{"id":29468,"date":"2020-12-16T15:57:53","date_gmt":"2020-12-16T14:57:53","guid":{"rendered":"https:\/\/www.prosoft.de\/blog\/?p=29468"},"modified":"2025-02-05T16:20:36","modified_gmt":"2025-02-05T15:20:36","slug":"sicheres-homeoffice","status":"publish","type":"post","link":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/","title":{"rendered":"Sicheres Homeoffice: Unternehmen wollen jetzt reagieren"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; specialty=&#8220;on&#8220; custom_css_main_1=&#8220;max-width:15%;&#8220; disabled_on=&#8220;off|off|&#8220; _builder_version=&#8220;4.16&#8243; module_alignment=&#8220;center&#8220; custom_padding=&#8220;2px|0px|0|0px|false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][\/et_pb_column][et_pb_column type=&#8220;3_4&#8243; specialty_columns=&#8220;3&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_row_inner admin_label=&#8220;Zeile&#8220; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;23px|0px|4px|0px|false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column_inner saved_specialty_column_type=&#8220;3_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_post_title title=&#8220;off&#8220; meta=&#8220;off&#8220; featured_placement=&#8220;above&#8220; admin_label=&#8220;Beitragsbild&#8220; _builder_version=&#8220;4.16&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_post_title][et_pb_post_title meta=&#8220;off&#8220; featured_image=&#8220;off&#8220; admin_label=&#8220;Beitragstitel&#8220; _builder_version=&#8220;4.16&#8243; custom_margin=&#8220;20px||&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_post_title][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; specialty=&#8220;on&#8220; custom_css_main_1=&#8220;max-width:15%;&#8220; disabled_on=&#8220;off|off|&#8220; _builder_version=&#8220;4.16&#8243; module_alignment=&#8220;center&#8220; custom_padding=&#8220;0|0px|0|0px|false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Tag&#8220; _builder_version=&#8220;4.16&#8243; _dynamic_attributes=&#8220;content&#8220; custom_padding=&#8220;||0px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIuIiwiZGF0ZV9mb3JtYXQiOiJjdXN0b20iLCJjdXN0b21fZGF0ZV9mb3JtYXQiOiJkIn19@[\/et_pb_text][et_pb_text admin_label=&#8220;Monat&#8220; _builder_version=&#8220;4.16&#8243; _dynamic_attributes=&#8220;content&#8220; custom_margin=&#8220;-5px||2px&#8220; custom_padding=&#8220;||0px&#8220; locked=&#8220;on&#8220; global_colors_info=&#8220;{}&#8220;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJkYXRlX2Zvcm1hdCI6ImN1c3RvbSIsImN1c3RvbV9kYXRlX2Zvcm1hdCI6Ik0ifX0=@[\/et_pb_text][et_pb_divider color=&#8220;#939393&#8243; divider_weight=&#8220;5px&#8220; _builder_version=&#8220;4.16&#8243; max_width=&#8220;25px&#8220; height=&#8220;0px&#8220; custom_margin=&#8220;0px||&#8220; locked=&#8220;on&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Jahr&#8220; _builder_version=&#8220;4.16&#8243; _dynamic_attributes=&#8220;content&#8220; text_font_size=&#8220;11px&#8220; custom_margin=&#8220;0px||&#8220; locked=&#8220;on&#8220; global_colors_info=&#8220;{}&#8220;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJkYXRlX2Zvcm1hdCI6ImN1c3RvbSIsImN1c3RvbV9kYXRlX2Zvcm1hdCI6IlkifX0=@[\/et_pb_text][et_pb_text admin_label=&#8220;Schlagw\u00f6rter&#8220; _builder_version=&#8220;4.16&#8243; _dynamic_attributes=&#8220;content&#8220; text_font=&#8220;|300|on||||||&#8220; text_text_color=&#8220;#000000&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.4em&#8220; custom_margin=&#8220;10px||&#8220; custom_padding=&#8220;14px||&#8220; border_width_top=&#8220;1px&#8220; border_color_top=&#8220;#939393&#8243; border_style_top=&#8220;dotted&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;on&#8220; global_colors_info=&#8220;{}&#8220;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90YWdzIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJsaW5rX3RvX3Rlcm1fcGFnZSI6Im9mZiIsInNlcGFyYXRvciI6IiwgIiwiY2F0ZWdvcnlfdHlwZSI6InBvc3RfdGFnIn19@[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;3_4&#8243; specialty_columns=&#8220;3&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_row_inner column_structure=&#8220;undefined&#8220; admin_label=&#8220;Zeile&#8220; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;23px|0px|32px|0px|false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column_inner type=&#8220;undefined&#8220; saved_specialty_column_type=&#8220;3_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Introtext&#8220; _builder_version=&#8220;4.16&#8243; text_font=&#8220;||on||||||&#8220; custom_margin=&#8220;10px||25px&#8220; custom_padding=&#8220;5px||5px&#8220; z_index_tablet=&#8220;500&#8243; text_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; text_text_shadow_vertical_length_tablet=&#8220;0px&#8220; text_text_shadow_blur_strength_tablet=&#8220;1px&#8220; link_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; link_text_shadow_vertical_length_tablet=&#8220;0px&#8220; link_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ul_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ul_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ul_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ol_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ol_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ol_text_shadow_blur_strength_tablet=&#8220;1px&#8220; quote_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; quote_text_shadow_vertical_length_tablet=&#8220;0px&#8220; quote_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_2_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_2_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_2_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_3_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_3_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_3_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_4_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_4_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_4_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_5_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_5_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_5_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_6_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_6_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_6_text_shadow_blur_strength_tablet=&#8220;1px&#8220; border_width_top=&#8220;1px&#8220; border_color_top=&#8220;#939393&#8243; border_width_bottom=&#8220;1px&#8220; border_color_bottom=&#8220;#939393&#8243; border_width_top_tablet=&#8220;1px&#8220; border_width_top_phone=&#8220;1px&#8220; border_width_bottom_tablet=&#8220;1px&#8220; border_width_bottom_phone=&#8220;1px&#8220; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><em><strong>\u200b<\/strong><\/em><em>Zuerst aus der Not heraus, dann dauerhaft weiter im Fokus: Die Corona-Pandemie hat viele Unternehmen in Deutschland dazu gezwungen, Arbeitspl\u00e4tze tempor\u00e4r ins Homeoffice zu verlagern. Eine neue Umfrage zeigt jetzt: Viele Unternehmen wollen dies nicht nur beibehalten und weiter ausbauen, sondern sind gleichzeitig auch bereit, mehr in die IT-Sicherheit rund um ein sicheres Homeoffice zu investieren.<\/em><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8220;Einleitung&#8220; _builder_version=&#8220;4.16&#8243; text_font=&#8220;|300|||||||&#8220; text_text_color=&#8220;#000000&#8243; z_index_tablet=&#8220;500&#8243; text_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; text_text_shadow_vertical_length_tablet=&#8220;0px&#8220; text_text_shadow_blur_strength_tablet=&#8220;1px&#8220; link_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; link_text_shadow_vertical_length_tablet=&#8220;0px&#8220; link_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ul_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ul_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ul_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ol_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ol_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ol_text_shadow_blur_strength_tablet=&#8220;1px&#8220; quote_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; quote_text_shadow_vertical_length_tablet=&#8220;0px&#8220; quote_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_2_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_2_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_2_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_3_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_3_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_3_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_4_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_4_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_4_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_5_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_5_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_5_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_6_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_6_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_6_text_shadow_blur_strength_tablet=&#8220;1px&#8220; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>\u200bHeimisches Wohnzimmer statt Gro\u00dfraumb\u00fcro: F\u00fcr viele Besch\u00e4ftigte findet der Arbeitsalltag derzeit ganz oder teilweise in den eigenen vier W\u00e4nden statt. Und man darf davon ausgehen, dass dies auch noch eine ganze Weile so bleiben wird. Zumal die meisten Experten ohnehin damit rechnen, dass der Anteil der Heim- bzw. Remotearbeit auch unabh\u00e4ngig von der aktuellen Pandemie langfristig weiter steigen wird.