\t\t{\n\t\t\t\tcolor: #0a0a0a;\n\t\t\t}\n\t\t\thtml .formcraft-css .fc-form .final-success .final-success-check {\n\t\t\t\tborder: 2px solid #0a0a0a;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"text\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"email\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"password\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"tel\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover textarea,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover select,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover .time-fields-cover,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover .awesomplete ul\n\t\t\t{\n\t\t\t\tcolor: #0a0a0a;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"text\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"password\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"email\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"radio\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"checkbox\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"tel\"],\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover select,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover textarea\n\t\t\t{\n\t\t\t\tbackground-color: #fafafa;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"radio\"]:checked,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .field-cover input[type=\"checkbox\"]:checked {\n\t\t\t\tborder-color: #000000;\n\t\t\t\tbackground: #000000;\t\t\t\t\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .star-cover label .star\n\t\t\t{\n\t\t\t\ttext-shadow: 0px 1px 0px #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .slider-cover .ui-slider-range\n\t\t\t{\n\t\t\t\tbox-shadow: 0px 1px 1px #000000 inset;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .fileupload-cover .button-file\n\t\t\t{\n\t\t\t\tborder-color: #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .form-element-html input[type=\"password\"]:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .form-element-html input[type=\"email\"]:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .form-element-html input[type=\"tel\"]:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .form-element-html input[type=\"text\"]:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .form-element-html textarea:focus,\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .form-element-html select:focus\n\t\t\t{\n\t\t\t\tborder-color: #000000;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27 .form-element .form-element-html .field-cover .is-read-only:focus {\n\t\t\t\tborder-color: #ccc;\n\t\t\t}\n\t\t\t.formcraft-css .fc-form.fc-form-27\t\t\t{\n\t\t\t\tfont-family: inherit;\n\t\t\t}\n\t\t\t@media (max-width : 480px) {\n\t\t\t\thtml .dedicated-page,\n\t\t\t\thtml .dedicated-page .formcraft-css .fc-pagination > div.active\n\t\t\t\t{\n\t\t\t\t\tbackground: none;\n\t\t\t\t}\n\t\t\t}\n\t\t<\/style>\n\t\t<div class=\"form-cover\">\n\t\t\t<form data-auto-scroll=\"\" data-no-message-redirect=\"\" data-thousand=\"\" data-decimal=\".\" data-delay=\"\" data-id=\"27\" class=\"fc-form fc-form-27 align- fc-temp-class save-form- dont-submit-hidden- disable-enter- label-floating field-border-visible frame-hidden remove-asterisk-true icons-hide-true field-alignment-left\" style=\"width: 100%; color: #0a0a0a; font-size: 100%; background: none\">\n\t\t\t\t<!-- ngRepeat: page in Builder.FormElements track by $index --><div class=\"form-page form-page-0\" data-index=\"0\">\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"form-page-content      ng-not-empty\">\n\t\t\t\t\t\t<div data-identifier=\"field1\" data-index=\"0\" style=\"width: 100%\" class=\" form-element form-element-field1 options-false form-element-0 default-false form-element-type-oneLineText is-required-false odd -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><label class=\"oneLineText-cover field-cover \"><span class=\"sub-label-false\"><span class=\"main-label\"><span >Vor-und Nachname<\/span><\/span><span class=\"sub-label\"><\/span><\/span><div><span class=\"error\"><\/span><input type=\"text\" placeholder=\"\" make-read-only=\"false\" data-field-id=\"field1\" name=\"field1[]\" data-min-char=\"\" data-max-char=\"\" data-val-type=\"\" data-regexp=\"\" data-is-required=\"false\" data-allow-spaces=\"\" class=\"validation-lenient\" data-placement=\"right\" data-toggle=\"tooltip\" tooltip=\"\" data-trigger=\"focus\" data-html=\"true\" data-input-mask=\"\" data-mask-placeholder=\"\" data-original-title=\"\"><i