{"id":2717,"date":"2024-03-21T15:37:30","date_gmt":"2024-03-21T14:37:30","guid":{"rendered":"http:\/\/courpack.de\/?page_id=2717"},"modified":"2025-07-21T11:01:52","modified_gmt":"2025-07-21T11:01:52","slug":"security-audits","status":"publish","type":"page","link":"https:\/\/darksn.de\/de\/sicherheitsprufungen\/","title":{"rendered":"Sicherheitspr\u00fcfungen"},"content":{"rendered":"<div data-elementor-type=\"page\" data-elementor-id=\"2717\" class=\"elementor elementor-2717\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-287acb6e elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"287acb6e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76fa4cbe\" data-id=\"76fa4cbe\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7404c1d7 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7404c1d7\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Sicherheitspr\u00fcfungen<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4133a147 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4133a147\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5014550\" data-id=\"5014550\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67e9a6d2 elementor-widget__width-initial elementor-absolute elementor-widget-mobile__width-initial elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"67e9a6d2\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/darksn.de\/wp-content\/uploads\/2024\/03\/brainstorming-business-vision-teamwork-casual-concept.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52682351 elementor-widget__width-auto elementor-absolute elementor-widget elementor-widget-counter\" data-id=\"52682351\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Jahre der Erfahrung<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">+<\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"7\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21d31b82\" data-id=\"21d31b82\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9acaee9 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"9acaee9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vertrauen ist unsere Aufgabe.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41434091 elementor-widget__width-initial elementor-absolute elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"41434091\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12c84f48 elementor-widget elementor-widget-text-editor\" data-id=\"12c84f48\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Regelm\u00e4\u00dfige Sicherheitsaudits helfen Unternehmen, ihr Sicherheitsniveau kontinuierlich zu verbessern und widerstandsf\u00e4higer gegen Cyberangriffe zu werden.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1571dd35 elementor-widget elementor-widget-elementskit-progressbar\" data-id=\"1571dd35\" data-element_type=\"widget\" data-widget_type=\"elementskit-progressbar.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <div class=\"waypoint-tigger\">\n            <div class=\"skillbar-group\" data-progress-bar=\"\">\n                <div class=\"single-skill-bar\">\n                                            <div class=\"skill-bar-content\">\n                            <span class=\"skill-title\">Identifizierung von Schwachstellen<\/span>\n                        <\/div><!-- .skill-bar-content END -->\n                        <div class=\"skill-bar\">\n                            <div class=\"skill-track\">\n                                \n                                <div class=\"number-percentage-wraper\">\n                                    <span class=\"number-percentage\" data-value=\"95\" data-animation-duration=\"3500\">0<\/span>%\n\n                                                                    <\/div>\n                            <\/div>\n                        <\/div><!-- .skill-bar END -->\n                                    <\/div><!-- .single-skill-bar END -->\n            <\/div><!-- .skillbar-group END -->\n        <\/div>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18919b24 elementor-widget elementor-widget-elementskit-progressbar\" data-id=\"18919b24\" data-element_type=\"widget\" data-widget_type=\"elementskit-progressbar.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <div class=\"waypoint-tigger\">\n            <div class=\"skillbar-group\" data-progress-bar=\"\">\n                <div class=\"single-skill-bar\">\n                                            <div class=\"skill-bar-content\">\n                            <span class=\"skill-title\">Technische Sicherheitskontrollen<\/span>\n                        <\/div><!-- .skill-bar-content END -->\n                        <div class=\"skill-bar\">\n                            <div class=\"skill-track\">\n                                \n                                <div class=\"number-percentage-wraper\">\n                                    <span class=\"number-percentage\" data-value=\"96\" data-animation-duration=\"3500\">0<\/span>%\n\n                                                                    <\/div>\n                            <\/div>\n                        <\/div><!-- .skill-bar END -->\n                                    <\/div><!-- .single-skill-bar END -->\n            <\/div><!-- .skillbar-group END -->\n        <\/div>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b1a549d elementor-widget elementor-widget-elementskit-progressbar\" data-id=\"6b1a549d\" data-element_type=\"widget\" data-widget_type=\"elementskit-progressbar.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <div class=\"waypoint-tigger\">\n            <div class=\"skillbar-group\" data-progress-bar=\"\">\n                <div class=\"single-skill-bar\">\n                                            <div class=\"skill-bar-content\">\n                            <span class=\"skill-title\">Bewertungen der internen Kontrolle<\/span>\n                        <\/div><!-- .skill-bar-content END -->\n                        <div class=\"skill-bar\">\n                            <div class=\"skill-track\">\n                                \n                                <div class=\"number-percentage-wraper\">\n                                    <span class=\"number-percentage\" data-value=\"98\" data-animation-duration=\"3500\">0<\/span>%\n\n                                                                    <\/div>\n                            <\/div>\n                        <\/div><!-- .skill-bar END -->\n                                    <\/div><!-- .single-skill-bar END -->\n            <\/div><!