<\/p>\n<p>Aus Sicht der IT bringt dies mehrere Herausforderungen mit sich. Zum einen muss die technische Grundlage daf\u00fcr geschaffen werden, dass Mitarbeiterinnen und Mitarbeiter \u00fcberhaupt effizient au\u00dferhalb des gewohnten Arbeitsplatzes produktiv t\u00e4tig sein k\u00f6nnen. Damit verkn\u00fcpft ist zum Beispiel die Anbindung an entsprechende Daten und Anwendungen.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8220;HomeOffice &#038; 2FA&#8220; _builder_version=&#8220;4.16&#8243; text_font=&#8220;|300|||||||&#8220; text_text_color=&#8220;#000000&#8243; z_index_tablet=&#8220;500&#8243; text_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; text_text_shadow_vertical_length_tablet=&#8220;0px&#8220; text_text_shadow_blur_strength_tablet=&#8220;1px&#8220; link_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; link_text_shadow_vertical_length_tablet=&#8220;0px&#8220; link_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ul_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ul_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ul_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ol_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ol_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ol_text_shadow_blur_strength_tablet=&#8220;1px&#8220; quote_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; quote_text_shadow_vertical_length_tablet=&#8220;0px&#8220; quote_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_2_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_2_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_2_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_3_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_3_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_3_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_4_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_4_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_4_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_5_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_5_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_5_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_6_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_6_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_6_text_shadow_blur_strength_tablet=&#8220;1px&#8220; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>Gezielte Angriffe auf das Homeoffice<\/h3>\n<p>Zum anderen darf beim Thema Homeoffice nat\u00fcrlich die IT-Sicherheit nicht vernachl\u00e4ssigt werden. Wer hierf\u00fcr gute Argumente ben\u00f6tigt, muss nicht lange suchen. Denn bereits im Rahmen der \u201e1. Welle\u201c im Fr\u00fchjahr 2020 haben sich Cyberkriminelle blitzartig auf die neue Situation eingestellt. So gab es Angriffe auf Homeoffice-Arbeitspl\u00e4tze ebenso wie den Versuch, die rund um die Pandemie bestehende Verunsicherung beispielsweise f\u00fcr entsprechende Phishing-Mails zu nutzen.<\/p>\n<p>Immerhin scheint sich inzwischen die Erkenntnis durchgesetzt zu haben, dass diese Risiken durchaus real sind. Denn eine aktuelle Umfrage der <strong>Unternehmensberatung Deloitte<\/strong> unter deutschen Finanzvorst\u00e4nden im Rahmen des <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/de\/Documents\/finance-transformation\/CFO-Survey-Herbst-2020.pdf\">CFO Survey Herbst 2020<\/a> zeigt: Die Unternehmen sind bereit, in die bessere Absicherung der Homeoffice-Arbeitspl\u00e4tze zu investieren. So stimmt fast die H\u00e4lfte (43 %) der befragten Finanzvorst\u00e4nde der Aussage zu \u201eWir werden unsere Cyber-Absicherung aufgrund von erh\u00f6htem Remote Working stark ausbauen.\u201c<\/p>\n<h3>Mehrfaktor-Authentifizierung = mehr Sicherheit<\/h3>\n<p>Die Bereitschaft zur Investition in die Absicherung von Arbeitspl\u00e4tzen und Prozessen ist also vorhanden. Doch wo setzt man am besten an? Ein ganz wesentlicher Aspekt ist in vielen F\u00e4llen die Anmeldung und Authentifizierung. Gefahren lauern \u00fcberall dort, wo sich Mitarbeiterinnen und Mitarbeiter im Homeoffice anmelden, um auf sensible Daten und Informationen zuzugreifen. Vom eigentlichen Remote-Zugang selbst \u00fcber Web-Anwendungen bis hin zu Cloud Services: Die einfache Kombination aus Benutzername und Passwort hat bei sicherheitsbewussten Firmen und Organisationen schon lange ausgedient. Zwei-Faktor- bzw. Mehrfaktor-Authentifizierung (MFA) lautet das Zauberwort f\u00fcr deutlich mehr Sicherheit bei Anmelde- und Authentifizierungs-Prozessen. Das klassische Passwort wird dabei durch weitere Faktoren erg\u00e4nzt, beispielsweise durch Passcodes und OTPs, die per SMS aufs Smartphone des Benutzers geschickt werden oder eine App-basierte Soft-Token-L\u00f6sung. Der Zugewinn an Sicherheit liegt buchst\u00e4blich auf der Hand: Ein potenzieller Angreifer m\u00fcsste nicht nur im Besitz der reinen Zugriffsdaten sein, sondern auch physisch \u00fcber das jeweilige Smartphone verf\u00fcgen.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8220;L\u00f6sungen&#8220; _builder_version=&#8220;4.17.6&#8243; text_font=&#8220;|300|||||||&#8220; text_text_color=&#8220;#000000&#8243; z_index_tablet=&#8220;500&#8243; text_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; text_text_shadow_vertical_length_tablet=&#8220;0px&#8220; text_text_shadow_blur_strength_tablet=&#8220;1px&#8220; link_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; link_text_shadow_vertical_length_tablet=&#8220;0px&#8220; link_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ul_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ul_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ul_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ol_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ol_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ol_text_shadow_blur_strength_tablet=&#8220;1px&#8220; quote_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; quote_text_shadow_vertical_length_tablet=&#8220;0px&#8220; quote_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_2_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_2_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_2_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_3_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_3_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_3_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_4_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_4_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_4_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_5_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_5_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_5_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_6_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_6_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_6_text_shadow_blur_strength_tablet=&#8220;1px&#8220; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>L\u00f6sungen f\u00fcr jeden Einsatzbereich<\/h3>\n<p>Mittlerweile sind am Markt vielf\u00e4ltige L\u00f6sungen f\u00fcr die Mehrfaktor- und Zwei-Faktor-Authentifizierung erh\u00e4ltlich. Dies erfordert noch nicht einmal gro\u00dfen Planungs- oder Implementierungsaufwand. So kann etwa mit der L\u00f6sung <a href=\"https:\/\/www.prosoft.de\/loesungen\/sichere-authentifizierung\/zwei-faktor-authentifizierung\/securice\/\">SecurICE<\/a> innerhalb k\u00fcrzester Zeit eine tempor\u00e4r ausgelegte Zwei-Faktor-Authentifizierung eingerichtet werden \u2013 auf Wunsch auch mit besonders kurzen, budgetschonenden Lizenzlaufzeiten. Und wer die volle Flexibilit\u00e4t einer Mehrfaktor-Authentifizierung aussch\u00f6pfen m\u00f6chte, findet etwa mit <a href=\"https:\/\/www.prosoft.de\/loesungen\/sichere-authentifizierung\/zwei-faktor-authentifizierung\/\">SecurAccess bzw. SecurEnvoy SecureIdentity MFA<\/a> eine L\u00f6sung, die sich unter anderem durch die Unterst\u00fctzung unterschiedlichster Authentifizierungs-Verfahren auszeichnet.