{"id":40274,"date":"2023-01-04T18:21:55","date_gmt":"2023-01-04T18:21:55","guid":{"rendered":"https:\/\/www.cyberguru.it\/module-der-dritten-ebene\/"},"modified":"2024-10-04T13:28:26","modified_gmt":"2024-10-04T13:28:26","slug":"module-der-dritten-ebene","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/","title":{"rendered":"Module der dritten Ebene"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_margin=&#8220;150px||||false|false&#8220; custom_padding=&#8220;|||10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter|700|||||||&#8220; header_text_color=&#8220;#FFFFFF&#8220; header_font_size=&#8220;60px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;0px||||false|false&#8220; header_font_size_tablet=&#8220;60px&#8220; header_font_size_phone=&#8220;42px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h1>Module der dritten Ebene<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]Schulungen zum Sicherheitsbewusstsein \/ <span style=\"color: #f18a00;\">Module der dritten Stufe<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|tablet&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_enable_color=&#8220;off&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp&#8220; custom_margin=&#8220;|||0px|false|false&#8220; custom_padding=&#8220;0px||0px||true|false&#8220; custom_padding_tablet=&#8220;0px||0px||true|false&#8220; custom_padding_phone=&#8220;0px||0px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; custom_padding=&#8220;50px||||false|false&#8220; custom_padding_tablet=&#8220;50px||||false|false&#8220; custom_padding_phone=&#8220;50px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/28-real-scam.webp&#8220; title_text=&#8220;real-scam&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><span>Indem wir einige reale F\u00e4lle von Betrug in der Cyber-Dimension vorstellen, wollen wir den Prozess f\u00f6rdern, sich bewusst zu machen, wie real die Gefahr sein kann.<br \/>\nEs werden auch einige gute Praktiken in Erinnerung gerufen, die verhindert h\u00e4tten, Opfer eines Betrugs zu werden. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/29-phone-scam.webp&#8220; title_text=&#8220;Telefonbetrug&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><span>Das Zusammenspiel von Cybertechniken und traditionelleren Techniken wie der Klassifizierung von Telefongespr\u00e4chen wird als Kombinationsangriff bezeichnet. Letztere sind besonders hinterh\u00e4ltig, weil sie gerade durch die Verwendung des klassischen Telefonanrufs dazu neigen, das Misstrauen zu brechen und das Opfer in die Irre zu f\u00fchren. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/26-social-cyberbullying.webp&#8220; title_text=&#8220;Social-Cybermobbing&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Dieses <span>Thema, das scheinbar der rein pers\u00f6nlichen Sph\u00e4re mit sozialer und kultureller Pr\u00e4gung gewidmet ist, kann stattdessen auch sicherheitstechnische Auswirkungen haben und sogar zu einem Rechts- oder Imageschaden f\u00fcr die eigene Organisation f\u00fchren.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;10px||10px||true|false&#8220; custom_padding_tablet=&#8220;10px||10px||true|false&#8220; custom_padding_phone=&#8220;10px||10px||true|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; custom_padding=&#8220;50px||||false|false&#8220; custom_padding_tablet=&#8220;50px||||false|false&#8220; custom_padding_phone=&#8220;50px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/25-privacy.webp&#8220; title_text=&#8220;Datenschutz&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><span>Die Nutzung digitaler Technologien, des Internets und sozialer Netzwerke hat ihren Preis in Form des Verlusts der Privatsph\u00e4re. Eine bewusste Einstellung in diesem Bereich kann es uns erm\u00f6glichen, ein ausgewogenes Verh\u00e4ltnis zur Innovation zu leben, ohne einen \u00fcberm\u00e4\u00dfig hohen Preis in Bezug auf die Privatsph\u00e4re zu zahlen. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/27-legal-aspect.webp&#8220; title_text=&#8220;rechtlicher Aspekt&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Urheberrechtsverletzungen, Nichteinhaltung von Vorschriften, nicht rechtm\u00e4\u00dfige Nutzung von Softwareprodukten, Verleumdung sind nur einige Beispiele f\u00fcr rechtliche Probleme im Zusammenhang mit der unbewussten Nutzung digitaler Technologien und dem Risiko, Straftaten zu begehen, die sich negativ auf den Einzelnen und das Unternehmen auswirken.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/30-physical-security.webp&#8220; title_text=&#8220;physische Sicherheit&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Die physische Sicherheit, z. B. der Schutz vor unbefugtem Zugang zu R\u00e4umlichkeiten, Ressourcen oder Informationen, tr\u00e4gt ebenfalls zum Schutz von Personen und Organisationen bei. Obwohl die physische Sicherheit in Organisationen von spezifischen Vorschriften beeinflusst wird, gibt es allgemeine Regeln und bew\u00e4hrte Praktiken, um Risiken zu verringern.