-- .skillbar-group END -->\n        <\/div>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7be14b19 elementor-widget elementor-widget-elementskit-progressbar\" data-id=\"7be14b19\" data-element_type=\"widget\" data-widget_type=\"elementskit-progressbar.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <div class=\"waypoint-tigger\">\n            <div class=\"skillbar-group\" data-progress-bar=\"\">\n                <div class=\"single-skill-bar\">\n                                            <div class=\"skill-bar-content\">\n                            <span class=\"skill-title\">Gew\u00e4hrleistung der Datensicherheit<\/span>\n                        <\/div><!-- .skill-bar-content END -->\n                        <div class=\"skill-bar\">\n                            <div class=\"skill-track\">\n                                \n                                <div class=\"number-percentage-wraper\">\n                                    <span class=\"number-percentage\" data-value=\"95\" data-animation-duration=\"3500\">0<\/span>%\n\n                                                                    <\/div>\n                            <\/div>\n                        <\/div><!-- .skill-bar END -->\n                                    <\/div><!-- .single-skill-bar END -->\n            <\/div><!-- .skillbar-group END -->\n        <\/div>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-11b5717 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"11b5717\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-213e6fa8\" data-id=\"213e6fa8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4666ba8f elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4666ba8f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-42dc8109\" data-id=\"42dc8109\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21fbbeb2 elementor-position-left elementor-vertical-align-middle elementor-view-default elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"21fbbeb2\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-justice\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRechtliche und regulatorische Fragen\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEs wird gepr\u00fcft, ob die Organisation die einschl\u00e4gigen gesetzlichen Vorschriften und Branchenstandards einh\u00e4lt.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20421c0c elementor-position-left elementor-vertical-align-middle elementor-view-default elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"20421c0c\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-shield1\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tTechnische Sicherheitskontrollen\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tComputersysteme, Netzwerke, Software und andere technologische Infrastrukturen werden eingehenden technischen Tests unterzogen.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-30206103\" data-id=\"30206103\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee268ac elementor-position-left elementor-vertical-align-middle elementor-view-default elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"ee268ac\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"jki jki-user-secret-solid\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSchulung und Sensibilisierung des Personals\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDer Grad des Sicherheitsbewusstseins der Mitarbeiter und die Einhaltung der Sicherheitsrichtlinien werden bewertet.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ca3525a elementor-position-left elementor-vertical-align-middle elementor-view-default elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"4ca3525a\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-graph\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tBewertungen der internen Kontrolle\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tComputersysteme, Netzwerke, Software und andere technologische Infrastrukturen werden eingehenden technischen Tests unterzogen.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-679fbfbc\" data-id=\"679fbfbc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f957ad7 elementor-widget elementor-widget-heading\" data-id=\"4f957ad7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sei immer friedlich<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f2331ca elementor-widget elementor-widget-text-editor\" data-id=\"3f2331ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Regelm\u00e4\u00dfige Sicherheitsaudits helfen Unternehmen, ihr Sicherheitsniveau kontinuierlich zu verbessern und widerstandsf\u00e4higer gegen Cyberangriffe zu werden.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5afec36a elementor-widget elementor-widget-toggle\" data-id=\"5afec36a\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1521\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1521\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewbox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Sicherheit der Daten<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1521\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1521\"><p>Sie garantiert den Schutz sensibler Daten.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1522\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1522\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewbox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Vertrauen der Kunden <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1522\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1522\"><p>Sichert das Vertrauen von Kunden und Gesch\u00e4ftspartnern.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61bd9f19 elementor-widget__width-initial elementor-absolute elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"61bd9f19\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-1f85bf76 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"1f85bf76\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b141bf7 elementor-widget elementor-widget-html\" data-id=\"b141bf7\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n    <meta charset=\"UTF-8\">\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n    <title>Sektion Sicherheitstraining<\/title>\n    <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.4.0\/js\/all.min.js\"><\/script>\n    <style>\n        body {\n            font-family: 'Segoe UI', Tahoma, Geneva, Verdana, sans-serif;\n            line-height: 1.6;\n            color: #333;\n            background-color: #f4f4f4;\n            margin: 0;\n            padding: 0;\n        }\n        .container {\n            max-width: 1200px;\n            