<\/p>\n<p>[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; specialty=&#8220;on&#8220; custom_css_main_1=&#8220;max-width:15%&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;0|0px|0|0px|false|false&#8220; custom_css_main_element=&#8220;background-color: #efefef&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2018\/12\/fazit.svg&#8220; align_tablet=&#8220;center&#8220; align_phone=&#8220;&#8220; align_last_edited=&#8220;on|desktop&#8220; disabled_on=&#8220;on|on|&#8220; admin_label=&#8220;Bild Fazit&#8220; _builder_version=&#8220;4.16&#8243; max_width=&#8220;35%&#8220; module_alignment=&#8220;right&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;3_4&#8243; specialty_columns=&#8220;3&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_row_inner column_structure=&#8220;undefined&#8220; admin_label=&#8220;Zeile&#8220; _builder_version=&#8220;4.16&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_column_inner type=&#8220;undefined&#8220; saved_specialty_column_type=&#8220;3_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Text FAZIT&#8220; _builder_version=&#8220;4.16&#8243; z_index_tablet=&#8220;500&#8243; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><strong>Fazit: <\/strong>Ein Plus an IT-Sicherheit gibt es auch beim Homeoffice meist nicht kostenlos \u2013 es ist gleichzeitig aber alles andere als umsonst. Die neue Umfrage von Deloitte zeigt, dass viele Unternehmen die Zeichen der Zeit erkannt haben und Investitionen in die bessere Absicherung ihrer Homeoffice-Strukturen vornehmen m\u00f6chten. Eine Zwei- oder Mehrfaktor-Authentifizierung bietet dabei eine wichtige Grundlage, um mit den Anmelde- bzw. Authentifizierungsprozessen einige der entscheidenden Angriffspunkte deutlich besser zu sch\u00fctzen.<\/p>\n<p class=\"entry-title\"><strong>Weitere Blogbeitr\u00e4ge zu Homeoffice und Mehrfaktor-Authentifizierung<\/strong><br \/><a href=\"https:\/\/www.prosoft.de\/blog\/keine-sichere-authentifizierung-unter-dieser-nummer\/\">Keine sichere Authentifizierung unter dieser Nummer<\/a><br \/><a href=\"https:\/\/www.prosoft.de\/blog\/multi-faktor-authentifizierung-fuer-das-homeoffice\/\">Multi-Faktor-Authentifizierung f\u00fcr das Homeoffice<\/a><br \/><a href=\"https:\/\/www.prosoft.de\/blog\/sicherheit-geht-vor-im-homeoffice\/\">Sicherheit geht vor im Homeoffice<\/a><br \/><a href=\"https:\/\/www.prosoft.de\/blog\/ratgeber-zwei-faktor-authentifizierung\/\">Ratgeber Zwei-Faktor Authentifizierung<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;Auto und Beitragsnavi&#8220; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;0|0px|48px|0px|false|false&#8220; global_module=&#8220;702&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2021\/06\/Monique_Weixer.png&#8220; alt=&#8220;Monique_Weixer&#8220; title_text=&#8220;Monique_Weixer&#8220; align=&#8220;center&#8220; admin_label=&#8220;Bild Weixer Redakteur&#8220; _builder_version=&#8220;4.16&#8243; z_index_tablet=&#8220;500&#8243; custom_css_main_element=&#8220;max-width:100px;;&#8220; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Redakteur-Name Weixer&#8220; _builder_version=&#8220;4.16&#8243; text_orientation=&#8220;center&#8220; z_index_tablet=&#8220;500&#8243; text_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; text_text_shadow_vertical_length_tablet=&#8220;0px&#8220; text_text_shadow_blur_strength_tablet=&#8220;1px&#8220; link_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; link_text_shadow_vertical_length_tablet=&#8220;0px&#8220; link_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ul_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ul_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ul_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ol_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ol_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ol_text_shadow_blur_strength_tablet=&#8220;1px&#8220; quote_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; quote_text_shadow_vertical_length_tablet=&#8220;0px&#8220; quote_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_2_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_2_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_2_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_3_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_3_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_3_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_4_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_4_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_4_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_5_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_5_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_5_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_6_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_6_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_6_text_shadow_blur_strength_tablet=&#8220;1px&#8220; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a href=\"#\"><em><strong>Monique Weixer<\/strong><\/em><\/a><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8220;Text Monique Weixer&#8220; _builder_version=&#8220;4.16&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; text_orientation=&#8220;center&#8220; custom_margin=&#8220;-10px||&#8220; z_index_tablet=&#8220;500&#8243; text_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; text_text_shadow_vertical_length_tablet=&#8220;0px&#8220; text_text_shadow_blur_strength_tablet=&#8220;1px&#8220; link_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; link_text_shadow_vertical_length_tablet=&#8220;0px&#8220; link_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ul_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ul_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ul_text_shadow_blur_strength_tablet=&#8220;1px&#8220; ol_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; ol_text_shadow_vertical_length_tablet=&#8220;0px&#8220; ol_text_shadow_blur_strength_tablet=&#8220;1px&#8220; quote_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; quote_text_shadow_vertical_length_tablet=&#8220;0px&#8220; quote_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_2_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_2_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_2_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_3_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_3_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_3_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_4_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_4_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_4_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_5_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_5_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_5_text_shadow_blur_strength_tablet=&#8220;1px&#8220; header_6_text_shadow_horizontal_length_tablet=&#8220;0px&#8220; header_6_text_shadow_vertical_length_tablet=&#8220;0px&#8220; header_6_text_shadow_blur_strength_tablet=&#8220;1px&#8220; box_shadow_horizontal_tablet=&#8220;0px&#8220; box_shadow_vertical_tablet=&#8220;0px&#8220; box_shadow_blur_tablet=&#8220;40px&#8220; box_shadow_spread_tablet=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"text-align: center;\">\u00a0Redakteurin des ProSoft Blogs und Head of Sales bei ProSoft GmbH<\/p>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#009ee2&#8243; divider_weight=&#8220;5px&#8220; _builder_version=&#8220;4.16&#8243; max_width=&#8220;20%&#8220; module_alignment=&#8220;center&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; width=&#8220;100%&#8220; max_width=&#8220;100%&#8220; global_module=&#8220;48760&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text admin_label=&#8220;Das k\u00f6nnte Sie auch interessieren:&#8220; _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;32px&#8220; max_width=&#8220;960px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||32px||false|false&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2>Das k\u00f6nnte Sie auch interessieren:<\/h2>\n<p>[\/et_pb_text][et_pb_blog fullwidth=&#8220;off&#8220; include_categories=&#8220;current&#8220; meta_date=&#8220;j. M. y&#8220; use_manual_excerpt=&#8220;off&#8220; excerpt_length=&#8220;100&#8243; show_author=&#8220;off&#8220; show_categories=&#8220;off&#8220; show_excerpt=&#8220;off&#8220; admin_label=&#8220;Kategorie-Blog&#8220; _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; width=&#8220;80%&#8220; max_width=&#8220;960px&#8220; max_width_tablet=&#8220;80%&#8220; max_width_phone=&#8220;80%&#8220; max_width_last_edited=&#8220;on|phone&#8220; module_alignment=&#8220;center&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; disabled_on=&#8220;|on|off&#8220; admin_label=&#8220;Section