class=\"formcraft-icon formcraft-icon-type-\"><\/i><\/div><\/label><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field2\" data-index=\"1\" style=\"width: 100%\" class=\" even form-element form-element-field2 options-false form-element-1 default-false form-element-type-email is-required-true -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><label class=\"email-cover field-cover \"><span class=\"sub-label-true\"><span class=\"main-label\"><span >Email<\/span><\/span><span class=\"sub-label\"><span >a valid email<\/span><\/span><\/span><div><span class=\"error\"><\/span><input placeholder=\"\" data-field-id=\"field2\" type=\"text\" data-val-type=\"email\" make-read-only=\"\" data-is-required=\"true\" name=\"field2\" class=\"validation-lenient\" data-placement=\"right\" data-toggle=\"tooltip\" tooltip=\"\" data-trigger=\"focus\" data-html=\"true\" data-original-title=\"\"><i class=\"formcraft-icon\">email<\/i><\/div><\/label><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field3\" data-index=\"2\" style=\"width: 100%\" class=\" form-element form-element-field3 options-false form-element-2 default-false form-element-type-dropdown is-required-true odd -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><label class=\"dropdown-cover field-cover autocomplete-type- \"><span class=\"sub-label-false\"><span class=\"main-label\"><\/span><span class=\"sub-label\"><\/span><\/span><div><span class=\"error\"><\/span><select data-is-required=\"true\" class=\"validation-lenient\" data-field-id=\"field3\" name=\"field3\" data-placement=\"right\" data-toggle=\"tooltip\" tooltip=\"\" data-trigger=\"hover\" data-html=\"true\" data-original-title=\"\"><option value=\"\" class=\" \">Dienstleistungen<\/option><option value=\"Sicherung und Wiederherstellung\" class=\" \">Sicherung und Wiederherstellung<\/option><option value=\"Internet-Sicherheit\" class=\" \">Internet-Sicherheit<\/option><option value=\"Anwendungs\u00fcberwachung\" class=\" \">Anwendungs\u00fcberwachung<\/option><option value=\"Massenspeicher\" class=\" \">Massenspeicher<\/option><option value=\"IT-Integration\" class=\" \">IT-Integration<\/option><option value=\"Serviceproblem\" class=\" \">Serviceproblem<\/option><\/select><input type=\"text\"><\/div><\/label><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field4\" data-index=\"3\" style=\"width: 100%\" class=\" even form-element form-element-field4 options-false form-element-3 default-false form-element-type-textarea is-required-false -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><label class=\"textarea-cover field-cover \"><span class=\"sub-label-false\"><span class=\"main-label\"><span >Wie k\u00f6nnen wir Ihnen helfen?<\/span><\/span><span class=\"sub-label\"><\/span><\/span><div><span class=\"error\"><\/span><textarea data-field-id=\"field4\" placeholder=\"\" class=\"validation-lenient\" name=\"field4\" value=\"\" rows=\"5\" data-min-char=\"\" data-max-char=\"\" data-is-required=\"false\" data-placement=\"right\" data-toggle=\"tooltip\" tooltip=\"\" data-trigger=\"focus\" data-html=\"true\" data-original-title=\"\" style=\"min-height: 107.938px\"><\/textarea><div class=\"count-\"><span class=\"current-count\">0<\/span> \/ <span class=\"max-count \"><\/span><\/div><\/div><\/label><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field7\" data-index=\"4\" style=\"width: 100%\" class=\" form-element form-element-field7 options- form-element-4 default-false form-element-type-reCaptcha is-required-false odd -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><div data-site-key=\"6LcW3aspAAAAAPv3ksNlDD3LWtOZTXNJZ5eJzXsL\" class=\"captcha-placeholder \">reCaptcha v3<\/div><input type=\"hidden\" class=\"recaptcha-token \" name=\"recaptcha-token\"><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field5\" data-index=\"5\" style=\"width: 100%\" class=\" even form-element form-element-field5 options-false form-element-5 default-false form-element-type-checkbox is-required-false -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><div class=\"images- checkbox-cover field-cover\"><span class=\"sub-label-false\"><span class=\"main-label\"><\/span><span class=\"sub-label\"><\/span><\/span><div data-placement=\"right\" data-toggle=\"tooltip\" tooltip=\"\" data-trigger=\"hover\" data-html=\"true\" data-original-title=\"\"><span class=\"error\"><\/span><label style=\"width:\" ><img alt=\"\"><input data-field-id=\"field5\" type=\"checkbox\" data-is-required=\"false\" name=\"field5[]\" value=\"<p><span style=&quot;font-size: 13px;&quot;>Hiermit stimme ich der Verarbeitung meiner personenbezogenen Daten zu. FLOWBERGIT Sp. z o.o. z o. \u00d6. verarbeitet personenbezogene und sensible Daten im Einklang mit den gesetzlichen Vorschriften. Weitere Informationen in unserem <a href=&quot;\/polityka-prywatnosci\/&quot;>Datenschutzerkl\u00e4rung<\/a>.