{"id":33288,"date":"2024-10-04T12:43:19","date_gmt":"2024-10-04T10:43:19","guid":{"rendered":"https:\/\/cybershield-consulting.com\/?p=33288"},"modified":"2024-10-19T19:56:10","modified_gmt":"2024-10-19T17:56:10","slug":"praktische_it_sicherheit","status":"publish","type":"post","link":"https:\/\/cybershield-consulting.com\/en\/praktische_it_sicherheit\/","title":{"rendered":"Practical IT security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid headhero vc_custom_1715067563486 vc_row-o-content-bottom vc_row-flex wpex-vc-full-width-row wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\" style=\"min-height:40vh;background-position:50% 50%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative bg-fixed-top wpex-vc-bg-fixed wpex-vc-bg-top\" style=\"background-position:50% 0%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><style>.vcex-heading.vcex_69fc464ae0e52{animation-duration:2s;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_69fc464ae0e52\"><span class=\"vcex-heading-inner wpex-inline-block\">Practical IT security<\/span><\/h1><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_20 vc_sep_border_width_4 vc_sep_pos_align_center vc_separator_no_text wpb_content_element  wpb_content_element wpb_animate_when_almost_visible wpb_fadeIn fadeIn wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span data-teams=\"true\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">In 2024, we once again volunteered at two secondary schools and organised a workshop on the topic of \u2018Practical IT security\u2019. It was a pleasure to see how the students engaged with the content with so much interest and the practical part in particular made their eyes light up with enthusiasm. Moments like this show us how important it is to sensitise young people to IT security in an exciting and tangible way.<\/span><\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><figure class=\"vcex-image vcex-module wpex-text-center\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit.webp\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Praktische IT-Sicherheit Auch im Jahr 2024 haben wir uns ehrenamtlich an zwei Gymnasien engagiert und f\u00fcr die Oberstufe einen Workshop zum Thema \"Praktische IT-Sicherheit\" durchgef\u00fchrt. Es war eine Freude zu sehen, wie die Lernenden sich mit gro\u00dfem Interesse auf die Inhalte eingelassen haben und besonders der praktische Teil hat f\u00fcr leuchtende Augen und Begeisterung gesorgt.&hellip;","protected":false},"author":7,"featured_media":33289,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[17],"tags":[],"class_list":["post-33288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nachhaltigkeit","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Praktische IT-Sicherheit - OT \u2013 CyberSecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybershield-consulting.com\/en\/praktische_it_sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Praktische IT-Sicherheit - OT \u2013 CyberSecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybershield-consulting.com\/en\/praktische_it_sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"OT \u2013 CyberSecurity\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-04T10:43:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-19T17:56:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"478\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Adm_schlehuber\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adm_schlehuber\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/\"},\"author\":{\"name\":\"Adm_schlehuber\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/person\\\/c04f7c3ed0f44672189bce767e9dc053\"},\"headline\":\"Praktische IT-Sicherheit\",\"datePublished\":\"2024-10-04T10:43:19+00:00\",\"dateModified\":\"2024-10-19T17:56:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/\"},\"wordCount\":238,\"publisher\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Praktische-IT-Sicherheit.webp\",\"articleSection\":[\"Nachhaltigkeit\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/\",\"name\":\"Praktische IT-Sicherheit - OT \u2013 CyberSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Praktische-IT-Sicherheit.webp\",\"datePublished\":\"2024-10-04T10:43:19+00:00\",\"dateModified\":\"2024-10-19T17:56:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Praktische-IT-Sicherheit.webp\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/Praktische-IT-Sicherheit.webp\",\"width\":900,\"height\":478},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/praktische_it_sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Praktische IT-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"name\":\"CyberShield - OT - CyberSecurity\",\"description\":\"Secure every Moment\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybershield-consulting.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\",\"name\":\"CyberShield\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"width\":300,\"height\":72,\"caption\":\"CyberShield\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/linkedin.com\\\/company\\\/cybershield-gmbh\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/person\\\/c04f7c3ed0f44672189bce767e9dc053\",\"name\":\"Adm_schlehuber\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/en\\\/author\\\/adm_schlehuber\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Praktische IT-Sicherheit - OT \u2013 CyberSecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybershield-consulting.com\/en\/praktische_it_sicherheit\/","og_locale":"en_GB","og_type":"article","og_title":"Praktische IT-Sicherheit - OT \u2013 CyberSecurity","og_url":"https:\/\/cybershield-consulting.com\/en\/praktische_it_sicherheit\/","og_site_name":"OT \u2013 CyberSecurity","article_published_time":"2024-10-04T10:43:19+00:00","article_modified_time":"2024-10-19T17:56:10+00:00","og_image":[{"width":900,"height":478,"url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit.webp","type":"image\/webp"}],"author":"Adm_schlehuber","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adm_schlehuber","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/#article","isPartOf":{"@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/"},"author":{"name":"Adm_schlehuber","@id":"https:\/\/cybershield-consulting.com\/#\/schema\/person\/c04f7c3ed0f44672189bce767e9dc053"},"headline":"Praktische IT-Sicherheit","datePublished":"2024-10-04T10:43:19+00:00","dateModified":"2024-10-19T17:56:10+00:00","mainEntityOfPage":{"@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/"},"wordCount":238,"publisher":{"@id":"https:\/\/cybershield-consulting.com\/#organization"},"image":{"@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit.webp","articleSection":["Nachhaltigkeit"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/","url":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/","name":"Praktische IT-Sicherheit - OT \u2013 CyberSecurity","isPartOf":{"@id":"https:\/\/cybershield-consulting.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit.webp","datePublished":"2024-10-04T10:43:19+00:00","dateModified":"2024-10-19T17:56:10+00:00","breadcrumb":{"@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/#primaryimage","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit.webp","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/10\/Praktische-IT-Sicherheit.webp","width":900,"height":478},{"@type":"BreadcrumbList","@id":"https:\/\/cybershield-consulting.com\/praktische_it_sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cybershield-consulting.com\/"},{"@type":"ListItem","position":2,"name":"Praktische IT-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/cybershield-consulting.com\/#website","url":"https:\/\/cybershield-consulting.com\/","name":"CyberShield - OT - CyberSecurity","description":"Secure every Moment","publisher":{"@id":"https:\/\/cybershield-consulting.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybershield-consulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cybershield-consulting.com\/#organization","name":"CyberShield","url":"https:\/\/cybershield-consulting.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","width":300,"height":72,"caption":"CyberShield"},"image":{"@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/linkedin.com\/company\/cybershield-gmbh\/"]},{"@type":"Person","@id":"https:\/\/cybershield-consulting.com\/#\/schema\/person\/c04f7c3ed0f44672189bce767e9dc053","name":"Adm_schlehuber","url":"https:\/\/cybershield-consulting.com\/en\/author\/adm_schlehuber\/"}]}},"_links":{"self":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/posts\/33288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=33288"}],"version-history":[{"count":6,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/posts\/33288\/revisions"}],"predecessor-version":[{"id":34113,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/posts\/33288\/revisions\/34113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media\/33289"}],"wp:attachment":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=33288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/categories?post=33288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/tags?post=33288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}