Newsletter Anmeldung&#8220; module_id=&#8220;newsletter&#8220; _builder_version=&#8220;4.16&#8243; background_color=&#8220;#002b54&#8243; custom_padding=&#8220;0|0px|0|0px|false|false&#8220; global_module=&#8220;433&#8243; collapsed=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.16&#8243; max_width=&#8220;1080px&#8220; custom_padding=&#8220;24px|0px|0|0px|false|false&#8220; animation_direction=&#8220;left&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_image src=&#8220;https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/02\/pro_blog_newsletter-2.svg&#8220; align=&#8220;center&#8220; align_tablet=&#8220;center&#8220; align_phone=&#8220;&#8220; align_last_edited=&#8220;on|desktop&#8220; admin_label=&#8220;Bild Icon Newsletter&#8220; _builder_version=&#8220;4.16&#8243; max_width=&#8220;150px&#8220; animation_style=&#8220;slide&#8220; animation_direction=&#8220;top&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text admin_label=&#8220;Anmeldeformular Newsletter&#8220; _builder_version=&#8220;4.27.2&#8243; text_font_size=&#8220;12px&#8220; background_color=&#8220;RGBA(255,255,255,0)&#8220; text_orientation=&#8220;center&#8220; background_layout=&#8220;dark&#8220; custom_margin=&#8220;0px||25px||false|false&#8220; animation_direction=&#8220;bottom&#8220; dsm_modules_custom_attribute_on_off=&#8220;on&#8220; dsm_modules_custom_attribute_add=&#8220;css&#8220; dsm_modules_custom_attribute_css_selector=&#8220;rapidmail-form&#8220; dsm_custom_attributes_options=&#8220;%91{%22value%22:%22%22,%22checked%22:0,%22dragID%22:0}%93&#8243; global_colors_info=&#8220;{}&#8220;]<\/p>\n<div class=\"rapidmail-form\"><iframe src=https:\/\/tab4604f9.emailsys1a.net\/235\/1541\/65d7a94038\/subscribe\/form.html?_g=1724158351 frameborder=\"0\" width=\"100%\" height=\"550\"><\/iframe><\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; admin_label=&#8220;FOOTER GLOBAL&#8220; _builder_version=&#8220;4.16&#8243; background_color=&#8220;#a7b7c7&#8243; custom_padding=&#8220;0|0px|0|0px|false|false&#8220; collapsed=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8220;4.16&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; custom_padding=&#8220;24px|0px|40px|0px|false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Der ProBlog&#8220; _builder_version=&#8220;4.16&#8243; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>ProBlog<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Links Impressum etc&#8220; _builder_version=&#8220;4.16&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/blog\/\"><span style=\"color: #ffffff;\">\u279d<\/span> Willkommen bei ProBlog<\/a><\/p>\n<p><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/blog\/die-redaktion\/\"><span style=\"color: #ffffff;\">\u279d<\/span> Redaktion<\/a><\/p>\n<p><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/blog\/ueber-uns-prosoft\/\">\u279d \u00dcber uns<\/a><\/span><\/p>\n<p><a style=\"color: #ffffff;\" href=\"#\" onClick=\"UC_UI.showSecondLayer();\">\u279d Cookie-Einstellungen<\/a><\/span><\/p>\n<p>[\/et_pb_text][et_pb_social_media_follow _builder_version=&#8220;4.16&#8243; custom_margin=&#8220;|0px||&#8220; custom_padding=&#8220;|0px||0px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_social_media_follow_network social_network=&#8220;facebook&#8220; url=&#8220;https:\/\/www.facebook.com\/prosoft.de\/&#8220; _builder_version=&#8220;4.16&#8243; background_color=&#8220;#3b5998&#8243; global_colors_info=&#8220;{}&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220;]Facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;twitter&#8220; url=&#8220;https:\/\/twitter.com\/prosoft_de\/&#8220; _builder_version=&#8220;4.22.2&#8243; background_color=&#8220;#000000&#8243; global_colors_info=&#8220;{}&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220;]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;youtube&#8220; url=&#8220;https:\/\/www.youtube.com\/user\/Prosoft&#8220; _builder_version=&#8220;4.16&#8243; background_color=&#8220;#a82400&#8243; global_colors_info=&#8220;{}&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220;]youtube[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;linkedin&#8220; url=&#8220;https:\/\/www.linkedin.com\/company\/643675\/admin\/&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#007bb6&#8243; global_colors_info=&#8220;{}&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220;]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=&#8220;xing&#8220; url=&#8220;https:\/\/www.xing.com\/pages\/prosoftgmbh&#8220; _builder_version=&#8220;4.16&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#026466&#8243; global_colors_info=&#8220;{}&#8220; follow_button=&#8220;off&#8220; url_new_window=&#8220;on&#8220;]xing[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Kontakt&#8220; _builder_version=&#8220;4.16&#8243; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>L\u00f6sungen<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Telefon +49 (0) 8171\/405-0&#8243; _builder_version=&#8220;4.17.4&#8243; text_text_color=&#8220;#ffffff&#8220; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/it-management\/pc-fernwartung\/\">PC Fernwartung<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/it-management\/it-asset-management\/\">IT Asset Management<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/verschluesselung\/hardwareverschluesselte-hdd-ssd\/\">Hardwareverschl\u00fcsselte  SSD \/ HDD<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/verschluesselung\/verschluesselte-usb-sticks\/\">Verschl\u00fcsselte USB Sticks<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/sichere-authentifizierung\/zwei-faktor-authentifizierung\/\">Zwei Faktor Authentifizierung<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/verschluesselung\/sichere-e-mail-verschluesselung\/\">E-Mail Verschl\u00fcsselung<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/cybersecurity\/datenschleuse\/\">Datenschleuse<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/verschluesselung\/bitlocker-management\/\">BitLocker Management<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/cybersecurity\/anti-malware-multiscanner\/\">Anti-Malware Multiscanner<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/schwachstellen-management\/data-loss-prevention\/\">Data Loss Prevention<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/loesungen\/schwachstellen-management\/log-management-siem\/\">Log-Management SIEM<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Sitemap &#038; Links&#8220; _builder_version=&#8220;4.16&#8243; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>Shop<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Links Impressum etc&#8220; _builder_version=&#8220;4.17.4&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/hardware\/security-token\/\">Security Token<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/hardware\/security-token\/yubikey\/\">YubiKey<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/produkt\/gatekeeper\/\">Gatekeeper<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/hardware\/security-token\/yubikey\/#yubikeyvergleich\" data-et-has-event-already=\"true\">YubiKey 5<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/produkt\/kingston-datatraveler-locker-g3-bestellen\/\">Kingston DataTraveler<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/produkt\/yubikey-bio-online-bestellen\/\">YubiKey Bio<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/produkt\/safetogo-online-bestellen\/\">SafeToGo USB 3.1 Stick<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/hardware\/verschluesselte-festplatten\/\">verschl\u00fcsselte Festplatten<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/produkt\/digittrade-rs256-rfid-ssd-online-bestellen\/\">Digittrade RS256 RFID<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/software\/remote-it-service\/\">Remote IT-Service Software<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/software\/security-loesungen\/\">Security Software L\u00f6sungen<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text admin_label=&#8220;Sitemap &#038; Links&#8220; _builder_version=&#8220;4.16&#8243; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h3>ProSoft<\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8220;#ffffff&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;Links Impressum etc&#8220; _builder_version=&#8220;4.16&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/\">ProSoft<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/shop\/\">Shop