<\/span><\/p>\" class=\"validation-lenient\"><span><p ><span>Hiermit stimme ich der Verarbeitung meiner personenbezogenen Daten zu. FLOWBERGIT Sp. z o.o. z o. \u00d6. verarbeitet personenbezogene und sensible Daten im Einklang mit den gesetzlichen Vorschriften. Weitere Informationen in unserem <a href=\"\/polityka-prywatnosci\/\">Datenschutzerkl\u00e4rung<\/a>.<\/span><\/p><\/span><\/label><\/div><\/div><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div><div data-identifier=\"field6\" data-index=\"6\" style=\"width: 100%\" class=\" form-element form-element-field6 options-true form-element-6 default-false form-element-type-submit is-required-false odd -handle\">\n\t\t\t\t\t\t\t<div class=\"form-element-html\"><div ><div class=\"align-right wide-false submit-cover field-cover\"><button type=\"submit\" class=\"button submit-button\"><span class=\"text \">Einreichen<\/span><span class=\"spin-cover\"><i style=\"color:\" class=\"loading-icon icon-cog animate-spin\"><\/i><\/span><\/button><\/div><div class=\"submit-response \"><\/div><label ><input type=\"text\" class=\"required_field\" name=\"website\" autocomplete=\"maple-syrup-pot\"><\/label><\/div><\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><!-- end ngRepeat: page in Builder.FormElements track by $index -->\n\t\t\t<\/form>\n\t\t\t<div class=\"prev-next prev-next-1\" style=\"width: 100%; color: #0a0a0a; font-size: 100%; background: none\">\n\t\t\t\t<div>\n\t\t\t\t\t\n\t\t\t\t\t<span class=\"inactive page-prev \"><i class=\"formcraft-icon\">keyboard_arrow_left<\/i>Previous<\/span><\/div>\n\t\t\t\t<div>\n\t\t\t\t\t\n\t\t\t\t\t<span class=\"page-next \">Next<i class=\"formcraft-icon\">keyboard_arrow_right<\/i><\/span><\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ein wirksamer Datenschutz erfordert geeignete technische und organisatorische L\u00f6sungen. Wichtigste Sicherheitsfaktoren IT-Sicherheitim Unternehmen Beispiele f\u00fcr Risiken Zu schwache Passw\u00f6rter H\u00e4ufig werden zu schwache Passw\u00f6rter verwendet, die sich auf ganze W\u00f6rter st\u00fctzen oder mit Zahlen kombiniert werden, was Risiken birgt. F\u00fcr die Erstellung sicherer Passw\u00f6rter sollten die leitenden Angestellten verantwortlich sein. Die Passw\u00f6rter k\u00f6nnen in physischer &hellip;<\/p>\n","protected":false},"author":34,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"woocommerce_thumbnail":false,"woocommerce_single":false,"woocommerce_gallery_thumbnail":false},"uagb_author_info":{"display_name":"Mateusz Knopczy\u0144ski","author_link":"#"},"uagb_comment_info":0,"uagb_excerpt":"Ein wirksamer Datenschutz erfordert geeignete technische und organisatorische L\u00f6sungen. Wichtigste Sicherheitsfaktoren IT-Sicherheitim Unternehmen Beispiele f\u00fcr Risiken Zu schwache Passw\u00f6rter H\u00e4ufig werden zu schwache Passw\u00f6rter verwendet, die sich auf ganze W\u00f6rter st\u00fctzen oder mit Zahlen kombiniert werden, was Risiken birgt. F\u00fcr die Erstellung sicherer Passw\u00f6rter sollten die leitenden Angestellten verantwortlich sein. Die Passw\u00f6rter k\u00f6nnen in physischer&hellip;","_links":{"self":[{"href":"https:\/\/flowbergit.pl\/de\/wp-json\/wp\/v2\/pages\/9040"}],"collection":[{"href":"https:\/\/flowbergit.pl\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/flowbergit.pl\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/flowbergit.pl\/de\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/flowbergit.pl\/de\/wp-json\/wp\/v2\/comments?post=9040"}],"version-history":[{"count":4,"href":"https:\/\/flowbergit.pl\/de\/wp-json\/wp\/v2\/pages\/9040\/revisions"}],"predecessor-version":[{"id":9255,"href":"https:\/\/flowbergit.pl\/de\/wp-json\/wp\/v2\/pages\/9040\/revisions\/9255"}],"wp:attachment":[{"href":"https:\/\/flowbergit.pl\/de\/wp-json\/wp\/v2\/media?parent=9040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}