{"@context":"https:\/\/schema.org\/","@type":"Blog","@id":"https:\/\/www.iwelt.de\/einblicke-2\/blog\/#Blog","headline":"Blog","description":"Cloud &amp; Rechenzentrum \u2713 Internet-Access \u2713 TYPO3 Websites \u2713AWS-Migration","url":"https:\/\/www.iwelt.de\/einblicke-2\/blog\/","blogPost":[{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/nis-2-reform-strengere-pruefpflichten-fuer-de-domaininhaber\/","headline":"NIS-2-Reform: Strengere Pr\u00fcfpflichten f\u00fcr .de-Domaininhaber","url":"https:\/\/www.iwelt.de\/nis-2-reform-strengere-pruefpflichten-fuer-de-domaininhaber\/","datePublished":"2026-04-20","dateModified":"2026-04-28","mainEntityOfPage":"https:\/\/www.iwelt.de\/nis-2-reform-strengere-pruefpflichten-fuer-de-domaininhaber\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-denic-nis2.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-denic-nis2.png","height":720,"width":1280},"wordCount":111,"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/cyberangriffe-im-mittelstand-risiken-richtig-einschaetzen\/","headline":"Cyberangriffe im Mittelstand: Risiken richtig einsch\u00e4tzen","url":"https:\/\/www.iwelt.de\/cyberangriffe-im-mittelstand-risiken-richtig-einschaetzen\/","datePublished":"2026-04-19","dateModified":"2026-04-28","mainEntityOfPage":"https:\/\/www.iwelt.de\/cyberangriffe-im-mittelstand-risiken-richtig-einschaetzen\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/cybersicherheit-mittelstand-.webp","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/cybersicherheit-mittelstand-.webp","height":720,"width":1280},"wordCount":96,"keywords":["Cybersecurity"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/was-ist-eine-domain-der-umfassende-leitfaden-fuer-it-fachkraefte\/","headline":"Was ist eine Domain? Der umfassende Leitfaden f\u00fcr IT-Fachkr\u00e4fte","url":"https:\/\/www.iwelt.de\/was-ist-eine-domain-der-umfassende-leitfaden-fuer-it-fachkraefte\/","datePublished":"2026-03-30","dateModified":"2026-03-30","mainEntityOfPage":"https:\/\/www.iwelt.de\/was-ist-eine-domain-der-umfassende-leitfaden-fuer-it-fachkraefte\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-eine-domain.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-eine-domain.png","height":720,"width":1280},"wordCount":54,"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/domain-kaufen-ihr-strategischer-leitfaden-fuer-eine-zukunftssichere-online-praesenz\/","headline":"Domain kaufen: Ihr strategischer Leitfaden f\u00fcr eine zukunftssichere Online-Pr\u00e4senz","url":"https:\/\/www.iwelt.de\/domain-kaufen-ihr-strategischer-leitfaden-fuer-eine-zukunftssichere-online-praesenz\/","datePublished":"2026-03-05","dateModified":"2026-03-05","mainEntityOfPage":"https:\/\/www.iwelt.de\/domain-kaufen-ihr-strategischer-leitfaden-fuer-eine-zukunftssichere-online-praesenz\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-kaufen-leitfaden.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-kaufen-leitfaden.png","height":720,"width":1280},"wordCount":45,"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/was-ist-phishing-erkennen-verhindern-e-mail-schuetzen-2\/","headline":"Was ist Phishing? Erkennen, verhindern &#038; E-Mail sch\u00fctzen","url":"https:\/\/www.iwelt.de\/was-ist-phishing-erkennen-verhindern-e-mail-schuetzen-2\/","datePublished":"2026-02-25","dateModified":"2026-03-04","mainEntityOfPage":"https:\/\/www.iwelt.de\/was-ist-phishing-erkennen-verhindern-e-mail-schuetzen-2\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-phishing.