{"id":3825,"date":"2019-09-30T15:51:02","date_gmt":"2019-09-30T13:51:02","guid":{"rendered":"https:\/\/www.megasoft.de\/?p=3825"},"modified":"2020-02-24T11:23:49","modified_gmt":"2020-02-24T10:23:49","slug":"security","status":"publish","type":"post","link":"https:\/\/www.megasoft.de\/en\/magazin\/solutions\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<p>Die st\u00e4ndig wachsende Gefahr von Diebstahl und Missbrauch von Daten stellt immer wieder neue Herausforderungen an die IT. Nicht nur die Verf\u00fcgbarkeit der Daten, sondern auch deren Schutz spielt f\u00fcr Unternehmen jeder Gr\u00f6\u00dfe eine Rolle. Mittlerweile gibt es von bezahlten Organisationen gezielte Angriffe auf einzelne Unternehmen. Systeme und Daten k\u00f6nnen dabei verschl\u00fcsselt und f\u00fcr den Besitzer unbrauchbar gemachten werden. <\/p>","protected":false},"excerpt":{"rendered":"<p>Die st\u00e4ndig wachsende Gefahr von Diebstahl und Missbrauch von Daten stellt immer wieder neue Herausforderungen an die IT. Nicht nur die Verf\u00fcgbarkeit der Daten, sondern auch deren Schutz spielt f\u00fcr Unternehmen jeder Gr\u00f6\u00dfe eine Rolle. Mittlerweile gibt es von bezahlten Organisationen gezielte Angriffe auf einzelne Unternehmen. Systeme und Daten k\u00f6nnen [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3858,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[204],"tags":[],"class_list":["post-3825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-solutions","wpautop"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security - megasoft IT GmbH &amp; Co. KG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.megasoft.de\/en\/magazin\/partner\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security - megasoft IT GmbH &amp; Co. KG\" \/>\n<meta property=\"og:description\" content=\"Die st\u00e4ndig wachsende Gefahr von Diebstahl und Missbrauch von Daten stellt immer wieder neue Herausforderungen an die IT. Nicht nur die Verf\u00fcgbarkeit der Daten, sondern auch deren Schutz spielt f\u00fcr Unternehmen jeder Gr\u00f6\u00dfe eine Rolle. Mittlerweile gibt es von bezahlten Organisationen gezielte Angriffe auf einzelne Unternehmen. Systeme und Daten k\u00f6nnen [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.megasoft.de\/en\/magazin\/partner\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"megasoft IT GmbH &amp; Co. KG\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-30T13:51:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-24T10:23:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.megasoft.de\/wp-content\/uploads\/security-software-solution-megasoft.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"FMP\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"FMP\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/\"},\"author\":{\"name\":\"FMP\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/person\\\/999c43a12d83d8fd626c3b06450cf425\"},\"headline\":\"Security\",\"datePublished\":\"2019-09-30T13:51:02+00:00\",\"dateModified\":\"2020-02-24T10:23:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/\"},\"wordCount\":67,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/security-software-solution-megasoft.jpg\",\"articleSection\":[\"Solutions\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/\",\"name\":\"Security - megasoft IT GmbH &amp; Co. KG\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/security-software-solution-megasoft.jpg\",\"datePublished\":\"2019-09-30T13:51:02+00:00\",\"dateModified\":\"2020-02-24T10:23:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/security-software-solution-megasoft.jpg\",\"contentUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/security-software-solution-megasoft.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/magazin\\\/partner\\\/security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.megasoft.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#website\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/\",\"name\":\"megasoft IT GmbH &amp; Co. KG\",\"description\":\"Your IT Procurement Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.megasoft.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#organization\",\"name\":\"megasoft IT GmbH &amp; Co. KG\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/megasoft_logo_IT_Procurement_Partner.png\",\"contentUrl\":\"https:\\\/\\\/www.megasoft.de\\\/wp-content\\\/uploads\\\/megasoft_logo_IT_Procurement_Partner.png\",\"width\":1400,\"height\":350,\"caption\":\"megasoft IT GmbH &amp; Co. KG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.megasoft.de\\\/#\\\/schema\\\/person\\\/999c43a12d83d8fd626c3b06450cf425\",\"name\":\"FMP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d05adb72223ba4cad8400fef0d9eaa0e681f4cd89b6ac5c970def351d72f9d07?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d05adb72223ba4cad8400fef0d9eaa0e681f4cd89b6ac5c970def351d72f9d07?