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;10px||10px||true|false&#8220; custom_padding_tablet=&#8220;10px||10px||true|false&#8220; custom_padding_phone=&#8220;10px||10px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; custom_padding=&#8220;50px||||false|false&#8220; custom_padding_tablet=&#8220;50px||||false|false&#8220; custom_padding_phone=&#8220;50px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/31-e-commerce.webp&#8220; title_text=&#8220;e-Commerce&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><span>Die Risiken und das Ausma\u00df des potenziellen Schadens nehmen zu, wenn eine Aktivit\u00e4t direkt mit einem Geldfluss verbunden ist, wie im Falle des elektronischen Handels.<br \/>\nWir befassen uns mit diesem Thema, indem wir die verschiedenen Arten des E-Commerce betrachten, von B2C bis B2B, was die gr\u00f6\u00dften Auswirkungen auf die Organisation hat. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/32-holiday-business-trip.webp&#8220; title_text=&#8220;Urlaub-Gesch\u00e4ftsreise&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><span>Unsere Cyber-Anf\u00e4lligkeit nimmt immer dann zu, wenn wir mit einer Situation wie der Planung von Urlauben und Gesch\u00e4ftsreisen konfrontiert werden.<br \/>\nWir gehen das Problem an, indem wir versuchen, den gesamten Zyklus des Ereignisses abzudecken &#8211; von der Planung bis zur R\u00fcckkehr nach Hause oder ins B\u00fcro &#8211; und dabei alle Risiken zu ber\u00fccksichtigen, die in jeder dieser Phasen auftreten. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/33-cyber-hygiene.webp&#8220; title_text=&#8220;Cyber-Hygiene&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><span>Wenn Sie Ihre Ger\u00e4te in einem hygienisch einwandfreien Zustand halten, k\u00f6nnen Sie nicht nur Ihre Produktivit\u00e4t steigern, sondern vor allem auch die Risiken f\u00fcr die Informationssicherheit verringern.<br \/>\nEine Reihe von Best Practices f\u00fcr die richtige Hygiene unserer Ger\u00e4te und Daten. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;10px||10px||true|false&#8220; custom_padding_tablet=&#8220;10px||10px||true|false&#8220; custom_padding_phone=&#8220;10px||10px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; custom_padding=&#8220;50px||||false|false&#8220; custom_padding_tablet=&#8220;50px||||false|false&#8220; custom_padding_phone=&#8220;50px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/34-backup-restore.webp&#8220; title_text=&#8220;sichern-wiederherstellen&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><span>Eine gute Strategie zur Datenrettung und -wiederherstellung kann uns vor dem Risiko sch\u00fctzen, bei einem Cyberangriff Schaden zu nehmen. Es ist eine richtige Angewohnheit, die es uns erm\u00f6glicht, zu vermeiden, dass unsere Daten durch Ransomware oder ein triviales technisches Ereignis unwiederbringlich verloren gehen. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/24-social-engineering-2.webp&#8220; title_text=&#8220;24-soziale-technik-2&#8243; _builder_version=&#8220;4.27.0&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><span>Wir kehren zum Thema Social Engineering zur\u00fcck und verwenden dazu einige Beispiele aus der Realit\u00e4t.<br \/>\nDadurch werden weitere Elemente des Bewusstseins f\u00fcr die von der Cyberkriminalit\u00e4t verwendeten Techniken vermittelt, was es zu einer idealen Synthese von Elementen macht, die bereits in fr\u00fcheren Modulen behandelt wurden. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/35-best-practice.webp&#8220; title_text=&#8220;bew\u00e4hrte Praktiken&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]Der gesamte Schulungskurs konzentriert sich auf gute Praktiken, die als tugendhafte Verhaltensweisen verstanden werden, die Cyber-Risiken mindern k\u00f6nnen.<br \/>\nDieses Modul fasst das Konzept zusammen, indem es sich auf 12 gute Praktiken konzentriert, die konkret dazu beitragen k\u00f6nnen, Cyberrisiken zu verringern.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_enable_image=&#8220;off&#8220; background_position=&#8220;bottom_center&#8220; custom_padding=&#8220;50px||50px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8220; alt=&#8220;Mehr&#8220; title_text=&#8220;Mehr&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-200px&#8220; horizontal_offset=&#8220;85px&#8220; vertical_offset_tablet=&#8220;-55px&#8220; vertical_offset_phone=&#8220;-90px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-55px&#8220; horizontal_offset_phone=&#8220;-50px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; position_origin_a_tablet=&#8220;top_left&#8220; position_origin_a_phone=&#8220;top_left&#8220; position_origin_a_last_edited=&#8220;on|phone&#8220; position_origin_f_tablet=&#8220;&#8220; position_origin_f_phone=&#8220;&#8220; position_origin_f_last_edited=&#8220;on|phone&#8220; position_origin_r_tablet=&#8220;&#8220; position_origin_r_phone=&#8220;&#8220; position_origin_r_last_edited=&#8220;on|phone&#8220; width=&#8220;100%&#8220; custom_margin=&#8220;||||false|false&#8220; positioning_tablet=&#8220;absolute&#8220; positioning_phone=&#8220;absolute&#8220; positioning_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; admin_label=&#8220;Linie&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;70px|170px|0px|170px|false|true&#8220; custom_padding_tablet=&#8220;|100px||100px|false|true&#8220; custom_padding_phone=&#8220;70px|20px|0px|20px|false|true&#8220; border_radii=&#8220;off|10px|10px||&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">M\u00f6chten Sie mehr erfahren?