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-phishing.png","height":720,"width":1280},"wordCount":67,"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/die-zukunft-von-tls-zertifikaten-warum-47-tage-zertifikate-kommen-und-wie-sie-sich-darauf-vorbereiten\/","headline":"Die Zukunft von TLS-Zertifikaten: Warum 47-Tage-Zertifikate kommen und wie Sie sich darauf vorbereiten","url":"https:\/\/www.iwelt.de\/die-zukunft-von-tls-zertifikaten-warum-47-tage-zertifikate-kommen-und-wie-sie-sich-darauf-vorbereiten\/","datePublished":"2026-02-12","dateModified":"2026-02-13","mainEntityOfPage":"https:\/\/www.iwelt.de\/die-zukunft-von-tls-zertifikaten-warum-47-tage-zertifikate-kommen-und-wie-sie-sich-darauf-vorbereiten\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/tls-ssl-zertifikate-neu.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/tls-ssl-zertifikate-neu.png","height":720,"width":1280},"wordCount":88,"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/aenderungen-bei-der-denic-domainabfrage-und-was-dies-fuer-unternehmen-bedeutet\/","headline":"\u00c4nderungen bei der DENIC Domainabfrage und was dies f\u00fcr Unternehmen bedeutet","url":"https:\/\/www.iwelt.de\/aenderungen-bei-der-denic-domainabfrage-und-was-dies-fuer-unternehmen-bedeutet\/","datePublished":"2025-12-17","dateModified":"2025-12-17","mainEntityOfPage":"https:\/\/www.iwelt.de\/aenderungen-bei-der-denic-domainabfrage-und-was-dies-fuer-unternehmen-bedeutet\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/denic-domainabfrage-aenderungen.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/denic-domainabfrage-aenderungen.png","height":720,"width":1280},"wordCount":77,"keywords":["Cybersecurity"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/nis-2-umsetzungsgesetz-neue-standards-fuer-cybersicherheit-in-deutschland\/","headline":"NIS-2-Umsetzungsgesetz: Neue Standards f\u00fcr Cybersicherheit in Deutschland","url":"https:\/\/www.iwelt.de\/nis-2-umsetzungsgesetz-neue-standards-fuer-cybersicherheit-in-deutschland\/","datePublished":"2025-11-21","dateModified":"2025-11-25","mainEntityOfPage":"https:\/\/www.iwelt.de\/nis-2-umsetzungsgesetz-neue-standards-fuer-cybersicherheit-in-deutschland\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/nis-2-richtlinie.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/nis-2-richtlinie.png","height":720,"width":1280},"wordCount":85,"keywords":["Cybersecurity"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/premium-dns-warum-sich-ein-upgrade-wirklich-lohnt\/","headline":"Premium DNS \u2013 Warum sich ein Upgrade wirklich lohnt","url":"https:\/\/www.iwelt.de\/premium-dns-warum-sich-ein-upgrade-wirklich-lohnt\/","datePublished":"2025-10-10","dateModified":"2025-10-16","mainEntityOfPage":"https:\/\/www.iwelt.de\/premium-dns-warum-sich-ein-upgrade-wirklich-lohnt\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/premium-dns.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/premium-dns.png","height":720,"width":1280},"wordCount":126,"keywords":["dns"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/25-jahre-iwelt-ein-rueckblick-auf-unsere-geschichte\/","headline":"25 Jahre iWelt \u2013 ein R\u00fcckblick auf unsere Geschichte","url":"https:\/\/www.iwelt.de\/25-jahre-iwelt-ein-rueckblick-auf-unsere-geschichte\/","datePublished":"2025-09-02","dateModified":"2025-12-10","mainEntityOfPage":"https:\/\/www.iwelt.de\/25-jahre-iwelt-ein-rueckblick-auf-unsere-geschichte\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/25-jahre-iwelt.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/25-jahre-iwelt.png","height":720,"width":1280},"wordCount":82,"keywords":["iWelt"]}]}