margin: 0 auto;\n            padding: 40px 20px;\n        }\n        h2 {\n            text-align: center;\n            color: #2c3e50;\n            margin-bottom: 40px;\n            font-size: 2.5em;\n        }\n        .security-grid {\n            display: grid;\n            grid-template-columns: repeat(3, 1fr);\n            gap: 30px;\n        }\n        .security-item {\n            background-color: #fff;\n            border-radius: 10px;\n            padding: 30px;\n            text-align: center;\n            transition: all 0.3s ease;\n            box-shadow: 0 5px 15px rgba(0,0,0,0.1);\n        }\n        .security-item:hover {\n            transform: translateY(-10px);\n            box-shadow: 0 15px 30px rgba(0,0,0,0.2);\n        }\n        .security-icon {\n            font-size: 3em;\n            margin-bottom: 20px;\n            color: #e74c3c;\n        }\n        .security-title {\n            font-size: 1.4em;\n            font-weight: bold;\n            margin-bottom: 15px;\n            color: #2c3e50;\n        }\n        .security-description {\n            font-size: 1em;\n            color: #7f8c8d;\n        }\n        @media (max-width: 768px) {\n            .security-grid {\n                grid-template-columns: repeat(2, 1fr);\n            }\n        }\n        @media (max-width: 480px) {\n            .security-grid {\n                grid-template-columns: 1fr;\n            }\n        }\n    <\/style>\n<\/head>\n<body>\n    <div class=\"container\">\n        <section id=\"security-training\">\n            <h2>Umfassendes Sicherheitstrainingsprogramm<\/h2>\n            <div class=\"security-grid\">\n                <div class=\"security-item\">\n                    <div class=\"security-icon\">\n                        <i class=\"fas fa-user-shield\" aria-label=\"Person and Shield\"><\/i>\n                    <\/div>\n                    <div class=\"security-title\">Erkennung von Mitarbeiterbedrohungen<\/div>\n                    <div class=\"security-description\">Statten Sie Ihr Team mit den F\u00e4higkeiten aus, Phishing-Versuche, Malware und andere Cyber-Bedrohungen zu erkennen.<\/div>\n                <\/div>\n                <div class=\"security-item\">\n                    <div class=\"security-icon\">\n                        <i class=\"fas fa-laptop-code\" aria-label=\"Laptop code\"><\/i>\n                    <\/div>\n                    <div class=\"security-title\">Bew\u00e4hrte Praktiken der Cybersicherheit<\/div>\n                    <div class=\"security-description\">Vermittlung von Kenntnissen zur Umsetzung bew\u00e4hrter Praktiken in den Bereichen Passwortverwaltung, Verschl\u00fcsselung und sichere Kommunikation.<\/div>\n                <\/div>\n                <div class=\"security-item\">\n                    <div class=\"security-icon\">\n                        <i class=\"fas fa-exclamation-triangle\" aria-label=\"Danger\"><\/i>\n                    <\/div>\n                    <div class=\"security-title\">Schulung zur Reaktion auf Zwischenf\u00e4lle<\/div>\n                    <div class=\"security-description\">Vorbereitung der Mitarbeiter auf eine wirksame Reaktion auf Sicherheitsvorf\u00e4lle, um den Schaden und die Wiederherstellungszeit zu minimieren.<\/div>\n                <\/div>\n                <div class=\"security-item\">\n                    <div class=\"security-icon\">\n                        <i class=\"fas fa-network-wired\" aria-label=\"Network Wired\"><\/i>\n                    <\/div>\n                    <div class=\"security-title\">Sichere Netzwerkbenutzung<\/div>\n                    <div class=\"security-description\">Bringen Sie Ihren Mitarbeitern bei, wie wichtig die sichere Nutzung von Netzwerken, die Vermeidung von \u00f6ffentlichem Wi-Fi f\u00fcr sensible Aufgaben und die Verwendung von VPNs ist.<\/div>\n                <\/div>\n                <div class=\"security-item\">\n                    <div class=\"security-icon\">\n                        <i class=\"fas fa-user-lock\" aria-label=\"User and lock\"><\/i>\n                    <\/div>\n                    <div class=\"security-title\">Rollenbasierte Zugriffskontrolle<\/div>\n                    <div class=\"security-description\">Schulung der Mitarbeiter, damit sie die Zugangskontrollen verstehen und einhalten, um sicherzustellen, dass sensible Daten vor unbefugtem Zugriff gesch\u00fctzt sind.<\/div>\n                <\/div>\n                <div class=\"security-item\">\n                    <div class=\"security-icon\">\n                        <i class=\"fas fa-file-alt\" aria-label=\"Document\"><\/i>\n                    <\/div>\n                    <div class=\"security-title\">Compliance &amp; Datenschutz<\/div>\n                    <div class=\"security-description\">Sensibilisierung f\u00fcr Datenschutzvorschriften wie GDPR und CCPA und F\u00f6rderung der Einhaltung von Rechtsvorschriften im t\u00e4glichen Betrieb.<\/div>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n\n    <script>\n        \/\/ JavaScript functionality can be added here if needed\n    <\/script>\n<\/body>\n<\/html>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c63eb3 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"0c63eb3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40f7728 elementor-widget elementor-widget-html\" data-id=\"40f7728\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n    <meta charset=\"UTF-8\">\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n    <title>Abschnitt Ressourcen<\/title>\n    <style>\n        body {\n            font-family: 'Arial', sans-serif;\n            line-height: 1.6;\n            color: #333;\n            background-color: #f4f7f9;\n            margin: 0;\n            padding: 0;\n        }\n        .container {\n            max-width: 1200px;\n            margin: 0 auto;\n            padding: 40px 20px;\n        }\n        h2 {\n            text-align: center;\n            color: #2c3e50;\n            font-size: 2.5em;\n            margin-bottom: 40px;\n        }\n        .resources-grid {\n            display: grid;\n            grid-template-columns: repeat(3, 1fr);\n            gap: 30px;\n            margin-top: 40px;\n        }\n        .resource-card {\n            background-color: #fff;\n            border-radius: 10px;\n            box-shadow: 0 4px 6px rgba(0,0,0,0.1);\n            overflow: hidden;\n            transition: all 0.3s ease;\n        }\n        .resource-card:hover {\n            transform: translateY(-10px);\n            box-shadow: 0 12px 24px rgba(0,0,0,0.15);\n        }\n        .resource-header {\n            background-color: #e74c3c;\n            color: #fff;\n            padding: 20px;\n            text-align: center;\n            font-size: 1.2em;\n            font-weight: bold;\n        }\n        .resource-body {\n            padding: 20px;\n        }\n        .resource-list {\n            list-style-type: none;\n            padding: 0;\n        }\n        .resource-item {\n            margin-bottom: 15px;\n            padding-left: 20px;\n            position: relative;\n            cursor: pointer;\n            transition: color 0.3s ease;\n        }\n        .resource-item::before {\n            content: '\u2192';\n            position: absolute;\n            left: 0;\n            color: #e74c3c;\n        }\n        .resource-item:hover {\n            color: #e74c3c;\n        }\n        .resource-modal {\n            display: none;\n            position: fixed;\n            z-index: 1;\n            left: 0;\n            top: 0;\n            width: 100%;\n            height: 100%;\n            overflow: auto;\n            background-color: rgba(0,0,0,0.4);\n        }\n        .modal-content {\n            background-color: #fefefe;\n            margin: 15% auto;\n            padding: 20px;\n            border: 1px solid #888;\n            width: 80%;\n            max-width: 600px;\n            border-radius: 10px;\n        }\n        .close {\n            color: #aaa;\n            float: right;\n            font-size: 28px;\n            font-weight: bold;\n            cursor: pointer;\n        }\n        .close:hover {\n            color: #000;\n        }\n        @media (max-width: 768px) {\n            .resources-grid {\n                grid-template-columns: 1fr;\n            }\n        }\n    <\/style>\n<\/head>\n<body>\n    <div class=\"container\">\n        <section id=\"resources\">\n            <h2>Ressourcen<\/h2>\n            <div class=\"resources-grid\">\n                <div class=\"resource-card\">\n                    <div class=\"resource-header\">Datenbl\u00e4tter<\/div>\n                    <div class=\"resource-body\">\n                        <ul class=\"resource-list\">\n                            <li class=\"resource-item\" data-title=\"Fortinet Security Awareness and Training Service Data Sheet\">Fortinet Security Awareness and Training Service Datenblatt<\/li>\n                            <li class=\"resource-item\" data-title=\"Fortinet Security Awareness and Training Service Course Modules\">Fortinet Security Awareness and Training Service Kursmodule<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/div>\n                <div class=\"resource-card\">\n                    <div class=\"resource-header\">Wei\u00dfe Papiere<\/div>\n                    <div class=\"resource-body\">\n                        <ul class=\"resource-list\">\n                            <li class=\"resource-item\" data-title=\"Setting Goals and Planning Your Security Awareness and Training Program\">Zielsetzung und Planung Ihres Programms zur Sensibilisierung und Schulung f\u00fcr Sicherheitsfragen<\/li>\n                            <li class=\"resource-item\" data-title=\"Planning Your Security Awareness and Training Calendar\">Planung Ihres Kalenders f\u00fcr Sicherheitsbewusstsein und Schulungen<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/div>\n                <div class=\"resource-card\">\n                    <div class=\"resource-header\">Leitf\u00e4den zur L\u00f6sung<\/div>\n                    <div class=\"resource-body\">\n                        <ul class=\"resource-list\">\n                            <li class=\"resource-item\" data-title=\"Extend Your Defense Perimeter With the Fortinet Security Awareness and Training Service\">Erweitern Sie Ihren Verteidigungsbereich mit dem Fortinet Security Awareness and Training Service<\/li>\n                        <\/ul>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n\n    <div id=\"resourceModal\" class=\"resource-modal\">\n        <div class=\"modal-content\">\n            <span class=\"close\" onclick=\"closeModal()\">\u00d7<\/span>\n            <h3 id=\"modalTitle\"><\/h3>\n            <p>Hier wird der Inhalt der ausgew\u00e4hlten Ressource angezeigt oder ein Download-Link bereitgestellt. Stellen Sie sicher, dass Links und Inhalte auf Sicherheit \u00fcberpr\u00fcft werden.<\/p>\n        <\/div>\n    <\/div>\n\n    <script>\n        document.querySelectorAll('.resource-item').forEach(item => {\n            item.addEventListener('click', function() {\n                showModal(this.getAttribute('data-title'));\n            });\n        });\n\n        function showModal(title) {\n            document.getElementById('modalTitle').innerText = title;\n            document.getElementById('resourceModal').style.display = 'block';\n        }\n\n        function closeModal() {\n            document.getElementById('resourceModal').style.display = 'none';\n        }\n\n        window.onclick = function(event) {\n            if (event.target == document.getElementById('resourceModal')) {\n                closeModal();\n            }\n        }\n\n        document.addEventListener('keydown', function(event) {\n            if (event.key === 'Escape') {\n                closeModal();\n            }\n        });\n    <\/script>\n<\/body>\n<\/html>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c7d826d e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"c7d826d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21e5048 elementor-widget elementor-widget-html\" data-id=\"21e5048\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n    <meta charset=\"UTF-8\">\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n    <title>Abschnitt \u00fcber unsere Auswirkungen<\/title>\n    <link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.0.0-beta3\/css\/all.min.css\">\n    <style>\n        body {\n            font-family: 'Arial', sans-serif;\n            line-height: 1.6;\n            color: #333;\n            background-color: #f4f7f9;\n            margin: 0;\n            padding: 0;\n        }\n        .container {\n            max-width: 1200px;\n            margin: 0 auto;\n            padding: 40px 20px;\n        }\n        \/* Our Impact Section Styles *\/\n        .impact-section {\n            margin-top: 60px;\n            padding: 40px;\n            background: linear-gradient(135deg, #e74c3c, #c0392b);\n            color: white;\n            border-radius: 20px;\n            position: relative;\n            overflow: hidden;\n            text-align: center;\n        }\n        .impact-header {\n            font-size: 2.5em;\n            margin-bottom: 40px;\n            position: relative;\n            z-index: 1;\n        }\n        .impact-content {\n            position: relative;\n            z-index: 1;\n            display: flex;\n            flex-wrap: wrap;\n            justify-content: space-between;\n        }\n        .impact-item {\n            flex-basis: calc(33.33% - 20px);\n            margin-bottom: 40px;\n            padding: 30px;\n            background: rgba(255, 255, 255, 0.2);\n            border-radius: 20px;\n            position: relative;\n            text-align: left;\n            transition: transform 0.3s;\n        }\n        .impact-item:hover {\n            transform: translateY(-10px);\n        }\n        .impact-item h3 {\n            color: white;\n            margin-bottom: 15px;\n        }\n        .impact-item p {\n            color: white;\n        }\n        .impact-decorative-line {\n            height: 5px;\n            width: 100%;\n            background-color: white;\n            margin: 20px 0;\n        }\n        .impact-icon {\n            font-size: 3em;\n            color: white;\n            margin-bottom: 10px;\n        }\n\n        \/* Responsive styles *\/\n        @media (max-width: 1024px) {\n            .impact-item {\n                flex-basis: calc(50% - 20px);\n            }\n        }\n\n        @media (max-width: 768px) {\n            .container {\n                padding: 20px;\n            }\n            .impact-section {\n                margin-top: 40px;\n                padding: 30px;\n            }\n            .impact-header {\n                font-size: 2em;\n            }\n            .impact-item {\n                flex-basis: 100%;\n                padding: 20px;\n            }\n        }\n\n        @media (max-width: 480px) {\n            .impact-section {\n                margin-top: 30px;\n                padding: 20px;\n            }\n            .impact-header {\n                font-size: 1.8em;\n                margin-bottom: 30px;\n            }\n            .impact-item {\n                padding: 15px;\n            }\n            .impact-icon {\n                font-size: 2.5em;\n            }\n            .impact-item h3 {\n                font-size: 1.2em;\n            }\n        }\n    <\/style>\n<\/head>\n<body>\n    <div class=\"container\">\n        <!-- Our Impact Section -->\n        <section class=\"impact-section\">\n            <h2 class=\"impact-header\">Unser Einfluss<\/h2>\n            <div class=\"impact-content\">\n                <div class=\"impact-item\">\n                    <i class=\"fas fa-users impact-icon\" aria-label=\"Users\"><\/i>\n                    <h3>\u00dcber 1000 geschulte Benutzer<\/h3>\n                    <div class=\"impact-decorative-line\"><\/div>\n                    <p>Wir haben \u00fcber 1000 Benutzer erfolgreich in Cybersicherheitsfragen geschult und ihre F\u00e4higkeiten und Kenntnisse verbessert.<\/p>\n                <\/div>\n                <div class=\"impact-item\">\n                    <i class=\"fas fa-building impact-icon\" aria-label=\"building\"><\/i>\n                    <h3>Mehr als 50 unterst\u00fctzte Unternehmen<\/h3>\n                    <div class=\"impact-decorative-line\"><\/div>\n                    <p>Mehr als 50 Unternehmen haben von unseren ma\u00dfgeschneiderten Schulungsprogrammen profitiert, die zu einem sichereren Umfeld gef\u00fchrt haben.<\/p>\n                <\/div>\n                <div class=\"impact-item\">\n                    <i class=\"fas fa-star impact-icon\" aria-label=\"Star\"><\/i>\n                    <h3>95% Zufriedenheitsrate<\/h3>\n                    <div class=\"impact-decorative-line\"><\/div>\n                    <p>Unsere Kunden berichten \u00fcber eine Zufriedenheitsrate von 95%, was die Wirksamkeit und den Wert unserer Dienstleistungen unterstreicht.<\/p>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n<\/body>\n<\/html>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-22d628a elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"22d628a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-623dfc3\" data-id=\"623dfc3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8044e38 elementor-widget elementor-widget-heading\" data-id=\"8044e38\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Helfen Sie uns, das Bewusstsein f\u00fcr Cybersicherheit noch heute zu st\u00e4rken!<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c79d544 elementor-widget__width-inherit elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c79d544\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/darksn.de\/de\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kontakt<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-0010e32 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"0010e32\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bae645d elementor-widget elementor-widget-html\" data-id=\"bae645d\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n    <meta charset=\"UTF-8\">\n    <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n    <title>Security Audits - IT Security Assessments in Southern Germany | Darksn<\/title>\n    <meta name=\"description\" content=\"Professional Security Audits in Stuttgart, Ludwigsburg, Frankfurt, Mannheim, Karlsruhe, Heidelberg, Freiburg, Nuremberg and Munich. IT security assessments with cutting-edge tools.\">\n    <meta name=\"keywords\" content=\"Security Audits, IT Security Assessments, Stuttgart, Ludwigsburg, Frankfurt, Mannheim, Karlsruhe, Heidelberg, Freiburg, Nuremberg, Munich, Darksn\">\n    <link rel=\"canonical\" href=\"https:\/\/darksn.de\/Security-Audits-seo.html\">\n    \n    <!-- Open Graph Meta Tags -->\n    <meta property=\"og:title\" content=\"Security Audits - IT Security Assessments in Southern Germany\">\n    <meta property=\"og:description\" content=\"Professional Security Audits in Stuttgart, Ludwigsburg, Frankfurt, Mannheim, Karlsruhe, Heidelberg, Freiburg, Nuremberg and Munich.\">\n    <meta property=\"og:type\" content=\"website\">\n    <meta property=\"og:url\" content=\"https:\/\/darksn.de\/Security-Audits-seo.html\">\n    \n    <!