ProSecurity<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/service\/veranstaltungen\/\">Veranstaltungen<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/service\/webinar\/\">Webcast<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/service\/#support\">Support<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/service\/#knowledgebase\">KnowledgeBase<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/impressum\/\">Impressum<\/a><\/p>\n<p>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/blog\/datenschutz-problog\/\">Datenschutzerkl\u00e4rung<\/a><\/p>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.16&#8243; height=&#8220;10px&#8220; custom_margin=&#8220;-10px||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][et_pb_text admin_label=&#8220;ist ein Angebot der&#8220; _builder_version=&#8220;4.16&#8243; text_font_size=&#8220;12px&#8220; text_line_height=&#8220;1.2em&#8220; background_layout=&#8220;dark&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>ProBlog ist ein Angebot der<\/p>\n<p>ProSoft GmbH<br \/>B\u00fcrgermeister-Graf-Ring 10<br \/>82538 Geretsried<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Von einer Notl\u00f6sung zum sicheren Homeoffice. Ergebnisse aus einer aktuellen Deloitte Umfrage zur Zukunft von Homeoffice<\/p>\n","protected":false},"author":7,"featured_media":29481,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section fb_built=\"1\" specialty=\"on\" custom_css_main_1=\"max-width:15%;\" disabled_on=\"off|off|\" _builder_version=\"3.22.3\" module_alignment=\"center\" custom_padding=\"2px|0px|0|0px|false|false\"][et_pb_column type=\"1_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][\/et_pb_column][et_pb_column type=\"3_4\" specialty_columns=\"3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_row_inner admin_label=\"Zeile\" _builder_version=\"3.25\" custom_padding=\"23px|0px|4px|0px|false|false\" locked=\"off\"][et_pb_column_inner saved_specialty_column_type=\"3_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_post_title title=\"off\" meta=\"off\" featured_placement=\"above\" admin_label=\"Beitragsbild\" _builder_version=\"3.22.7\" locked=\"off\"][\/et_pb_post_title][et_pb_post_title meta=\"off\" featured_image=\"off\" admin_label=\"Beitragstitel\" _builder_version=\"3.24.1\" custom_margin=\"20px||\" locked=\"off\"][\/et_pb_post_title][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=\"1\" specialty=\"on\" custom_css_main_1=\"max-width:15%;\" disabled_on=\"off|off|\" _builder_version=\"3.22.7\" module_alignment=\"center\" custom_padding=\"0|0px|0|0px|false|false\"][et_pb_column type=\"1_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Tag\" _builder_version=\"3.27.4\" _dynamic_attributes=\"content\" custom_padding=\"||0px\" locked=\"off\"]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIuIiwiZGF0ZV9mb3JtYXQiOiJjdXN0b20iLCJjdXN0b21fZGF0ZV9mb3JtYXQiOiJkIn19@[\/et_pb_text][et_pb_text admin_label=\"Monat\" _builder_version=\"3.27.4\" _dynamic_attributes=\"content\" custom_margin=\"-5px||2px\" custom_padding=\"||0px\" locked=\"on\"]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJkYXRlX2Zvcm1hdCI6ImN1c3RvbSIsImN1c3RvbV9kYXRlX2Zvcm1hdCI6Ik0ifX0=@[\/et_pb_text][et_pb_divider color=\"#939393\" divider_weight=\"5px\" _builder_version=\"3.19.4\" max_width=\"25px\" height=\"0px\" custom_margin=\"0px||\" locked=\"on\"][\/et_pb_divider][et_pb_text admin_label=\"Jahr\" _builder_version=\"3.27.4\" _dynamic_attributes=\"content\" text_font_size=\"11px\" custom_margin=\"0px||\" locked=\"on\"]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJkYXRlX2Zvcm1hdCI6ImN1c3RvbSIsImN1c3RvbV9kYXRlX2Zvcm1hdCI6IlkifX0=@[\/et_pb_text][et_pb_text admin_label=\"Schlagw\u00f6rter\" _builder_version=\"3.27.4\" _dynamic_attributes=\"content\" text_font=\"|300|on||||||\" text_text_color=\"#000000\" text_font_size=\"12px\" text_line_height=\"1.4em\" custom_margin=\"10px||\" custom_padding=\"14px||\" border_width_top=\"1px\" border_color_top=\"#939393\" border_style_top=\"dotted\" saved_tabs=\"all\" locked=\"on\"]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF90YWdzIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiIiwiYWZ0ZXIiOiIiLCJsaW5rX3RvX3Rlcm1fcGFnZSI6Im9mZiIsInNlcGFyYXRvciI6IiwgIiwiY2F0ZWdvcnlfdHlwZSI6InBvc3RfdGFnIn19@[\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" specialty_columns=\"3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_row_inner column_structure=\"undefined\" admin_label=\"Zeile\" _builder_version=\"3.25\" custom_padding=\"23px|0px|32px|0px|false|false\"][et_pb_column_inner type=\"undefined\" saved_specialty_column_type=\"3_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Introtext\" _builder_version=\"4.0.11\" text_font=\"||on||||||\" custom_margin=\"10px||25px\" custom_padding=\"5px||5px\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" border_width_top=\"1px\" border_color_top=\"#939393\" border_width_bottom=\"1px\" border_color_bottom=\"#939393\" border_width_top_tablet=\"1px\" border_width_top_phone=\"1px\" border_width_bottom_tablet=\"1px\" border_width_bottom_phone=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\" locked=\"off\"]<em><strong>Bundes- und Landesbeh\u00f6rden, kommunale Verwaltungen, Stadtwerke und kritische Infrastrukturen \u2013 sogar einzelne Gerichte werden erfolgreich von Schadsoftware angegriffen. J\u00fcngste Opfer: Das Au\u00dfenministerium in Wien \u2013 die Stadtverwaltung Frankfurt. Und die Liste der Betroffenen w\u00e4chst und w\u00e4chst und w\u00e4chst..<\/strong><\/em>\r\n[\/et_pb_text][et_pb_text admin_label=\"Mit zunehmender Digitalisierung der Kom\" _builder_version=\"4.0.11\" text_font=\"|300|||||||\" text_text_color=\"#000000\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"]Mit zunehmender Digitalisierung der Kommunen steigen auch die Risiken: Die Meldungen \u00fcber erfolgreiche Angriffe auf Beh\u00f6rdern h\u00e4ufen sich. Neben dumpfem Vandalismus, \u00fcber b\u00f6sartige Racheaktionen von \u00fcbergangenen Mitarbeitern bis zur hinterh\u00e4ltigen Erpressung von L\u00f6segeld mit Schadsoftware, Trojanern und eben dem ber\u00fchmt-ber\u00fcchtigten Emotet\r\n[\/et_pb_text][et_pb_text admin_label=\"Leichtes Opfer oder bevorzugtes Ziel?\" _builder_version=\"4.0.11\" text_font=\"|300|||||||\" text_text_color=\"#000000\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"]<p><strong>Leichtes Opfer oder bevorzugtes Ziel?<\/strong><br \/> Vermutlich beides! Bevorzugtes Ziel, weil Angreifer von innen und au\u00dfen genau hier besonders publikumswirksam, besonders verheerenden Schaden anrichten. Und leichtes Opfer, weil bis heute manche Beh\u00f6rden und \u00c4mter \u2013 stellvertretend genannt auch f\u00fcr andere \u00f6ffentliche Institutionen \u2013 zu \u201eb\u00fcrokratisch\u201c und \u00fcberfordert sind, um den aggressiven Attacken, den flexiblen und agilen Angreifern auf der Gegenseite unmittelbar und schnell zu begegnen.<\/p>\r\n<p><strong>EMOTET: Mit Multi-Scannern sch\u00fctzen Sie Ihre Beh\u00f6rde<\/strong><br \/> <br \/><span style=\"font-size: medium;\"><em><strong><span style=\"color: #004562;\">An dieser Stelle sei angemerkt, dass ProSoft, Initiator dieses Blogs, zugleich Anbieter von Security-Software ist und die nachfolgenden Ausf\u00fchrungen damit zugleich Werbung in eigener Sache sind!<\/span><\/strong><\/em><\/span><\/p>\r\n<p>\u201eMein Laden ist gut abgesichert \u2026\u201c \u2013 das sagen viele, aber es stimmt eben nicht immer.<br \/> Nat\u00fcrlich hat jeder irgendeine Anti-Malware, die dann durchaus umfassenden Schutz bieten kann. Allerdings ist \u201ekann\u201c dabei das entscheidende Schl\u00fcsselwort \u2013 kann, nicht muss.<\/p>\r\n<p>Die Frage lautet n\u00e4mlich, wie aktuell und vollst\u00e4ndig ist die installierte Security Software tats\u00e4chlich. Hier hat mal der eine Hersteller die Nase vorn, mal der andere. Je nach Ursprung und die Verbreitungsart von Malware gibt es entscheidende Unterschiede in welcher Region sie auftritt und zuerst entdeckt wird.<\/p>\r\n<p>Die L\u00f6sung \u2013 f\u00fcr dieses Problem: Das Wissen, die Aktualit\u00e4t und sogar den regionalen Vorsprung von m\u00f6glichst vielen Anbietern miteinander b\u00fcndeln. <strong>Viel hilft viel! <\/strong><\/p>\r\n<p><strong>Geschwindigkeit ist dein Freund und Wissen ist Macht!<\/strong><br \/> Diesen Weg gehen die Anbieter von sog. Multi-Scannern, die in einer einzigen L\u00f6sung die Angebote von mehreren, autarken Anti-Malware-Herstellern b\u00fcndeln. So kombiniert man die jeweilige Erkennungsrate der verschiedenen Entwicklungslabore miteinander und schlie\u00dft noch so kleine Sicherheitsl\u00f6cher. Die Erkennungsraten steigen, je mehr Hersteller gleichzeitig agieren. Daraus wiederum resultiert eine k\u00fcrzere Verwundbarkeit (die Zeit, bis der Angreifer irgendwo auf der Welt entdeckt wird) und mehr Sicherheit durch ein breiteres Abdeckungsspektrum.