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d05adb72223ba4cad8400fef0d9eaa0e681f4cd89b6ac5c970def351d72f9d07?s=96&d=mm&r=g\",\"caption\":\"FMP\"},\"url\":\"https:\\\/\\\/www.megasoft.de\\\/en\\\/author\\\/fmp\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security - megasoft IT GmbH &amp; Co. KG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.megasoft.de\/en\/magazin\/partner\/security\/","og_locale":"en_US","og_type":"article","og_title":"Security - megasoft IT GmbH &amp; Co. KG","og_description":"Die st\u00e4ndig wachsende Gefahr von Diebstahl und Missbrauch von Daten stellt immer wieder neue Herausforderungen an die IT. Nicht nur die Verf\u00fcgbarkeit der Daten, sondern auch deren Schutz spielt f\u00fcr Unternehmen jeder Gr\u00f6\u00dfe eine Rolle. Mittlerweile gibt es von bezahlten Organisationen gezielte Angriffe auf einzelne Unternehmen. Systeme und Daten k\u00f6nnen [&hellip;]","og_url":"https:\/\/www.megasoft.de\/en\/magazin\/partner\/security\/","og_site_name":"megasoft IT GmbH &amp; Co. KG","article_published_time":"2019-09-30T13:51:02+00:00","article_modified_time":"2020-02-24T10:23:49+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.megasoft.de\/wp-content\/uploads\/security-software-solution-megasoft.jpg","type":"image\/jpeg"}],"author":"FMP","twitter_card":"summary_large_image","twitter_misc":{"Written by":"FMP"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/#article","isPartOf":{"@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/"},"author":{"name":"FMP","@id":"https:\/\/www.megasoft.de\/#\/schema\/person\/999c43a12d83d8fd626c3b06450cf425"},"headline":"Security","datePublished":"2019-09-30T13:51:02+00:00","dateModified":"2020-02-24T10:23:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/"},"wordCount":67,"commentCount":0,"publisher":{"@id":"https:\/\/www.megasoft.de\/#organization"},"image":{"@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/security-software-solution-megasoft.jpg","articleSection":["Solutions"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.megasoft.de\/magazin\/partner\/security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/","url":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/","name":"Security - megasoft IT GmbH &amp; Co. KG","isPartOf":{"@id":"https:\/\/www.megasoft.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/#primaryimage"},"image":{"@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/security-software-solution-megasoft.jpg","datePublished":"2019-09-30T13:51:02+00:00","dateModified":"2020-02-24T10:23:49+00:00","breadcrumb":{"@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.megasoft.de\/magazin\/partner\/security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/#primaryimage","url":"https:\/\/www.megasoft.de\/wp-content\/uploads\/security-software-solution-megasoft.jpg","contentUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/security-software-solution-megasoft.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.megasoft.de\/magazin\/partner\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.megasoft.de\/"},{"@type":"ListItem","position":2,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/www.megasoft.de\/#website","url":"https:\/\/www.megasoft.de\/","name":"megasoft IT GmbH &amp; Co. KG","description":"Your IT Procurement Partner","publisher":{"@id":"https:\/\/www.megasoft.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.megasoft.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.megasoft.de\/#organization","name":"megasoft IT GmbH &amp; Co. KG","url":"https:\/\/www.megasoft.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.megasoft.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.megasoft.de\/wp-content\/uploads\/megasoft_logo_IT_Procurement_Partner.png","contentUrl":"https:\/\/www.megasoft.de\/wp-content\/uploads\/megasoft_logo_IT_Procurement_Partner.png","width":1400,"height":350,"caption":"megasoft IT GmbH &amp; Co. KG"},"image":{"@id":"https:\/\/www.megasoft.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.megasoft.de\/#\/schema\/person\/999c43a12d83d8fd626c3b06450cf425","name":"FMP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d05adb72223ba4cad8400fef0d9eaa0e681f4cd89b6ac5c970def351d72f9d07?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d05adb72223ba4cad8400fef0d9eaa0e681f4cd89b6ac5c970def351d72f9d07?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d05adb72223ba4cad8400fef0d9eaa0e681f4cd89b6ac5c970def351d72f9d07?s=96&d=mm&r=g","caption":"FMP"},"url":"https:\/\/www.megasoft.de\/en\/author\/fmp\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-23 04:31:22","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts\/3825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/comments?post=3825"}],"version-history":[{"count":1,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts\/3825\/revisions"}],"predecessor-version":[{"id":3826,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/posts\/3825\/revisions\/3826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/media\/3858"}],"wp:attachment":[{"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/media?parent=3825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/categories?post=3825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.megasoft.de\/en\/wp-json\/wp\/v2\/tags?post=3825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}