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_tablet=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_phone=&#8220;0px|0px|70px|0px|false|true&#8220; border_radii=&#8220;off|||15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;1px&#8220; box_shadow_vertical=&#8220;20px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyIsImVuYWJsZV9odG1sIjoib2ZmIn19@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;KONTAKT US&#8220; button_alignment=&#8220;center&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.0&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE4MTUzIiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;PR\u00c4SENTATION HERUNTERLADEN&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;on|phone&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.0&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;DEMO ANFORDERN&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;off|desktop&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.0&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8220; alt=&#8220;Sie m\u00f6chten wissen&#8220; title_text=&#8220;Sie m\u00f6chten wissen&#8220; align=&#8220;right&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-20px&#8220; horizontal_offset=&#8220;-100px&#8220; vertical_offset_tablet=&#8220;-20px&#8220; vertical_offset_phone=&#8220;-80px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-100px&#8220; horizontal_offset_phone=&#8220;-130px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; width=&#8220;25%&#8220; width_tablet=&#8220;25%&#8220; width_phone=&#8220;25%&#8220; width_last_edited=&#8220;on|phone&#8220; custom_margin=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Module der dritten EbeneSchulungen zum Sicherheitsbewusstsein \/ Module der dritten StufeIndem wir einige reale F\u00e4lle von Betrug in der Cyber-Dimension vorstellen, wollen wir den Prozess f\u00f6rdern, sich bewusst zu machen, wie real die Gefahr sein kann. Es werden auch einige gute Praktiken in Erinnerung gerufen, die verhindert h\u00e4tten, Opfer eines Betrugs zu werden. Das Zusammenspiel [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-40274","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Module der dritten Ebene - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Liste der Module des dritten Jahres des kognitiven Schulungsprogramms Cyber Guru Awareness\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Module der dritten Ebene\" \/>\n<meta property=\"og:description\" content=\"Liste der Module des dritten Jahres des kognitiven Schulungsprogramms Cyber Guru Awareness\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-04T13:28:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"16\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/module-der-dritten-ebene\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/module-der-dritten-ebene\\\/\",\"name\":\"Module der dritten Ebene - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\"},\"datePublished\":\"2023-01-04T18:21:55+00:00\",\"dateModified\":\"2024-10-04T13:28:26+00:00\",\"description\":\"Liste der Module des dritten Jahres des kognitiven Schulungsprogramms Cyber Guru Awareness\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/module-der-dritten-ebene\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/module-der-dritten-ebene\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/module-der-dritten-ebene\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/homepage-v2-entwurf\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Module der dritten Ebene\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Module der dritten Ebene - Cyber Guru","description":"Liste der Module des dritten Jahres des kognitiven Schulungsprogramms Cyber Guru Awareness","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/","og_locale":"de_DE","og_type":"article","og_title":"Module der dritten Ebene","og_description":"Liste der Module des dritten Jahres des kognitiven Schulungsprogramms Cyber Guru Awareness","og_url":"https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-10-04T13:28:26+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"16\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/","url":"https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/","name":"Module der dritten Ebene - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/de\/#website"},"datePublished":"2023-01-04T18:21:55+00:00","dateModified":"2024-10-04T13:28:26+00:00","description":"Liste der Module des dritten Jahres des kognitiven Schulungsprogramms Cyber Guru Awareness","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/de\/module-der-dritten-ebene\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/de\/homepage-v2-entwurf\/"},{"@type":"ListItem","position":2,"name":"Module der dritten Ebene"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/de\/#website","url":"https:\/\/www.cyberguru.it\/de\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/40274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/comments?post=40274"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/40274\/revisions"}],"predecessor-version":[{"id":40282,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/40274\/revisions\/40282"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/media?parent=40274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}