{"id":441,"date":"2016-04-29T09:22:23","date_gmt":"2016-04-29T07:22:23","guid":{"rendered":"http:\/\/dev.organisator.ch\/?p=441"},"modified":"2016-04-29T09:22:23","modified_gmt":"2016-04-29T07:22:23","slug":"gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/en\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/","title":{"rendered":"Danger from within: Five tips for protection against internal perpetrators"},"content":{"rendered":"<figure id=\"attachment_442\" aria-describedby=\"caption-attachment-442\" style=\"width: 612px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-442\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg\" alt=\"\" width=\"612\" height=\"480\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg 612w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator-16x12.jpg 16w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator-223x175.jpg 223w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator-446x350.jpg 446w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator-300x235.jpg 300w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\" \/><figcaption id=\"caption-attachment-442\" class=\"wp-caption-text\">Can data be protected from uninvited access in this way? (Image: Fotolia.com)<\/figcaption><\/figure>\n<figure id=\"attachment_443\" aria-describedby=\"caption-attachment-443\" style=\"width: 337px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-443\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter2-organisator.jpg\" alt=\"\" width=\"337\" height=\"336\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter2-organisator.jpg 337w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter2-organisator-150x150.jpg 150w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter2-organisator-12x12.jpg 12w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter2-organisator-176x175.jpg 176w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter2-organisator-250x250.jpg 250w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter2-organisator-300x299.jpg 300w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter2-organisator-100x100.jpg 100w\" sizes=\"auto, (max-width: 337px) 100vw, 337px\" \/><figcaption id=\"caption-attachment-443\" class=\"wp-caption-text\">Gabriel Gabriel, Managing Director of Brainloop Switzerland<\/figcaption><\/figure>\n<p>With the following five tips, companies can effectively protect themselves against data loss by internal perpetrators:<\/p>\n<p><strong>1. introduce differentiated access rights<\/strong><\/p>\n<p>In order to protect sensitive data, it is necessary to provide employees from different departments with the appropriate access rights. This fulfills the security objective of the need-to-know principle: If documents and data records are not immediately needed for a task, the respective employee is not granted access. Various levels of access can be used to create \"Chinese walls\" within the company that prevent the exchange of information between different departments. In this way, the extent of data loss can be limited.<\/p>\n<p><strong>2. use high-security two-factor authentication<\/strong><\/p>\n<p>To keep the risk as low as possible, a two-step authentication is recommended as a further step. To access the system, for example, the user not only has to enter his password, but also receives an SMS TAN - a transaction number that is only valid for one session. In this way, inside perpetrators cannot gain access to sensitive information and data despite a stolen password.<\/p>\n<p><strong>3. shield information<\/strong><\/p>\n<p>Additional protection is provided by shielding data: Providers, for example, should not have access to files and documents under any circumstances. The rights of administrators can also be restricted to information that is relevant to their activities.<\/p>\n<p><strong>4. implement information rights management<\/strong><\/p>\n<p>Information rights management technologies can be used to control sensitive documents and protect them from unauthorized downloading. This effectively maintains control over documents even when users are authorized to access the information. Dynamically embedded watermarks also prevent users from photographing the screen. Thus, the data remains in its protected environment and does not fall into the hands of third parties or bystanders.<\/p>\n<p><strong>5. record history in an audit-proof manner<\/strong><\/p>\n<p>To prevent data theft by an insider or to uncover it after the fact, it makes sense to record all processes in an audit-proof history. This enables a consistently transparent and traceable flow of information.<\/p>\n<p>Gabriel Gabriel, Managing Director of Brainloop Switzerland, on the growing threat from inside perpetrators: \"In recent years, we have observed that data breaches are increasingly attributable to insiders. Companies often make it very easy for their own employees to obtain and disseminate sensitive data due to a lack of security standards and precautions. In the event of a data loss, however, it is not only the company's image that suffers. Rather, the financial and legal consequences can also threaten the economic existence. Brainloop therefore advocates compliance with the above security standards to mitigate the risk for companies.\"<\/p>\n<p><em>Source: <a href=\"http:\/\/www.brainloop.com\" target=\"_blank\" data-cke-saved-href=\"http:\/\/www.brainloop.com\" rel=\"noopener\">Brainloop<\/a>\u00a0<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Mit den nachfolgenden f\u00fcnf Tipps k\u00f6nnen sich Unternehmen wirksam gegen Datenverluste durch Innent\u00e4ter sch\u00fctzen: 1.