-- Twitter Card Meta Tags -->\n    <meta name=\"twitter:card\" content=\"summary_large_image\">\n    <meta name=\"twitter:title\" content=\"Security Audits - IT Security Assessments\">\n    <meta name=\"twitter:description\" content=\"Professional Security Audits in Southern Germany\">\n    \n    <link href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/tailwindcss\/2.2.19\/tailwind.min.css\" rel=\"stylesheet\">\n    <link href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.0.0\/css\/all.min.css\" rel=\"stylesheet\">\n    <style>\n        .seo-content-wrapper {\n            background: #ffffff;\n            min-height: 100vh;\n            padding: 2rem 0;\n        }\n\n        .content-container {\n            max-width: 1400px;\n            margin: 0 auto;\n        }\n\n        .seo-grid {\n            display: grid;\n            grid-template-columns: 1fr 1fr;\n            gap: 2rem;\n        }\n\n        .seo-section {\n            background: linear-gradient(135deg, #f8f9fa 0%, #e9ecef 100%);\n            border: 1px solid #dee2e6;\n            border-radius: 15px;\n            padding: 2rem;\n            color: #333333;\n            height: 100%;\n            display: flex;\n            flex-direction: column;\n            box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);\n            transition: all 0.3s ease;\n        }\n\n        .seo-section:hover {\n            transform: translateY(-5px);\n            box-shadow: 0 8px 25px rgba(0, 0, 0, 0.15);\n            border-color: #ef4444;\n        }\n\n        .seo-section h2 {\n            color: #1a1a1a;\n            font-size: 1.25rem;\n            font-weight: bold;\n            margin-bottom: 1rem;\n            border-bottom: 2px solid #ef4444;\n            padding-bottom: 0.5rem;\n            line-height: 1.4;\n        }\n\n        .seo-section p {\n            line-height: 1.8;\n            color: #495057;\n            margin-bottom: 1rem;\n            flex-grow: 1;\n        }\n\n        .highlight {\n            color: #ef4444 !important;\n            font-weight: 600 !important;\n        }\n\n        .ui-tech-tags {\n            display: flex;\n            flex-wrap: wrap;\n            gap: 0.5rem;\n            margin-top: 1rem;\n        }\n\n        .ui-tech-tag {\n            display: inline-block;\n            padding: 0.5rem 1rem;\n            background: linear-gradient(135deg, #1a1a1a 0%, #333333 100%);\n            color: #ffffff !important;\n            text-decoration: none;\n            border-radius: 25px;\n            font-size: 0.875rem;\n            font-weight: 500;\n            transition: all 0.3s ease;\n            box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1);\n        }\n\n        .ui-tech-tag:hover {\n            background: linear-gradient(135deg, #ef4444 0%, #dc2626 100%);\n            transform: translateY(-2px);\n            box-shadow: 0 4px 8px rgba(239, 68, 68, 0.3);\n            color: #ffffff;\n        }\n\n        @media (max-width: 768px) {\n            .seo-grid {\n                grid-template-columns: 1fr;\n            }\n            \n            .ui-tech-tags {\n                justify-content: center;\n            }\n        }\n    <\/style>\n<\/head>\n<body>\n    <div class=\"seo-content-wrapper\">\n        <div class=\"content-container\">\n            <div class=\"seo-grid\">\n                <div class=\"seo-section\">\n                    <h2>1. Security Audits in Stuttgart, Ludwigsburg, Frankfurt, Mannheim, Karlsruhe, Heidelberg, Freiburg, N\u00fcrnberg und M\u00fcnchen<\/h2>\n                    <p>In deutschen Wirtschaftsmetropolen wie Stuttgart, Ludwigsburg, Frankfurt, Mannheim, Karlsruhe, Heidelberg, Freiburg, N\u00fcrnberg und M\u00fcnchen r\u00fcckt das Thema IT-Security-Audits zunehmend in den Fokus. Unternehmen sind gesetzlich verpflichtet, ihre Systeme regelm\u00e4\u00dfig auf Sicherheitsrisiken zu \u00fcberpr\u00fcfen \u2013 insbesondere im Kontext der DSGVO, ISO 27001 oder branchenspezifischer Standards.<\/p>\n                    <p>Darksn bietet strukturierte Security Audits, um IT-Risiken aufzudecken, Sicherheitsl\u00fccken zu schlie\u00dfen und Ihre Infrastruktur zukunftssicher zu machen.<\/p>\n                    <div class=\"ui-tech-tags\">\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/sicherheitsprufungen\/\">Sicherheitspr\u00fcfungen<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/comprehensive-security-consultation-services-how-experts-help-organizations-develop-robust-cyber-defense-strategies\/\">Cyber-Sicherheit<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/it-sicherheit\/\">IT-Sicherheit<\/a>\n                    <\/div>\n                <\/div>\n\n                <div class=\"seo-section\">\n                    <h2>2. Netzwerk- und Systemanalyse mit Nmap, Wireshark &amp; Netcat<\/h2>\n                    <p>Unsere Audits beginnen mit einer tiefgreifenden Analyse Ihrer Netzwerkinfrastruktur. Tools wie Nmap, Zenmap, Netcat und Wireshark helfen dabei, offene Ports, ungew\u00f6hnlichen Traffic und potenzielle Schwachstellen zu identifizieren. Dabei decken wir auch schlecht konfigurierte Services oder unn\u00f6tig ge\u00f6ffnete Ports auf.<\/p>\n                    <div class=\"ui-tech-tags\">\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/what-is-network-security-and-why-its-essential-for-every-organization\/\">Netzwerksicherheit<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/penetrationstests\/\">Penetrationstests<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/vulnerability-assessment\/\">Vulnerability Assessment<\/a>\n                    <\/div>\n                <\/div>\n\n                <div class=\"seo-section\">\n                    <h2>3. Automatisierte Schwachstellen-Scans mit Nessus, Qualys &amp; OpenVAS<\/h2>\n                    <p>Darksn setzt auf marktf\u00fchrende Scanner wie Nessus, QualysGuard, OpenVAS (Greenbone) und Rapid7 InsightVM, um automatisierte Schwachstellenanalysen durchzuf\u00fchren. Diese Tools erkennen bekannte Exploits, veraltete Software-Versionen und fehlerhafte Konfigurationen \u2013 auch in komplexen Multi-Cloud-Umgebungen.<\/p>\n                    <div class=\"ui-tech-tags\">\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/multi-cloud-management\/\">Multi-Cloud Environments<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/datenlosungen\/\">Daten-L\u00f6sungen<\/a>\n                    <\/div>\n                <\/div>\n\n                <div class=\"seo-section\">\n                    <h2>4. Webanwendungen sicher testen mit OWASP ZAP, Burp Suite &amp; Acunetix<\/h2>\n                    <p>F\u00fcr Unternehmen mit Webportalen und Online-Diensten pr\u00fcfen wir mithilfe von OWASP ZAP, Burp Suite und Acunetix, ob SQL-Injections, XSS, CSRF oder andere Sicherheitsl\u00fccken bestehen. Diese Tools simulieren Angriffe realer Hacker und erm\u00f6glichen so gezielte Schutzma\u00dfnahmen.