{"id":50020,"date":"2025-09-02T08:16:00","date_gmt":"2025-09-02T08:16:00","guid":{"rendered":"https:\/\/www.cyberguru.it\/phishing-training\/"},"modified":"2025-10-01T10:28:17","modified_gmt":"2025-10-01T10:28:17","slug":"phishing-training","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/de\/phishing-training\/","title":{"rendered":"Phishing-Training"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp&#8220; custom_margin=&#8220;0px||0px||true|false&#8220; custom_padding=&#8220;0px||0px||true|false&#8220; bottom_divider_color=&#8220;#0C71C3&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;24vh||10vh|10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter|700|||||||&#8220; header_text_color=&#8220;#FFFFFF&#8220; header_font_size=&#8220;60px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;0px||||false|false&#8220; header_font_size_tablet=&#8220;60px&#8220; header_font_size_phone=&#8220;42px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h1>Phishing-Training<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Trainingsplattform \/ <span style=\"color: #f18a00;\">Phishing-Training<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_enable_color=&#8220;off&#8220; background_enable_image=&#8220;off&#8220; background_position=&#8220;top_center&#8220; min_height=&#8220;609.5px&#8220; custom_margin=&#8220;||-62px|0px|false|false&#8220; custom_padding=&#8220;||17px|0px|false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; custom_padding=&#8220;|10%||10%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;center&#8220; custom_margin_tablet=&#8220;30px||||false|false&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;|0px||||&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2>Die Schulung<\/h2>\n<h2>Anti-Phishing entwickelt sich weiter<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_padding=&#8220;|94px||||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Phishing ist nicht mehr nur eine schlecht geschriebene E-Mail mit einem verd\u00e4chtigen Link oder Anhang. Heute tritt es in Form von personalisierten Nachrichten, Deepfake-Videos, QR-Codes und USB-Ger\u00e4ten auf. <\/span><\/p>\n<p><span style=\"color: #000000;\">Angreifer studieren Gewohnheiten, Sprachmuster und Beziehungen, um im Moment der gr\u00f6\u00dften Anf\u00e4lligkeit zuzuschlagen: wenn die Aufmerksamkeit nachl\u00e4sst, Hektik herrscht und Vertrauen t\u00e4uscht. In diesem Kontext kann Schulung keine Option sein, sondern muss zu einer aktiven Verteidigung werden. <\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter||||||||&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<h4><strong><span style=\"color: #000000;\">Das Phishing-Training-Programm von Cyber Guru erm\u00f6glicht:<\/span><\/strong><span style=\"color: #000000;\"><\/span><\/h4>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Mitarbeiter darin schulen, Gefahrensignale zu erkennen, wie Dringlichkeit, autorit\u00e4rer Ton, emotionale Inhalte<\/span><span style=\"color: #000000;\"><\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Sicheres Verhalten durch regelm\u00e4\u00dfige und adaptive Simulationen festigen<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Realistische Mehrkanalangriffe basierend auf realen Szenarien simulieren<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Die Aufmerksamkeit \u00fcber die Zeit hochhalten und Gew\u00f6hnung vermeiden<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Menschen bewusst und reaktionsf\u00e4hig machen und sie zur ersten Verteidigungslinie der Organisation machen<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; min_height=&#8220;715px&#8220; custom_margin=&#8220;21px|auto||auto||&#8220; custom_padding=&#8220;0px|||10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|8%|||false|false&#8220; custom_padding_tablet=&#8220;|8%|||false|false&#8220; custom_padding_phone=&#8220;|2%||2%|false|true&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; width=&#8220;87.6%&#8220; width_tablet=&#8220;80%&#8220; width_phone=&#8220;&#8220; width_last_edited=&#8220;on|phone&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_margin_tablet=&#8220;||25px||false|false&#8220; custom_margin_phone=&#8220;||25px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; text_orientation_tablet=&#8220;&#8220; text_orientation_phone=&#8220;center&#8220; text_orientation_last_edited=&#8220;on|phone&#8220; module_alignment_tablet=&#8220;left&#8220; module_alignment_phone=&#8220;center&#8220; module_alignment_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2>Cyber Guru Phishing<\/h2>\n<h3><strong>Personalisierte adaptive Schulung<\/strong><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Cyber Guru Phishing ist das Schulungs- und Trainingsprogramm, das entwickelt wurde, um die F\u00e4higkeit zu st\u00e4rken, Cyber-Bedrohungen zu erkennen und zu begegnen, indem sicheres und reaktionsf\u00e4higes Verhalten entwickelt wird.