<\/p>[\/et_pb_text][et_pb_divider color=\"#939393\" divider_position=\"center\" _builder_version=\"3.29.3\"][\/et_pb_divider][et_pb_image src=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2020\/01\/opswat-report.png\" admin_label=\"OPSWAT REPORT 2019\" _builder_version=\"4.0.11\" width=\"100%\" module_alignment=\"center\"][\/et_pb_image][et_pb_text admin_label=\"Der gef\u00e4hrlichste Angreifer trifft auf den st\u00e4rksten Verteidigung\" _builder_version=\"4.0.11\" text_font=\"|300|||||||\" text_text_color=\"#000000\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"]<p><strong>Der gef\u00e4hrlichste Angreifer trifft auf den st\u00e4rksten Verteidiger!<\/strong><\/p>\r\n<p>Das Produkt MetaDefender von OPSWAT beispielsweise \u2013 <em>hier finden Sie einen umfassenden Artikel zu der im Moment mit marktf\u00fchrenden L\u00f6sung <\/em>\u2013\u00a0bietet seinen Anwendern die M\u00f6glichkeit, bis zu 30 renommierte Hersteller miteinander in einer L\u00f6sung, zu kombinieren. Als renommierter Hersteller gilt, wer entweder einen relevanten Marktanteil besitzt oder einen besonderen Wissens- oder Technologievorsprung vorweist.<\/p>[\/et_pb_text][et_pb_image src=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/01\/opswat-av-hertseller.png\" admin_label=\"AV Hersteller\" _builder_version=\"4.0.11\" width=\"100%\" module_alignment=\"center\"][\/et_pb_image][et_pb_text admin_label=\"Bei einem Testlauf im Juli 2019 erreichten 4 geb\u00fcndelte Anti-Malware\" _builder_version=\"4.0.11\" text_font=\"|300|||||||\" text_text_color=\"#000000\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"]<p><strong>Mehr Engines \u2013 viel mehr Erkennungsrate<\/strong><br \/>Bei einem Testlauf im Juli 2019 erreichten 4 geb\u00fcndelte Anti-Malware Engines eine Erkennungsrate von nur 68,37 %* und hatten gegen 11 Trojaner, Adware und Sicherheitsl\u00fccken \u00fcberhaupt <strong><span style=\"font-weight: 600;\">keine Chance<\/span><\/strong>. Wie sieht das erst mit nur einer Antivirenl\u00f6sung aus?<\/p>[\/et_pb_text][et_pb_image src=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/01\/erkennungsraten.png\" admin_label=\"AV Hersteller\" _builder_version=\"4.0.11\" width=\"100%\" module_alignment=\"center\"][\/et_pb_image][et_pb_text admin_label=\"Bei einem Testlauf im Juli 2019 erreichten 4 geb\u00fcndelte Anti-Malware\" _builder_version=\"4.0.11\" text_font=\"|300|||||||\" text_text_color=\"#000000\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"]<p>Ganz anders bei der B\u00fcndelung von<span style=\"font-weight: 600;\"> <strong>32 Anti-Malware Engines<\/strong><\/span>: Mit einer Erkennungsrate von <span style=\"font-weight: 600;\"><strong>99,59%<\/strong><\/span> spielt <a href=\"https:\/\/www.prosoft.de\/loesungen\/software\/anti-malware-multiscanner\/metadefender-beratung\/\" style=\"color: #2672fb; font-weight: 600;\">MetaDefender<\/a> hier in einer ganz eigenen Sicherheits-Liga.<\/p>[\/et_pb_text][et_pb_divider color=\"#939393\" divider_position=\"center\" _builder_version=\"3.29.3\"][\/et_pb_divider][et_pb_text admin_label=\"Zug\u00e4nge sichern. Daten kontrollieren. Restrisiken desinfizieren.\" _builder_version=\"4.0.11\" text_font=\"|300|||||||\" text_text_color=\"#000000\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"]<p><strong>Zug\u00e4nge sichern. Daten kontrollieren. Restrisiken desinfizieren.<\/strong><\/p>\r\n<p>Mit modulare Erweiterung scannt OPSWAT den Netzwerkverkehr (ICAP Integration), <strong>alle E-Mails<\/strong>, <strong>Web-Traffic<\/strong> sowie <strong>Endpoints <\/strong>extrem wirkungsvoll und hochsicher auf Schadsoftware. Weitere Funktionen, wie <span style=\"font-weight: 600;\"><strong>Datei-Desinfektion (CDR)<\/strong><\/span> und die <span style=\"font-weight: 600;\"><strong>Integration \u00fcber OESIS Framework<\/strong><\/span> oder <span style=\"font-weight: 600;\"><strong>API<\/strong><\/span> in andere Anwendungen erh\u00f6hen die Sicherheit und erweitern das Einsatzspektrum von MetaDefender. <\/p>\r\n<p>\u00a0<\/p>[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=\"1\" specialty=\"on\" custom_css_main_1=\"max-width:15%\" disabled_on=\"off|off|off\" _builder_version=\"3.22.3\" custom_padding=\"0|0px|0|0px|false|false\" custom_css_main_element=\"background-color: #efefef\"][et_pb_column type=\"1_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_image src=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2018\/12\/fazit.svg\" align_tablet=\"center\" align_phone=\"\" align_last_edited=\"on|desktop\" disabled_on=\"on|on|\" admin_label=\"Bild Fazit\" _builder_version=\"3.23\" max_width=\"35%\" module_alignment=\"right\" saved_tabs=\"all\" locked=\"off\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" specialty_columns=\"3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_row_inner column_structure=\"undefined\" admin_label=\"Zeile\" _builder_version=\"3.25\"][et_pb_column_inner type=\"undefined\" saved_specialty_column_type=\"3_4\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Text FAZIT\" _builder_version=\"4.0.11\" z_index_tablet=\"500\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"]<strong>Fazit: <\/strong>Die Installation eines Multiscanners dauert auch in komplexen und gro\u00dfen IT-Umgebungen nach Entscheidung nur \u201ewenige Stunden\u201c. Aber jede Stunde, in der man nicht entscheidet, erh\u00f6ht das Risiko exponentiell. Also sollte man sofort loslegen!\u201c [\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=\"1\" admin_label=\"Auto und Beitragsnavi\" _builder_version=\"3.19.14\" custom_padding=\"0|0px|48px|0px|false|false\" global_module=\"702\"][et_pb_row _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\"][et_pb_column type=\"4_4\" _builder_version=\"3.0.47\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_image src=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/02\/red-kadach.png\" align=\"center\" admin_label=\"Bild Kadach Redakteur\" _builder_version=\"3.27.2\" z_index_tablet=\"500\" custom_css_main_element=\"max-width:100px;;\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"][\/et_pb_image][et_pb_text admin_label=\"Redakteur-Name Kadach\" _builder_version=\"3.27.4\" text_orientation=\"center\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"]<p><a href=\"#\"><em><strong>Sven Kadach<\/strong><\/em><\/a><\/p>[\/et_pb_text][et_pb_text admin_label=\"Text Sven Kadach\" _builder_version=\"3.27.4\" text_font_size=\"12px\" text_line_height=\"1.2em\" text_orientation=\"center\" custom_margin=\"-10px||\" z_index_tablet=\"500\" text_text_shadow_horizontal_length_tablet=\"0px\" text_text_shadow_vertical_length_tablet=\"0px\" text_text_shadow_blur_strength_tablet=\"1px\" link_text_shadow_horizontal_length_tablet=\"0px\" link_text_shadow_vertical_length_tablet=\"0px\" link_text_shadow_blur_strength_tablet=\"1px\" ul_text_shadow_horizontal_length_tablet=\"0px\" ul_text_shadow_vertical_length_tablet=\"0px\" ul_text_shadow_blur_strength_tablet=\"1px\" ol_text_shadow_horizontal_length_tablet=\"0px\" ol_text_shadow_vertical_length_tablet=\"0px\" ol_text_shadow_blur_strength_tablet=\"1px\" quote_text_shadow_horizontal_length_tablet=\"0px\" quote_text_shadow_vertical_length_tablet=\"0px\" quote_text_shadow_blur_strength_tablet=\"1px\" header_text_shadow_horizontal_length_tablet=\"0px\" header_text_shadow_vertical_length_tablet=\"0px\" header_text_shadow_blur_strength_tablet=\"1px\" header_2_text_shadow_horizontal_length_tablet=\"0px\" header_2_text_shadow_vertical_length_tablet=\"0px\" header_2_text_shadow_blur_strength_tablet=\"1px\" header_3_text_shadow_horizontal_length_tablet=\"0px\" header_3_text_shadow_vertical_length_tablet=\"0px\" header_3_text_shadow_blur_strength_tablet=\"1px\" header_4_text_shadow_horizontal_length_tablet=\"0px\" header_4_text_shadow_vertical_length_tablet=\"0px\" header_4_text_shadow_blur_strength_tablet=\"1px\" header_5_text_shadow_horizontal_length_tablet=\"0px\" header_5_text_shadow_vertical_length_tablet=\"0px\" header_5_text_shadow_blur_strength_tablet=\"1px\" header_6_text_shadow_horizontal_length_tablet=\"0px\" header_6_text_shadow_vertical_length_tablet=\"0px\" header_6_text_shadow_blur_strength_tablet=\"1px\" box_shadow_horizontal_tablet=\"0px\" box_shadow_vertical_tablet=\"0px\" box_shadow_blur_tablet=\"40px\" box_shadow_spread_tablet=\"0px\"]<p style=\"text-align: center;\">\u00a0Redakteur des ProSoft Blogs und Key Account Manager<\/p>[\/et_pb_text][et_pb_divider