{"id":1453,"date":"2023-01-19T15:56:48","date_gmt":"2023-01-19T15:56:48","guid":{"rendered":"https:\/\/guide.trustvalley.swiss\/chapter\/technologien-und-schutz\/"},"modified":"2023-06-05T11:41:45","modified_gmt":"2023-06-05T11:41:45","slug":"technologien-und-schutz","status":"publish","type":"chapter","link":"https:\/\/guide.trustvalley.swiss\/de\/chapter\/technologien-und-schutz\/","title":{"rendered":"L\u00f6sungen und Technologien f\u00fcr KMU"},"content":{"rendered":"\n<p>Dieses Kapitel enth\u00e4lt konkrete Ratschl\u00e4ge zu den Technologien und L\u00f6sungen, die KMU zum Schutz ihrer Cybersicherheit einsetzen k\u00f6nnen. Es stellt zun\u00e4chst \u00dcberlegungen zu den Angriffsszenarien an und befasst sich anschliessend mit den Instrumenten und L\u00f6sungen, die in den zwei Phasen eingesetzt werden sollten, die alle Cyberangriffe gemeinsam haben: die Phase des Erstzugriffs und die Ausnutzungsphase (Exploitation). <\/p>\n","protected":false},"featured_media":0,"template":"","categories":[],"searchablecategory":[],"class_list":["post-1453","chapter","type-chapter","status-publish","hentry"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":[],"comment_info":"","_links":{"self":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter\/1453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/chapter"}],"about":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/types\/chapter"}],"wp:attachment":[{"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/media?parent=1453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/categories?post=1453"},{"taxonomy":"searchablecategory","embeddable":true,"href":"https:\/\/guide.trustvalley.swiss\/de\/wp-json\/wp\/v2\/searchablecategory?post=1453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}