<\/span><\/p>\n<p><span style=\"color: #000000;\">Dank eines innovativen, f\u00fcr die Schulung konzipierten Machine-Learning-Modells bietet die Plattform automatische und adaptive Simulationen an, die auf das Verhalten des einzelnen Benutzers zugeschnitten sind. Jede Simulation wird zu einer Gelegenheit, operative F\u00e4higkeiten zu messen, zu korrigieren und zu festigen. <\/span><\/p>\n<p><span style=\"color: #000000;\">Die Berichterstattung, zug\u00e4nglich \u00fcber ein intuitives Dashboard, liefert erweiterte Metriken, die es erm\u00f6glichen, das Risikoniveau zu bewerten und dessen tats\u00e4chliche Reduzierung zu \u00fcberwachen.<\/span><\/p>\n<p><span style=\"color: #000000;\"> <\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjEzOTAifX0=@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;MEHR ERFAHREN&#8220; button_alignment=&#8220;left&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][dipl_button _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/dipl_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/03\/EN-laptop_mockup-1.png&#8220; alt=&#8220;mafie-dark-web-deep-web&#8220; title_text=&#8220;EN-laptop_mockup&#8220; align=&#8220;center&#8220; force_fullwidth=&#8220;on&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|tablet&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_padding=&#8220;46px||100px||false|true&#8220; custom_padding_tablet=&#8220;|5%||5%|false|true&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/09\/Adaptive-Remediation_DE-scaled.webp&#8220; alt=&#8220;Adaptive Remediation_DE&#8220; title_text=&#8220;Adaptive Remediation_DE&#8220; force_fullwidth=&#8220;on&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|8%|||false|false&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; width=&#8220;87.6%&#8220; width_tablet=&#8220;80%&#8220; width_phone=&#8220;&#8220; width_last_edited=&#8220;on|phone&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_margin_tablet=&#8220;||25px||false|false&#8220; custom_margin_phone=&#8220;||25px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; text_orientation_tablet=&#8220;&#8220; text_orientation_phone=&#8220;center&#8220; text_orientation_last_edited=&#8220;on|phone&#8220; module_alignment_tablet=&#8220;left&#8220; module_alignment_phone=&#8220;center&#8220; module_alignment_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2>PhishPro<\/h2>\n<h3><strong>Das Add-on f\u00fcr ein fortgeschrittenes Training<\/strong><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Um den neuesten Social-Engineering-Techniken zu begegnen, erweitert PhishPro das Cyber Guru Phishing-Programm mit neuen realistischen Simulationen, die speziell auf die von Cyberkriminellen am h\u00e4ufigsten genutzten Kan\u00e4le zugeschnitten sind, und mit gezielten Remediation-Funktionen:<\/span><span style=\"color: #000000;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>Videoangriffssimulation (Deepfake) <\/strong>&#8211; <\/span><span style=\"color: #000000;\">Simuliert E-Mails mit \u00fcberzeugenden Videoinhalten von scheinbar vertrauensw\u00fcrdigen Personen, um Benutzer im Erkennen emotionaler Manipulationen zu schulen.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>USB-Stick-Angriffssimulation <\/strong>&#8211; <\/span><span style=\"color: #000000;\">Reproduziert einen physischen Angriff durch die Verwendung von USB-Sticks mit infizierten Dateien, um Benutzer f\u00fcr den sicheren Umgang mit externen Ger\u00e4ten zu sensibilisieren.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>QR-Code-Angriffssimulation <\/strong>&#8211; <\/span><span style=\"color: #000000;\">Sensibilisiert f\u00fcr die versteckten Risiken in QR-Codes, die oft untersch\u00e4tzt werden, aber auf b\u00f6sartige Websites umleiten oder sch\u00e4dliche Downloads aktivieren k\u00f6nnen.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; child_filter_saturate=&#8220;94%&#8220; child_filter_brightness=&#8220;200%&#8220; child_filter_invert=&#8220;100%&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>Adaptive Lern-Remediation <\/strong><\/span><span style=\"color: #000000;\">&#8211; Bietet personalisierte und kontextbezogene Bildungsinhalte, um die nach jeder Simulation bei anf\u00e4lligen Benutzern festgestellten L\u00fccken zu schlie\u00dfen.