\u00a0\u00a0\u00a0 Differenzierte Zugriffsrechte einf\u00fchren Um sensible Daten zu sch\u00fctzen, gilt es, Mitarbeiter aus unterschiedlichen Abteilungen mit den passenden Zugriffsrechten auszustatten. Damit wird das Sicherheitsziel des Need-to-know-Prinzips erf\u00fcllt: Wenn Dokumente und Datens\u00e4tze nicht unmittelbar f\u00fcr eine Aufgabe ben\u00f6tigt werden, erh\u00e4lt der jeweilige [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":442,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Schutz gegen Innent\u00e4ter","_yoast_wpseo_metadesc":"Ransomware, Trojaner und Malware \u2013 h\u00e4ufig halten Unternehmen Hackerangriffe f\u00fcr das gr\u00f6sste Sicherheitsrisiko. Doch nicht immer sind es Angreifer von aussen","articlekey":"","footnotes":""},"categories":[27],"tags":[260,286,288],"class_list":["post-441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-ict-sicherheit","tag-it","tag-it-business-software"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gefahr aus den eigenen Reihen: F\u00fcnf Tipps zum Schutz gegen Innent\u00e4ter - Organisator<\/title>\n<meta name=\"description\" content=\"Ransomware, Trojaner und Malware \u2013 h\u00e4ufig halten Unternehmen Hackerangriffe f\u00fcr das gr\u00f6sste Sicherheitsrisiko. Doch nicht immer sind es Angreifer von aussen\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/en\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gefahr aus den eigenen Reihen: F\u00fcnf Tipps zum Schutz gegen Innent\u00e4ter\" \/>\n<meta property=\"og:description\" content=\"Ransomware, Trojaner und Malware \u2013 h\u00e4ufig halten Unternehmen Hackerangriffe f\u00fcr das gr\u00f6sste Sicherheitsrisiko. Doch nicht immer sind es Angreifer von aussen, die L\u00fccken im Firmennetzwerk ausnutzen. Auch Mitarbeiter aus den eigenen Reihen k\u00f6nnen ohne grossen Aufwand ihre umfangreichen Zugriffsm\u00f6glichkeiten f\u00fcr den Datenmissbrauch nutzen. Nur selten sind Organisationen genauso gut mit Mitteln und Tools gegen interne Angriffe ausgestattet wie gegen Attacken von aussen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/en\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-29T07:22:23+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/aa2bace6c5c5aad60102004a50c4eb1c\"},\"headline\":\"Gefahr aus den eigenen Reihen: F\u00fcnf Tipps zum Schutz gegen Innent\u00e4ter\",\"datePublished\":\"2016-04-29T07:22:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/\"},\"wordCount\":463,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg\",\"keywords\":[\"ICT-Sicherheit\",\"IT\",\"IT &amp; Business Software\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/\",\"name\":\"Gefahr aus den eigenen Reihen: F\u00fcnf Tipps zum Schutz gegen Innent\u00e4ter - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg\",\"datePublished\":\"2016-04-29T07:22:23+00:00\",\"description\":\"Ransomware, Trojaner und Malware \u2013 h\u00e4ufig halten Unternehmen Hackerangriffe f\u00fcr das gr\u00f6sste Sicherheitsrisiko. Doch nicht immer sind es Angreifer von aussen\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg\",\"width\":612,\"height\":480,\"caption\":\"Lassen sich Daten auf diese Weise vor ungebetenen Zugriffen sch\u00fctzen? (Bild: Fotolia.com)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2016-04-29\\\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gefahr aus den eigenen Reihen: F\u00fcnf Tipps zum Schutz gegen Innent\u00e4ter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/aa2bace6c5c5aad60102004a50c4eb1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/www.organisator.ch\"],\"url\":\"https:\\\/\\\/www.organisator.ch\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Danger from within: Five tips for protection against internal perpetrators - Organizer","description":"Ransomware, Trojans and malware - companies often consider hacker attacks to be the greatest security risk. But it's not always attackers from the outside.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/en\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/","og_locale":"en_US","og_type":"article","og_title":"Gefahr aus den eigenen Reihen: F\u00fcnf Tipps zum Schutz gegen Innent\u00e4ter","og_description":"Ransomware, Trojaner und Malware \u2013 h\u00e4ufig halten Unternehmen Hackerangriffe f\u00fcr das gr\u00f6sste Sicherheitsrisiko. Doch nicht immer sind es Angreifer von aussen, die L\u00fccken im Firmennetzwerk ausnutzen. Auch Mitarbeiter aus den eigenen Reihen k\u00f6nnen ohne grossen Aufwand ihre umfangreichen Zugriffsm\u00f6glichkeiten f\u00fcr den Datenmissbrauch nutzen. Nur selten sind Organisationen genauso gut mit Mitteln und Tools gegen interne Angriffe ausgestattet wie gegen Attacken von aussen.","og_url":"https:\/\/www.organisator.ch\/en\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2016-04-29T07:22:23+00:00","author":"admin","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/"},"author":{"name":"admin","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/aa2bace6c5c5aad60102004a50c4eb1c"},"headline":"Gefahr aus den eigenen Reihen: F\u00fcnf Tipps zum Schutz gegen Innent\u00e4ter","datePublished":"2016-04-29T07:22:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/"},"wordCount":463,"commentCount":0,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg","keywords":["ICT-Sicherheit","IT","IT &amp; Business Software"],"articleSection":["IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/","url":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/","name":"Danger from within: Five tips for protection against internal perpetrators - Organizer","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg","datePublished":"2016-04-29T07:22:23+00:00","description":"Ransomware, Trojans and malware - companies often consider hacker attacks to be the greatest security risk. But it's not always attackers from the outside.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2016\/12\/Gefahr-aus-den-eigenen-Reihen-Fuenf-Tipps-zum-Schutz-gegen-Innentaeter-organisator.jpg","width":612,"height":480,"caption":"Lassen sich Daten auf diese Weise vor ungebetenen Zugriffen sch\u00fctzen? (Bild: Fotolia.com)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/management\/it\/2016-04-29\/gefahr-aus-den-eigenen-reihen-fuenf-tipps-zum-schutz-gegen-innentaeter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Gefahr aus den eigenen Reihen: F\u00fcnf Tipps zum Schutz gegen Innent\u00e4ter"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organizer","description":"Competent. Practical. In 10 issues per year, ORGANISATOR presents the essential topics for managers of SMEs.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organizer","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/aa2bace6c5c5aad60102004a50c4eb1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/www.organisator.ch"],"url":"https:\/\/www.organisator.ch\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/comments?post=441"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/441\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media\/442"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media?parent=441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/categories?post=441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/tags?post=441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}