{"id":31682,"date":"2024-03-15T12:30:03","date_gmt":"2024-03-15T11:30:03","guid":{"rendered":"https:\/\/dev7.homepage-balingen.de\/?page_id=31682"},"modified":"2025-03-20T07:33:24","modified_gmt":"2025-03-20T06:33:24","slug":"site-assessments","status":"publish","type":"page","link":"https:\/\/cybershield-consulting.com\/en\/our-services\/site-assessments\/","title":{"rendered":"Site Assessments"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid headhero vc_custom_1711016041993 vc_row-o-content-bottom vc_row-flex wpex-vc-full-width-row wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\" style=\"min-height:40vh;background-position:50% 50%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative bg-fixed-top wpex-vc-bg-fixed wpex-vc-bg-top\" style=\"background-position:50% 0%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"font-size:15px;font-weight:600;text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>OUR SERVICES<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_20 vc_sep_border_width_4 vc_sep_pos_align_center vc_separator_no_text wpb_content_element  wpb_content_element wpb_animate_when_almost_visible wpb_fadeIn fadeIn wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-heading.vcex_69fe9aab109d6{animation-duration:2s;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_69fe9aab109d6\"><span class=\"vcex-heading-inner wpex-inline-block\">Site Assessments \/ Audits - Systematic review of your security infrastructure<\/span><\/h1><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_column-gap-25 vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\" class=\"translation-block\">In an increasingly interconnected world, cyber security threats are becoming more and more of a focus for companies. However, a well-functioning system is not enough to protect against potential attacks. Companies need to ensure that their infrastructure is regularly checked for vulnerabilities so that they can respond to attacks proactively. This is where <strong>Site Assessments<\/strong> and <strong> Audits <\/strong> come into play - comprehensive checks that examine your systems and operations for security gaps and optimization potential.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>What are Site Assessments?<\/strong><\/p>\n<p class=\"translation-block\">Site assessments are structured security checks of a system or company. The aim is to identify potential vulnerabilities that could be exploited by attackers. During such an assessment, we not only consider the usual IT-related threats, but also other security-relevant aspects such as <strong>Physical Security<\/strong> and <strong>Vendor Management<\/strong>.<\/p>\n<ul>\n<li class=\"translation-block\"><strong> IT-Security<\/strong>: The focus here is on analyzing networks, software and hardware for security vulnerabilities. This includes the identification of vulnerabilities that are at risk from cyber attacks or internal errors.<\/li>\n<li class=\"translation-block\"><strong>Physical Security<\/strong>: Not only digital but also physical threats pose a danger to your company. Our assessments investigate whether unauthorized persons can gain physical access to critical systems or data.<\/li>\n<li class=\"translation-block\"><strong>Vendor Management<\/strong>: Attacks via third-party providers are becoming an increasingly serious threat. We check whether your suppliers and partners comply with appropriate security standards and do not act as an \u201centry point\u201d for attackers.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column ansprechpartnercont vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69fe9aab11244{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center vcex_69fe9aab11244\"><span class=\"vcex-heading-inner wpex-inline-block\">Your contact person<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-image.vcex_69fe9aab1157e .vcex-image-img{border-radius:var(--wpex-rounded-full);height:200px;}.vcex-image.vcex_69fe9aab1157e .vcex-image-inner{max-width:200px;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center vcex_69fe9aab1157e\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"400\" height=\"385\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1.jpg\" class=\"vcex-image-img wpex-align-middle wpex-object-cover\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1.jpg 400w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1-300x289.jpg 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1-12x12.jpg 12w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Serhii Salii<\/p>\n<p><span data-teams=\"true\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Cybersecurity Engineer<\/span><\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Why are Site Assessments important?<\/strong><\/p>\n<p>By carrying out a site assessment, companies not only receive a detailed overview of potential vulnerabilities, but also recommendations on how these can be remedied. This not only strengthens resilience to attacks, but also fulfills legal and contractual security requirements, e.g. as part of ISO 27001 or the GDPR.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Assessment Findings: Mastering the next challenge<\/strong><\/p>\n<p class=\"translation-block\">After a successful site assessment, you will be confronted with an <strong>Assessment\/Audit report<\/strong> that identifies weaknesses (findings). These findings show where action is needed to ensure security. <br>\nHowever, many companies are faced with the challenge of how to resolve these findings in the required time. In addition, the security of a newly designed system is often assessed as inadequate, which can lead to the architecture or the technologies used being adapted.\nThis is where we come in: <strong>CyberShield<\/strong> helps companies to fix the vulnerabilities in the timeframe, ensure that new systems meet security standards and provides support in meeting compliance requirements.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Our service offer<\/strong><\/p>\n<ul>\n<li><strong>Security assessment of your systems:<\/strong> We examine your IT infrastructure, operating systems and physical environments for vulnerabilities that an attacker could exploit.<\/li>\n<li><strong>Risk assessment and prioritization:<\/strong> Based on the analysis, we prioritize the findings so that you can focus on the most critical aspects.<\/li>\n<li class=\"translation-block\"><strong> Development of solutions: <\/strong> We help you to develop customized security solutions that offer your company lasting protection. Whether it's system adaptations or the implementation of new technologies - we offer comprehensive support.<\/li>\n<li class=\"translation-block\"><strong>Regular checks and monitoring:<\/strong> Security is not a one-time project. We offer regular audits and monitoring services to ensure that your system remains permanently protected.