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQ3Mjk4In19@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;MEHR ERFAHREN&#8220; button_alignment=&#8220;left&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#f8f8f8&#8243; min_height=&#8220;927px&#8220; custom_margin=&#8220;||-293px|||&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;18px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; module_alignment=&#8220;center&#8220; custom_margin_tablet=&#8220;30px||||false|false&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\"><strong>Warum Schulungsprogramme w\u00e4hlen<\/strong><\/h2>\n<h2 style=\"text-align: center;\"><strong>Phishing-Training<\/strong>?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; custom_padding=&#8220;|10%||10%|false|true&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;98.5%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|||154px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Automatisierte und ML-basierte adaptive Phishing-Simulationen<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Sofortige Schulung<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Mehrkanal-Simulationen: E-Mail, SMS, USB, QR-Code, Video<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Kontinuierliches und progressives Lernen<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;][\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Automatisierte Kampagnen<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;98.5%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|||154px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Lokalisierte Vorlagen<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Adaptive Remediation f\u00fcr anf\u00e4llige Mitarbeiter<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Erweiterte Berichterstattung \u00fcber Dashboard<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb alt=&#8220;Cyberguru favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp&#8220; background_position=&#8220;bottom_center&#8220; custom_padding=&#8220;50px||50px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8220; alt=&#8220;Mehr&#8220; title_text=&#8220;Mehr&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-200px&#8220; horizontal_offset=&#8220;85px&#8220; vertical_offset_tablet=&#8220;-55px&#8220; vertical_offset_phone=&#8220;-90px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-55px&#8220; horizontal_offset_phone=&#8220;-50px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; position_origin_a_tablet=&#8220;top_left&#8220; position_origin_a_phone=&#8220;top_left&#8220; position_origin_a_last_edited=&#8220;on|phone&#8220; position_origin_f_tablet=&#8220;&#8220; position_origin_f_phone=&#8220;&#8220; position_origin_f_last_edited=&#8220;on|phone&#8220; position_origin_r_tablet=&#8220;&#8220; position_origin_r_phone=&#8220;&#8220; position_origin_r_last_edited=&#8220;on|phone&#8220; width=&#8220;100%&#8220; custom_margin=&#8220;||||false|false&#8220; positioning_tablet=&#8220;absolute&#8220; positioning_phone=&#8220;absolute&#8220; positioning_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; admin_label=&#8220;Zeile&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;70px|170px|0px|170px|false|true&#8220; custom_padding_tablet=&#8220;|100px||100px|false|true&#8220; custom_padding_phone=&#8220;70px|20px|0px|20px|false|true&#8220; border_radii=&#8220;off|10px|10px||&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">M\u00f6chten Sie mehr erfahren?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_tablet=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_phone=&#8220;0px|0px|70px|0px|false|true&#8220; border_radii=&#8220;off|||15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;1px&#8220; box_shadow_vertical=&#8220;20px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;https:\/\/www.cyberguru.it\/de\/kontakt\/&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;KONTAKTIEREN SIE UNS&#8220; button_alignment=&#8220;center&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;https:\/\/www.cyberguru.it\/?sdm_process_download=1&#038;download_id=51680&#8243; url_new_window=&#8220;on&#8220; button_text=&#8220;UNTERNEHMENSPROFIL&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;on|phone&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; hover_enabled=&#8220;0&#8243; custom_css_main_element=&#8220;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220; sticky_enabled=&#8220;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;DEMO ANFORDERN&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;off|desktop&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8220; alt=&#8220;Mehr erfahren&#8220; title_text=&#8220;Mehr