color=\"#009ee2\" divider_weight=\"5px\" _builder_version=\"3.19.4\" max_width=\"20%\" module_alignment=\"center\"][\/et_pb_divider][et_pb_post_nav in_same_term=\"off\" prev_text=\"Vorheriger Beitrag\" next_text=\"N\u00e4chster Beitrag\" _builder_version=\"3.19.4\" title_font=\"||||||||\" title_text_color=\"#009ee2\"][\/et_pb_post_nav][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"|on|off\" admin_label=\"Section Newsletter Anmeldung\" module_id=\"newsletter\" _builder_version=\"3.19.17\" background_color=\"#002b54\" custom_padding=\"0|0px|0|0px|false|false\" global_module=\"433\"][et_pb_row _builder_version=\"3.25\" max_width=\"1080px\" custom_padding=\"24px|0px|0|0px|false|false\" animation_direction=\"left\"][et_pb_column type=\"4_4\" _builder_version=\"3.0.47\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_image src=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2019\/02\/pro_blog_newsletter-2.svg\" align=\"center\" align_tablet=\"center\" align_phone=\"\" align_last_edited=\"on|desktop\" admin_label=\"Bild Icon Newsletter\" _builder_version=\"3.23\" max_width=\"150px\" animation_style=\"slide\" animation_direction=\"top\"][\/et_pb_image][et_pb_text admin_label=\"Der ProBlog Newsletter\" _builder_version=\"3.29.3\" text_font=\"|300|||||||\" text_font_size=\"14px\" text_line_height=\"1.3em\" background_layout=\"dark\" custom_padding=\"||0px\" animation_direction=\"left\"]<h2 style=\"text-align: center;\">Der ProBlog Newsletter<\/h2>\r\n<h5 style=\"text-align: center;\">Bleiben Sie auf dem Laufenden mit unseren interessanten News, Updates und Insights<br \/> zu modernen IT-Security & IT-Infrastruktur-L\u00f6sungen.<\/h5>\r\n<p style=\"text-align: center;\">Members Only:<br \/> Alle Newsletter-Empf\u00e4nger erhalten jetzt Zugriff auf exklusive Inhalte!<\/p>\r\n<p style=\"text-align: center;\">Bitte f\u00fcllen Sie kurz das Formular aus.<br \/> Anschlie\u00dfend erhalten Sie eine E-Mail, mit der Sie Ihre Anmeldung best\u00e4tigen k\u00f6nnen.<\/p>[\/et_pb_text][et_pb_text admin_label=\"Anmeldeformular Newsletter\" _builder_version=\"3.27.4\" text_font_size=\"12px\" text_orientation=\"center\" background_layout=\"dark\" custom_margin=\"-50px||\" animation_style=\"fade\" animation_direction=\"bottom\"]<p>\u00a0<\/p>\r\n<p>[newsletter_form button_label=\"Jetzt anmelden\"]\u00a0 [newsletter_field name=\"surname\" placeholder=\"Firma\" label=\"\"] [newsletter_field name=\"first_name\"\u00a0 placeholder=\"Name\" label=\"\"] [newsletter_field name=\"email\" placeholder=\"Email\" label=\"\"] Mit der Anmeldung akzeptiere ich die <a href=\"https:\/\/www.prosoft.de\/datenschutzerklaerung\/\" target=\"_blank\" rel=\"noopener noreferrer\">Datenschutzbestimmungen<\/a> der ProSoft GmbH.<br \/>[\/newsletter_form]<\/p>\r\n<p>\u00a0<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"3.22.3\" background_color=\"#a7b7c7\" custom_padding=\"0|0px|0|0px|false|false\" global_module=\"179\"][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"3.25\" background_size=\"initial\" background_position=\"top_left\" background_repeat=\"repeat\" custom_padding=\"24px|0px|40px|0px|false|false\"][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Der ProBlog\" _builder_version=\"3.27.4\" background_layout=\"dark\"]<h3>Der ProBlog<\/h3>[\/et_pb_text][et_pb_divider color=\"#ffffff\" _builder_version=\"3.19.4\" height=\"10px\" custom_margin=\"-10px||\"][\/et_pb_divider][et_pb_text admin_label=\"ist ein Angebot der\" _builder_version=\"3.27.4\" text_font_size=\"12px\" text_line_height=\"1.2em\" background_layout=\"dark\"]<p>ist ein Angebot der<\/p>\r\n<p>ProSoft GmbH<br \/>B\u00fcrgermeister-Graf-Ring 10<br \/>82538 Geretsried<\/p>\r\n<p>\u00a0<\/p>[\/et_pb_text][et_pb_social_media_follow _builder_version=\"3.19.16\" custom_margin=\"|0px||\" custom_padding=\"|0px||0px\" locked=\"off\"][et_pb_social_media_follow_network social_network=\"facebook\" url=\"https:\/\/www.facebook.com\/prosoft.de\/\" _builder_version=\"3.19.5\" background_color=\"#3b5998\" follow_button=\"off\" url_new_window=\"on\"]Facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\"twitter\" url=\"https:\/\/twitter.com\/prosoft_de\/\" _builder_version=\"3.19.5\" background_color=\"#00aced\" follow_button=\"off\" url_new_window=\"on\"]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\"youtube\" url=\"https:\/\/www.youtube.com\/user\/Prosoft\" _builder_version=\"3.19.5\" background_color=\"#a82400\" follow_button=\"off\" url_new_window=\"on\"]youtube[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Kontakt\" _builder_version=\"3.27.4\" background_layout=\"dark\"]<h3>Kontakt und Support<\/h3>[\/et_pb_text][et_pb_divider color=\"#ffffff\" _builder_version=\"3.19.4\" height=\"10px\" custom_margin=\"-10px||\"][\/et_pb_divider][et_pb_text admin_label=\"Telefon +49 (0) 8171\/405-0\" _builder_version=\"3.27.4\" text_font_size=\"12px\" text_line_height=\"1.2em\" background_layout=\"dark\"]<p>Telefon +49 (0) 8171\/405-0<br \/>Fax\u00a0 + 49 (0) 8171\/405-400<br \/><span style=\"color: rgba(255, 255, 255, 0);\"><a style=\"color: rgba(255, 255, 255, 0);\" href=\"mailto:info@prosoft.de\"><span style=\"color: #ffffff;\">info@prosoft.de<\/span> <\/a><\/span><\/p>[\/et_pb_text][et_pb_text admin_label=\"Links ProSoft\" _builder_version=\"4.0.7\" text_font_size=\"12px\" text_line_height=\"1.2em\" background_layout=\"dark\"]Web: <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/\" title=\"ProSoft\" target=\"_blank\" rel=\"noopener noreferrer\">ProSoft<\/a><br \/>\r\nBlog: <a style=\"color: #ffffff;\" href=\"\/\" title=\"ProBlog\">ProBlog<\/a><br \/>\r\nFAQ: <a style=\"color: #ffffff;\" href=\"https:\/\/faq.prosoft.de\/\" title=\"Knowledgebase\" target=\"_blank\" rel=\"noopener noreferrer\">Knowledgebase<\/a><br \/>\r\nShop: <a style=\"color: #ffffff;\" href=\"https:\/\/shop.prosoft.de\/\" title=\"ProSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">ProSecurity<\/a>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"3.25\" custom_padding=\"|||\" custom_padding__hover=\"|||\"][et_pb_text admin_label=\"Sitemap & Links\" _builder_version=\"3.27.4\" background_layout=\"dark\"]<h3>Mehr dazu<\/h3>[\/et_pb_text][et_pb_divider color=\"#ffffff\" _builder_version=\"3.19.4\" height=\"10px\" custom_margin=\"-10px||\"][\/et_pb_divider][et_pb_text admin_label=\"Links Impressum etc\" _builder_version=\"3.27.4\" text_font_size=\"12px\" text_line_height=\"1.2em\" background_layout=\"dark\"]<p><span style=\"color: #ffffff;\">\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/blog\/impressum\/\">Impressum<\/a><a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/impressum\/\"><br \/><\/a>\u279d <a style=\"color: #ffffff;\" href=\"https:\/\/www.prosoft.de\/datenschutzerklaerung\/\">Datenschutz<\/a><br \/><a style=\"color: #ffffff;\" href=\"\/die-redaktion\/\"><span style=\"color: #ffffff;\">\u279d<\/span> Redaktion<\/a><br \/><a style=\"color: #ffffff;\" href=\"\/ueber-uns-prosoft\/\">\u279d \u00dcber uns<\/a><\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[40,211,28,210],"tags":[180,178,232],"class_list":["post-29468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-authentifizierung","category-datentransfer","category-mobiles-arbeiten","category-phishing","tag-corona","tag-homeoffice","tag-mehrfaktor-authentifizierung"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Sicheres Homeoffice: Unternehmen wollen jetzt reagieren | ProBlog<\/title>\n<meta name=\"description\" content=\"Von einer Notl\u00f6sung zum sicheren Homeoffice. Unternehmen wollen laut einer Deloitte Umfrage jetzt reagieren. Die wichtigsten Fakten | ProBlog\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unternehmen m\u00f6chten das Homeoffice sicherer machen\" \/>\n<meta property=\"og:description\" content=\"Von einer Notl\u00f6sung zum sicheren Homeoffice. Ergebnisse aus einer aktuellen Deloitte Umfrage zur Zukunft von Homeoffice | ProBlog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/\" \/>\n<meta property=\"og:site_name\" content=\"ProSoft Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-16T14:57:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-05T15:20:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2020\/12\/Homeoffice.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"306\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robert Korherr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Unternehmen m\u00f6chten das Homeoffice sicherer machen\" \/>\n<meta name=\"twitter:description\" content=\"Von einer Notl\u00f6sung zum sicheren Homeoffice. Ergebnisse aus einer aktuellen Deloitte Umfrage zur Zukunft von Homeoffice | ProBlog\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2020\/12\/Homeoffice.