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p class=\"translation-block\">Security assessments are essential to arm companies against the ever-growing threats from the digital and physical world. CyberShield Consulting offers you the expertise not only to identify vulnerabilities, but also to take the right measures to address them. <br>\n<strong>Contact us<\/strong> to find out more about our comprehensive assessment and audit services and how we can help you keep your systems secure.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><style>.vcex-image.vcex_69fe9aab126f6{animation-duration:2s;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_69fe9aab126f6\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"300\" height=\"72\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width-18x4.png 18w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"UNSERE LEISTUNGEN Site Assessments \/ Audits - Systematische \u00dcberpr\u00fcfung Ihrer Sicherheitsinfrastruktur In einer immer st\u00e4rker vernetzten Welt r\u00fccken Cybersicherheitsbedrohungen zunehmend in den Fokus von Unternehmen. Ein gut funktionierendes System reicht jedoch nicht aus, um gegen potenzielle Angriffe gewappnet zu sein. Unternehmen m\u00fcssen sicherstellen, dass ihre Infrastruktur regelm\u00e4\u00dfig auf Schwachstellen \u00fcberpr\u00fcft wird, um pr\u00e4ventiv auf Angriffe&hellip;","protected":false},"author":5,"featured_media":31870,"parent":31128,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-31682","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Site Assessments - OT \u2013 CyberSecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/site-assessments\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Site Assessments - OT \u2013 CyberSecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybershield-consulting.com\/en\/our-services\/site-assessments\/\" \/>\n<meta property=\"og:site_name\" content=\"OT \u2013 CyberSecurity\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-20T06:33:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_1920.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/site-assessments\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/site-assessments\\\/\",\"name\":\"Site Assessments - OT \u2013 CyberSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/site-assessments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/site-assessments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Audits_1920.webp\",\"datePublished\":\"2024-03-15T11:30:03+00:00\",\"dateModified\":\"2025-03-20T06:33:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/site-assessments\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/site-assessments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/site-assessments\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Audits_1920.webp\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Audits_1920.webp\",\"width\":1920,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/site-assessments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leistungen\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Site Assessments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"name\":\"CyberShield - OT - CyberSecurity\",\"description\":\"Secure every Moment\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybershield-consulting.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\",\"name\":\"CyberShield\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"width\":300,\"height\":72,\"caption\":\"CyberShield\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/linkedin.com\\\/company\\\/cybershield-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Site Assessments - OT \u2013 CyberSecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybershield-consulting.com\/en\/our-services\/site-assessments\/","og_locale":"en_GB","og_type":"article","og_title":"Site Assessments - OT \u2013 CyberSecurity","og_url":"https:\/\/cybershield-consulting.com\/en\/our-services\/site-assessments\/","og_site_name":"OT \u2013 CyberSecurity","article_modified_time":"2025-03-20T06:33:24+00:00","og_image":[{"width":1920,"height":700,"url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_1920.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybershield-consulting.com\/leistungen\/site-assessments\/","url":"https:\/\/cybershield-consulting.com\/leistungen\/site-assessments\/","name":"Site Assessments - OT \u2013 CyberSecurity","isPartOf":{"@id":"https:\/\/cybershield-consulting.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/site-assessments\/#primaryimage"},"image":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/site-assessments\/#primaryimage"},"thumbnailUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_1920.webp","datePublished":"2024-03-15T11:30:03+00:00","dateModified":"2025-03-20T06:33:24+00:00","breadcrumb":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/site-assessments\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybershield-consulting.com\/leistungen\/site-assessments\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/leistungen\/site-assessments\/#primaryimage","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_1920.webp","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_1920.webp","width":1920,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/cybershield-consulting.com\/leistungen\/site-assessments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cybershield-consulting.com\/"},{"@type":"ListItem","position":2,"name":"Leistungen","item":"https:\/\/cybershield-consulting.com\/leistungen\/"},{"@type":"ListItem","position":3,"name":"Site Assessments"}]},{"@type":"WebSite","@id":"https:\/\/cybershield-consulting.com\/#website","url":"https:\/\/cybershield-consulting.com\/","name":"CyberShield - OT - CyberSecurity","description":"Secure every Moment","publisher":{"@id":"https:\/\/cybershield-consulting.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybershield-consulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cybershield-consulting.com\/#organization","name":"CyberShield","url":"https:\/\/cybershield-consulting.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","width":300,"height":72,"caption":"CyberShield"},"image":{"@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/linkedin.com\/company\/cybershield-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=31682"}],"version-history":[{"count":12,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31682\/revisions"}],"predecessor-version":[{"id":34257,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31682\/revisions\/34257"}],"up":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media\/31870"}],"wp:attachment":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=31682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}