<\/p>\n                    <div class=\"ui-tech-tags\">\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/what-is-network-security-and-why-its-essential-for-every-organization\/\">Web-Sicherheit<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/mysql-vs-postgresql-which-open-source-database-is-right-for-you\/\">SQL Protection<\/a>\n                    <\/div>\n                <\/div>\n\n                <div class=\"seo-section\">\n                    <h2>5. Logging &amp; Monitoring mit Splunk, QRadar, LogRhythm &amp; Graylog<\/h2>\n                    <p>Eine effektive \u00dcberwachung ist ein zentraler Bestandteil jedes Audits. Mit SIEM-Systemen wie Splunk, IBM QRadar, LogRhythm und Graylog erm\u00f6glichen wir eine Echtzeit-Auswertung Ihrer Logs, Alarmierung bei Sicherheitsvorf\u00e4llen sowie forensische Analysen.<\/p>\n                    <div class=\"ui-tech-tags\">\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/what-are-siem-systems-and-why-your-business-needs-one\/\">SIEM Systems<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/bewertung-und-uberwachung-der-cloud-sicherheit\/\">Security Monitoring<\/a>\n                    <\/div>\n                <\/div>\n\n                <div class=\"seo-section\">\n                    <h2>6. Konfigurations- und Compliance-Audits mit Lynis, CIS-CAT &amp; Tripwire<\/h2>\n                    <p>Unsere Security Audits beinhalten auch die Pr\u00fcfung Ihrer Konfigurationen mit Tools wie<\/p>\n                    <p>\u2022 Lynis (for Linux hardening)<\/p>\n                    <p>\u2022 Tripwire (file integrity monitoring)<\/p>\n                    <p>\u2022 CIS-CAT (CIS benchmark scoring)<\/p>\n                    <p>Damit stellen wir sicher, dass Ihre Systeme konform zu internationalen Sicherheitsstandards betrieben werden.<\/p>\n                    <div class=\"ui-tech-tags\">\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/sicherheitsprufungen\/\">Compliance Audits<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/datenverwaltung\/\">Service<\/a>\n                    <\/div>\n                <\/div>\n\n                <div class=\"seo-section\">\n                    <h2>7. Cloud Security Audits: Azure, AWS &amp; Google Cloud<\/h2>\n                    <p>F\u00fcr Cloud-Umgebungen verwenden wir spezifische Tools wie<\/p>\n                    <p>\u2022 Microsoft Defender for Cloud<\/p>\n                    <p>\u2022 AWS Security Hub<\/p>\n                    <p>\u2022 Google Security Command Center<\/p>\n                    <p>\u2022 CloudSploit<\/p>\n                    <p>\u2022 Prowler<\/p>\n                    <p>Damit pr\u00fcfen wir Ihre Cloud-Ressourcen auf Fehlkonfigurationen, gef\u00e4hrliche Zugriffsrechte und Compliance-Verst\u00f6\u00dfe.<\/p>\n                    <div class=\"ui-tech-tags\">\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/bewertung-und-uberwachung-der-cloud-sicherheit\/\">Cloud-Sicherheit<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/microsoftazure\/\">Microsoft Azure<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/amazon-web-services\/\">AWS<\/a>\n                    <\/div>\n                <\/div>\n\n                <div class=\"seo-section\">\n                    <h2>8. Penetration Testing Integration mit Metasploit &amp; Kali Tools<\/h2>\n                    <p>Wir erg\u00e4nzen Audits durch manuelle oder automatisierte Scheinangriffe mit<\/p>\n                    <p>\u2022 Metasploit Framework<\/p>\n                    <p>\u2022 Kali Linux tools like SQLmap, Hydra, and Nikto<\/p>\n                    <p>um zu pr\u00fcfen, ob Systeme realen Angriffen standhalten.<\/p>\n                    <div class=\"ui-tech-tags\">\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/penetrationstests\/\">Penetrationstests<\/a>\n                    <\/div>\n                <\/div>\n\n                <div class=\"seo-section\">\n                    <h2>9. Darksn \u2013 Ihr Partner f\u00fcr professionelle Security Audits in S\u00fcddeutschland<\/h2>\n                    <p>Mit Sitz in Ludwigsburg und Kunden in ganz Baden-W\u00fcrttemberg und Bayern bietet Darksn ma\u00dfgeschneiderte Sicherheitspr\u00fcfungen f\u00fcr Unternehmen jeder Gr\u00f6\u00dfe. Wir kombinieren automatisierte Tools mit tiefgreifender Analyse und liefern konkrete Handlungsempfehlungen zur St\u00e4rkung Ihrer IT-Sicherheit.<\/p>\n                    <p>Vertrauen Sie auf unsere Expertise f\u00fcr ganzheitliche IT-Sicherheit in Stuttgart, Ludwigsburg, Frankfurt, Mannheim, Karlsruhe, Heidelberg, Freiburg, N\u00fcrnberg und M\u00fcnchen.<\/p>\n                    <div class=\"ui-tech-tags\">\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/sicherheitsberatung\/\">Sicherheits-Beratung<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/comprehensive-security-consultation-services-how-experts-help-organizations-develop-robust-cyber-defense-strategies\/\">Cyber Defense<\/a>\n                        <a class=\"ui-tech-tag\" href=\"https:\/\/darksn.de\/de\/it-sicherheit\/\">IT Security Services<\/a>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/body>\n<\/html>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Security Audits Years of experience + 0 Trust is our job. Regular security audits help organizations to continuously improve their security level and become more resistant to cyber attacks. Identification of weak points 0% Technical security controls 0% Internal control assessments 0% Ensuring data security 0% Legal and regulatory issues It is checked whether the organization complies with the relevant legal regulations and industry standards. Technical security controls Computer systems, networks, software and other technological infrastructures undergo detailed technical testing. Training and sensitization of staff The level of safety awareness of staff and compliance with safety guidelines are assessed. Internal control assessments Computersysteme, Netzwerke, Software und andere technologische Infrastrukturen werden eingehenden technischen Tests unterzogen. Always be peaceful Regular security audits help organizations to continuously improve their security level and become more resistant to cyber attacks. Data security It guarantees the protection of sensitive data. Customer confidence Secures the trust of customers and business partners. Security Training Section Comprehensive Security Training Program Employee Threat Recognition Equip your team with the skills to identify phishing attempts, malware, and other cyber threats. Cybersecurity Best Practices Provide staff with the knowledge