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@prosoft_de\" \/>\n<meta name=\"twitter:site\" content=\"@prosoft_de\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robert Korherr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"22\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/\"},\"author\":{\"name\":\"Robert Korherr\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/person\\\/ceb0d9eb1290da52ff802aaf2231d811\"},\"headline\":\"Sicheres Homeoffice: Unternehmen wollen jetzt reagieren\",\"datePublished\":\"2020-12-16T14:57:53+00:00\",\"dateModified\":\"2025-02-05T15:20:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/\"},\"wordCount\":4345,\"publisher\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Homeoffice.jpg\",\"keywords\":[\"Corona\",\"Homeoffice\",\"Mehrfaktor Authentifizierung\"],\"articleSection\":[\"Authentifizierung\",\"Datentransfer\",\"Mobiles Arbeiten\",\"Phishing\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/\",\"name\":\"Sicheres Homeoffice: Unternehmen wollen jetzt reagieren | ProBlog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Homeoffice.jpg\",\"datePublished\":\"2020-12-16T14:57:53+00:00\",\"dateModified\":\"2025-02-05T15:20:36+00:00\",\"description\":\"Von einer Notl\u00f6sung zum sicheren Homeoffice. Unternehmen wollen laut einer Deloitte Umfrage jetzt reagieren. Die wichtigsten Fakten | ProBlog\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Homeoffice.jpg\",\"contentUrl\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Homeoffice.jpg\",\"width\":900,\"height\":306,\"caption\":\"Kids Hands Holding Word Homeoffice Means Work From Home, Isolated Background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/sicheres-homeoffice\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicheres Homeoffice: Unternehmen wollen jetzt reagieren\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/\",\"name\":\"ProSoft Blog\",\"description\":\"ProSoft GmbH | Manage, Secure, Optimise IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#organization\",\"name\":\"ProSoft Blog\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Logo-schwarz-orange-slogan.jpg\",\"contentUrl\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Logo-schwarz-orange-slogan.jpg\",\"width\":1200,\"height\":344,\"caption\":\"ProSoft Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/prosoft_de\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/prosoft-security-gmbh\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/Prosoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/#\\\/schema\\\/person\\\/ceb0d9eb1290da52ff802aaf2231d811\",\"name\":\"Robert Korherr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g\",\"caption\":\"Robert Korherr\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/robertkorherr\\\/\"],\"url\":\"https:\\\/\\\/www.prosoft.de\\\/blog\\\/author\\\/robert-korherrprosoft-de\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sicheres Homeoffice: Unternehmen wollen jetzt reagieren | ProBlog","description":"Von einer Notl\u00f6sung zum sicheren Homeoffice. Unternehmen wollen laut einer Deloitte Umfrage jetzt reagieren. Die wichtigsten Fakten | ProBlog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/","og_locale":"de_DE","og_type":"article","og_title":"Unternehmen m\u00f6chten das Homeoffice sicherer machen","og_description":"Von einer Notl\u00f6sung zum sicheren Homeoffice. Ergebnisse aus einer aktuellen Deloitte Umfrage zur Zukunft von Homeoffice | ProBlog","og_url":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/","og_site_name":"ProSoft Blog","article_published_time":"2020-12-16T14:57:53+00:00","article_modified_time":"2025-02-05T15:20:36+00:00","og_image":[{"width":900,"height":306,"url":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2020\/12\/Homeoffice.jpg","type":"image\/jpeg"}],"author":"Robert Korherr","twitter_card":"summary_large_image","twitter_title":"Unternehmen m\u00f6chten das Homeoffice sicherer machen","twitter_description":"Von einer Notl\u00f6sung zum sicheren Homeoffice. Ergebnisse aus einer aktuellen Deloitte Umfrage zur Zukunft von Homeoffice | ProBlog","twitter_image":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2020\/12\/Homeoffice.jpg","twitter_creator":"@prosoft_de","twitter_site":"@prosoft_de","twitter_misc":{"Verfasst von":"Robert Korherr","Gesch\u00e4tzte Lesezeit":"22\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/#article","isPartOf":{"@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/"},"author":{"name":"Robert Korherr","@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/person\/ceb0d9eb1290da52ff802aaf2231d811"},"headline":"Sicheres Homeoffice: Unternehmen wollen jetzt reagieren","datePublished":"2020-12-16T14:57:53+00:00","dateModified":"2025-02-05T15:20:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/"},"wordCount":4345,"publisher":{"@id":"https:\/\/www.prosoft.de\/blog\/#organization"},"image":{"@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/#primaryimage"},"thumbnailUrl":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2020\/12\/Homeoffice.jpg","keywords":["Corona","Homeoffice","Mehrfaktor Authentifizierung"],"articleSection":["Authentifizierung","Datentransfer","Mobiles Arbeiten","Phishing"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/","url":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/","name":"Sicheres Homeoffice: Unternehmen wollen jetzt reagieren | ProBlog","isPartOf":{"@id":"https:\/\/www.prosoft.de\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/#primaryimage"},"image":{"@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/#primaryimage"},"thumbnailUrl":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2020\/12\/Homeoffice.jpg","datePublished":"2020-12-16T14:57:53+00:00","dateModified":"2025-02-05T15:20:36+00:00","description":"Von einer Notl\u00f6sung zum sicheren Homeoffice. Unternehmen wollen laut einer Deloitte Umfrage jetzt reagieren. Die wichtigsten Fakten | ProBlog","breadcrumb":{"@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/#primaryimage","url":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2020\/12\/Homeoffice.jpg","contentUrl":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2020\/12\/Homeoffice.jpg","width":900,"height":306,"caption":"Kids Hands Holding Word Homeoffice Means Work From Home, Isolated Background"},{"@type":"BreadcrumbList","@id":"https:\/\/www.prosoft.de\/blog\/sicheres-homeoffice\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.prosoft.de\/blog\/"},{"@type":"ListItem","position":2,"name":"Sicheres Homeoffice: Unternehmen wollen jetzt reagieren"}]},{"@type":"WebSite","@id":"https:\/\/www.prosoft.de\/blog\/#website","url":"https:\/\/www.prosoft.de\/blog\/","name":"ProSoft Blog","description":"ProSoft GmbH | Manage, Secure, Optimise IT","publisher":{"@id":"https:\/\/www.prosoft.de\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.prosoft.de\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.prosoft.de\/blog\/#organization","name":"ProSoft Blog","url":"https:\/\/www.prosoft.de\/blog\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2023\/10\/Logo-schwarz-orange-slogan.jpg","contentUrl":"https:\/\/www.prosoft.de\/blog\/wp-content\/uploads\/2023\/10\/Logo-schwarz-orange-slogan.jpg","width":1200,"height":344,"caption":"ProSoft Blog"},"image":{"@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/prosoft_de","https:\/\/www.linkedin.com\/company\/prosoft-security-gmbh\/","https:\/\/www.youtube.com\/user\/Prosoft"]},{"@type":"Person","@id":"https:\/\/www.prosoft.de\/blog\/#\/schema\/person\/ceb0d9eb1290da52ff802aaf2231d811","name":"Robert Korherr","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e900784c694475c7a8f5cdce3dd3798a7f7fbfb92c18987ad95eeaf920cdc59b?s=96&d=blank&r=g","caption":"Robert Korherr"},"sameAs":["https:\/\/www.linkedin.com\/in\/robertkorherr\/"],"url":"https:\/\/www.prosoft.de\/blog\/author\/robert-korherrprosoft-de\/"}]}},"_links":{"self":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/posts\/29468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/comments?post=29468"}],"version-history":[{"count":2,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/posts\/29468\/revisions"}],"predecessor-version":[{"id":49427,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/posts\/29468\/revisions\/49427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/media\/29481"}],"wp:attachment":[{"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/media?parent=29468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/categories?post=29468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.prosoft.de\/blog\/wp-json\/wp\/v2\/tags?post=29468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}