{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www.iwelt.de\/category\/cybersecurity\/#CollectionPage","headline":"Cybersecurity Category","description":"","url":"https:\/\/www.iwelt.de\/category\/cybersecurity\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/cyberangriffe-im-mittelstand-risiken-richtig-einschaetzen\/","headline":"Cyberangriffe im Mittelstand: Risiken richtig einsch\u00e4tzen","url":"https:\/\/www.iwelt.de\/cyberangriffe-im-mittelstand-risiken-richtig-einschaetzen\/","datePublished":"2026-04-19","dateModified":"2026-04-28","mainEntityOfPage":"https:\/\/www.iwelt.de\/cyberangriffe-im-mittelstand-risiken-richtig-einschaetzen\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/cybersicherheit-mittelstand-.webp","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/cybersicherheit-mittelstand-.webp","height":720,"width":1280},"keywords":["Cybersecurity"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/was-ist-phishing-erkennen-verhindern-e-mail-schuetzen-2\/","headline":"Was ist Phishing? Erkennen, verhindern &#038; E-Mail sch\u00fctzen","url":"https:\/\/www.iwelt.de\/was-ist-phishing-erkennen-verhindern-e-mail-schuetzen-2\/","datePublished":"2026-02-25","dateModified":"2026-03-04","mainEntityOfPage":"https:\/\/www.iwelt.de\/was-ist-phishing-erkennen-verhindern-e-mail-schuetzen-2\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-phishing.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-phishing.png","height":720,"width":1280},"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/aenderungen-bei-der-denic-domainabfrage-und-was-dies-fuer-unternehmen-bedeutet\/","headline":"\u00c4nderungen bei der DENIC Domainabfrage und was dies f\u00fcr Unternehmen bedeutet","url":"https:\/\/www.iwelt.de\/aenderungen-bei-der-denic-domainabfrage-und-was-dies-fuer-unternehmen-bedeutet\/","datePublished":"2025-12-17","dateModified":"2025-12-17","mainEntityOfPage":"https:\/\/www.iwelt.de\/aenderungen-bei-der-denic-domainabfrage-und-was-dies-fuer-unternehmen-bedeutet\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/denic-domainabfrage-aenderungen.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/denic-domainabfrage-aenderungen.png","height":720,"width":1280},"keywords":["Cybersecurity"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/nis-2-umsetzungsgesetz-neue-standards-fuer-cybersicherheit-in-deutschland\/","headline":"NIS-2-Umsetzungsgesetz: Neue Standards f\u00fcr Cybersicherheit in Deutschland","url":"https:\/\/www.iwelt.de\/nis-2-umsetzungsgesetz-neue-standards-fuer-cybersicherheit-in-deutschland\/","datePublished":"2025-11-21","dateModified":"2025-11-25","mainEntityOfPage":"https:\/\/www.iwelt.de\/nis-2-umsetzungsgesetz-neue-standards-fuer-cybersicherheit-in-deutschland\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/nis-2-richtlinie.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/nis-2-richtlinie.png","height":720,"width":1280},"keywords":["Cybersecurity"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/sind-ihre-unternehmensdaten-sicher-diese-checkliste-hilft\/","headline":"Sind Ihre Daten sicher? Diese Checkliste gibt die Antwort.","url":"https:\/\/www.iwelt.de\/sind-ihre-unternehmensdaten-sicher-diese-checkliste-hilft\/","datePublished":"2025-05-21","dateModified":"2025-05-21","mainEntityOfPage":"https:\/\/www.iwelt.de\/sind-ihre-unternehmensdaten-sicher-diese-checkliste-hilft\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/checkliste-wie-gut-sind-ihre-unternehmensdaten-geschuetzt.