to implement best practices in password management, encryption, and secure communications. Incident Response Training Prepare employees to respond effectively to security incidents, minimizing damage and recovery time. Secure Network Usage Teach staff the importance of secure network use, avoiding public Wi-Fi for sensitive tasks, and using VPNs. Role-Based Access Control Train employees to understand and respect access controls, ensuring that sensitive data is protected from unauthorized access. Compliance &#038; Data Privacy Ensure awareness of data privacy regulations like GDPR and CCPA, promoting legal compliance in everyday operations. Resources Section Resources Data Sheets Fortinet Security Awareness and Training Service Data Sheet Fortinet Security Awareness and Training Service Course Modules White Papers Setting Goals and Planning Your Security Awareness and Training Program Planning Your Security Awareness and Training Calendar Solution Guides Extend Your Defense Perimeter With the Fortinet Security Awareness and Training Service &times; This is where the content of the selected resource would be displayed or a download link would be provided. Ensure to verify links and content for security. Our Impact Section Our Impact Over 1000 Users Trained We have successfully trained over 1000 users in cybersecurity awareness, enhancing their skills and knowledge. 50+ Companies Supported More than 50 companies have benefited from our tailored training programs, leading to a more secure environment. 95% Satisfaction Rate Our clients report a 95% satisfaction rate, showcasing the effectiveness and value of our services. Join Us in Strengthening Cybersecurity Awareness Today! Contact Us Security Audits &#8211; IT Security Assessments in Southern Germany | Darksn 1. Security Audits in Stuttgart, Ludwigsburg, Frankfurt, Mannheim, Karlsruhe, Heidelberg, Freiburg, Nuremberg, and Munich In major German business hubs such as Stuttgart, Ludwigsburg, Frankfurt, Mannheim, Karlsruhe, Heidelberg, Freiburg, Nuremberg, and Munich, IT security audits are gaining importance. Companies are legally required to regularly assess their systems for security risks \u2013 especially in the context of GDPR, ISO 27001, or industry-specific standards. Darksn offers structured security audits to uncover IT risks, close vulnerabilities, and make your infrastructure future-proof. Security Audits Cyber Security IT Security 2. Network and System Analysis with Nmap, Wireshark &#038; Netcat Our audits begin with a thorough analysis of your network infrastructure. Tools like Nmap, Zenmap, Netcat, and Wireshark help identify open ports, unusual traffic, and potential vulnerabilities. We also detect misconfigured services and unnecessarily exposed interfaces. Network Security Penetration Testing Vulnerability Assessment 3. Automated Vulnerability Scans with Nessus, Qualys &#038; OpenVAS Darksn leverages industry-leading scanners like Nessus, QualysGuard, OpenVAS (Greenbone), and Rapid7 InsightVM to run automated vulnerability assessments. These tools identify known exploits, outdated software versions, and misconfigurations \u2013 even across complex multi-cloud environments. Multi-Cloud Environments Data Solutions 4. Web Application Security Testing with OWASP ZAP, Burp Suite &#038; Acunetix For companies with web portals and online services, we use OWASP ZAP, Burp Suite, and Acunetix to detect SQL injection, XSS, CSRF, and other vulnerabilities. These tools simulate real-world hacker attacks, enabling targeted security improvements. Web Security SQL Protection 5. Logging &#038; Monitoring with Splunk, QRadar, LogRhythm &#038; Graylog Effective monitoring is a core element of every audit. Using SIEM platforms like Splunk, IBM QRadar, LogRhythm, and Graylog, we enable real-time log analysis, security incident alerts, and forensic investigations. SIEM Systems Security Monitoring 6. Configuration &#038; Compliance Audits with Lynis, CIS-CAT &#038; Tripwire Our security audits also include configuration and compliance checks using tools such as: \u2022 Lynis (for Linux hardening) \u2022 Tripwire (file integrity monitoring) \u2022 CIS-CAT (CIS benchmark scoring) This ensures your systems operate in alignment with international security standards. Compliance Audits Data Management 7. Cloud Security Audits: Azure, AWS &#038; Google Cloud For cloud infrastructures, we utilize specialized tools such as: \u2022 Microsoft Defender for Cloud \u2022 AWS Security Hub \u2022 Google Security Command Center \u2022 CloudSploit \u2022 Prowler These platforms audit your cloud resources for misconfigurations, excessive permissions, and compliance violations. Cloud Security Microsoft Azure AWS 8. Penetration Testing Integration with Metasploit &#038; Kali Tools We enhance audits with manual and automated penetration testing using tools such as: \u2022 Metasploit Framework \u2022 Kali Linux tools like SQLmap, Hydra, and Nikto This allows us to validate whether systems can withstand real-world cyberattacks. Penetration Testing 9. Darksn \u2013 Your Partner for Professional Security Audits in Southern Germany Based in Ludwigsburg and serving clients throughout Baden-W\u00fcrttemberg and Bavaria, Darksn provides custom security audits for businesses of all sizes. We combine automated scanning with in-depth analysis and deliver clear, actionable recommendations to enhance your IT security. Rely on our expertise for holistic IT security in Stuttgart, Ludwigsburg, Frankfurt, Mannheim, Karlsruhe, Heidelberg, Freiburg, Nuremberg, and Munich. Security Consultation Cyber Defense IT Security Services<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"coauthors":[],"class_list":["post-2717","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/darksn.de\/de\/wp-json\/wp\/v2\/pages\/2717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/darksn.de\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/darksn.de\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/darksn.de\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/darksn.de\/de\/wp-json\/wp\/v2\/comments?post=2717"}],"version-history":[{"count":14,"href":"https:\/\/darksn.de\/de\/wp-json\/wp\/v2\/pages\/2717\/revisions"}],"predecessor-version":[{"id":30129,"href":"https:\/\/darksn.de\/de\/wp-json\/wp\/v2\/pages\/2717\/revisions\/30129"}],"wp:attachment":[{"href":"https:\/\/darksn.de\/de\/wp-json\/wp\/v2\/media?parent=2717"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/darksn.de\/de\/wp-json\/wp\/v2\/coauthors?post=2717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}