erfahren&#8220; align=&#8220;right&#8220; disabled_on=&#8220;on|off|off&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-20px&#8220; horizontal_offset=&#8220;-100px&#8220; vertical_offset_tablet=&#8220;-20px&#8220; vertical_offset_phone=&#8220;-80px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-100px&#8220; horizontal_offset_phone=&#8220;-130px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; width=&#8220;25%&#8220; width_tablet=&#8220;25%&#8220; width_phone=&#8220;25%&#8220; width_last_edited=&#8220;on|phone&#8220; custom_margin=&#8220;||||false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing-TrainingTrainingsplattform \/ Phishing-TrainingDie Schulung Anti-Phishing entwickelt sich weiterPhishing ist nicht mehr nur eine schlecht geschriebene E-Mail mit einem verd\u00e4chtigen Link oder Anhang. Heute tritt es in Form von personalisierten Nachrichten, Deepfake-Videos, QR-Codes und USB-Ger\u00e4ten auf. Angreifer studieren Gewohnheiten, Sprachmuster und Beziehungen, um im Moment der gr\u00f6\u00dften Anf\u00e4lligkeit zuzuschlagen: wenn die Aufmerksamkeit nachl\u00e4sst, Hektik herrscht und [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-50020","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Phishing-Training - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, wie wichtig Phishing-Training ist, um Ihre Mitarbeiter vor ausgekl\u00fcgelten und personalisierten Angriffen zu sch\u00fctzen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/de\/phishing-training\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing-Training\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, wie wichtig Phishing-Training ist, um Ihre Mitarbeiter vor ausgekl\u00fcgelten und personalisierten Angriffen zu sch\u00fctzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/de\/phishing-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T10:28:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"25\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishing-training\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishing-training\\\/\",\"name\":\"Phishing-Training - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\"},\"datePublished\":\"2025-09-02T08:16:00+00:00\",\"dateModified\":\"2025-10-01T10:28:17+00:00\",\"description\":\"Erfahren Sie, wie wichtig Phishing-Training ist, um Ihre Mitarbeiter vor ausgekl\u00fcgelten und personalisierten Angriffen zu sch\u00fctzen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishing-training\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishing-training\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/phishing-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/homepage-v2-entwurf\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing-Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing-Training - Cyber Guru","description":"Erfahren Sie, wie wichtig Phishing-Training ist, um Ihre Mitarbeiter vor ausgekl\u00fcgelten und personalisierten Angriffen zu sch\u00fctzen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/de\/phishing-training\/","og_locale":"de_DE","og_type":"article","og_title":"Phishing-Training","og_description":"Erfahren Sie, wie wichtig Phishing-Training ist, um Ihre Mitarbeiter vor ausgekl\u00fcgelten und personalisierten Angriffen zu sch\u00fctzen.","og_url":"https:\/\/www.cyberguru.it\/de\/phishing-training\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-10-01T10:28:17+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"25\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/de\/phishing-training\/","url":"https:\/\/www.cyberguru.it\/de\/phishing-training\/","name":"Phishing-Training - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/de\/#website"},"datePublished":"2025-09-02T08:16:00+00:00","dateModified":"2025-10-01T10:28:17+00:00","description":"Erfahren Sie, wie wichtig Phishing-Training ist, um Ihre Mitarbeiter vor ausgekl\u00fcgelten und personalisierten Angriffen zu sch\u00fctzen.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/de\/phishing-training\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/de\/phishing-training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/de\/phishing-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/de\/homepage-v2-entwurf\/"},{"@type":"ListItem","position":2,"name":"Phishing-Training"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/de\/#website","url":"https:\/\/www.cyberguru.it\/de\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/50020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/comments?post=50020"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/50020\/revisions"}],"predecessor-version":[{"id":51720,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/50020\/revisions\/51720"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/media?parent=50020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}