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/checkliste-wie-gut-sind-ihre-unternehmensdaten-geschuetzt.png","height":800,"width":1200},"keywords":["backup","backup-management","Cybersecurity","veeam"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/veeam-backup-die-loesung-fuer-sicherheit-im-mittelstand\/","headline":"Veeam Backup: Die L\u00f6sung f\u00fcr Sicherheit im Mittelstand","url":"https:\/\/www.iwelt.de\/veeam-backup-die-loesung-fuer-sicherheit-im-mittelstand\/","datePublished":"2025-04-28","dateModified":"2025-04-25","mainEntityOfPage":"https:\/\/www.iwelt.de\/veeam-backup-die-loesung-fuer-sicherheit-im-mittelstand\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/Veeam-Backup-1.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/Veeam-Backup-1.png","height":800,"width":1200},"keywords":["backup","backup-management"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/warum-die-3-2-1-1-0-strategie-der-neue-standard-im-backup-management-ist\/","headline":"Warum die 3-2-1-1-0-Strategie der neue Standard im Backup-Management ist","url":"https:\/\/www.iwelt.de\/warum-die-3-2-1-1-0-strategie-der-neue-standard-im-backup-management-ist\/","datePublished":"2025-04-14","dateModified":"2025-04-14","mainEntityOfPage":"https:\/\/www.iwelt.de\/warum-die-3-2-1-1-0-strategie-der-neue-standard-im-backup-management-ist\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-kober\/#Person","name":"Sophia Kober","url":"https:\/\/www.iwelt.de\/author\/sophia-kober\/","identifier":35,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/405818fa0fb91a144dec23a1db66358e910e9c3b81311ac013c83a5b393dceb8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/405818fa0fb91a144dec23a1db66358e910e9c3b81311ac013c83a5b393dceb8?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/Warum-die-3-2-1-1-0-Strategie-der-neue-Standard-im-Backup-Management-ist-.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/Warum-die-3-2-1-1-0-Strategie-der-neue-Standard-im-Backup-Management-ist-.png","height":800,"width":1200},"keywords":["backup","backup-management"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/sicherheit-bei-dedicated-root-servern\/","headline":"Sicherheitsaspekte bei Dedicated Root Servern: Schutz vor DDoS, Malware und anderen Bedrohungen","url":"https:\/\/www.iwelt.de\/sicherheit-bei-dedicated-root-servern\/","datePublished":"2024-09-09","dateModified":"2024-09-06","mainEntityOfPage":"https:\/\/www.iwelt.de\/sicherheit-bei-dedicated-root-servern\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/sicherheitaspekte-dedicated-root-server.jpg","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/sicherheitaspekte-dedicated-root-server.jpg","height":800,"width":1200},"keywords":["Cybersecurity","dedicated root server"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/typo3-sicherheit-warum-typo3-sicherer-ist\/","headline":"TYPO3 Sicherheit: Warum TYPO3 sicherer ist und wie Sie es sicher halten","url":"https:\/\/www.iwelt.de\/typo3-sicherheit-warum-typo3-sicherer-ist\/","datePublished":"2024-08-12","dateModified":"2024-11-14","mainEntityOfPage":"https:\/\/www.iwelt.de\/typo3-sicherheit-warum-typo3-sicherer-ist\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/typo3-sicherheit-warum-typo3-sicherer-ist.jpg","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/typo3-sicherheit-warum-typo3-sicherer-ist.jpg","height":800,"width":1200},"keywords":["cms","TYPO3"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/anycast-dns-die-zukunft-der-schnellen-und-sicheren-dns-resolution\/","headline":"Anycast DNS: Die Zukunft der schnellen und sicheren DNS-Resolution","url":"https:\/\/www.iwelt.de\/anycast-dns-die-zukunft-der-schnellen-und-sicheren-dns-resolution\/","datePublished":"2024-08-05","dateModified":"2024-08-05","mainEntityOfPage":"https:\/\/www.iwelt.de\/anycast-dns-die-zukunft-der-schnellen-und-sicheren-dns-resolution\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/anycast-dns-mit-der-iwelt.jpg","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/anycast-dns-mit-der-iwelt.jpg","height":800,"width":1200},"keywords":["anycast dns"]}]}