{"id":7279,"date":"2022-06-10T18:18:54","date_gmt":"2022-06-10T16:18:54","guid":{"rendered":"https:\/\/sic.or.at\/en\/?p=7279"},"modified":"2022-06-13T17:11:56","modified_gmt":"2022-06-13T15:11:56","slug":"it-security-prevention-against-ransomware","status":"publish","type":"post","link":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/","title":{"rendered":"IT Security &#8211; Prevention against Ransomware"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]<strong>Due to increasing digitization, we are unfortunately also increasingly confronted with serious threats from the Internet. Hacker attacks are becoming more and more imaginative, intelligent and, above all, individual. In the Software Internet Cluster we would like to share our expertise on this topic.<\/strong><!--more--><\/p>\n<p>Most IT security measures are easy to implement with little to medium effort, are available free of charge or only involve low costs. It&#8217;s all about basic security, which of course can and must be additionally secured with more complex measures. When it comes to IT security, you have to assume that hackers are already active in the system and starting attacks. One speaks of a so-called <em>&#8220;zero trust&#8221; environment<\/em>. So you have to be aware that a hacker attack can also be launched from any internal device.<\/p>\n<h2>Separation of Power in Active Directory<\/h2>\n<h3>with Markus Schoas from <span style=\"color: #ffcc00;\">hs2n Informationstechnologie GmbH<\/span><\/h3>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;7289&#8243; animation=&#8221;None&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][vc_column_text]Ing. Markus Schoas &#8211; Managing Director of <a href=\"https:\/\/hs2n.tech\/\" target=\"_blank\" rel=\"noopener\"><strong>hs2n Informationstechnologie GmbH<\/strong><\/a>[\/vc_column_text][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;3\/4&#8243; tablet_width_inherit=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]Along with <strong>Michael Satlow<\/strong> and <strong>Markus Huber<\/strong>, <strong>Markus Schoas<\/strong> is one of the managing directors of <strong><a href=\"https:\/\/hs2n.tech\/\" target=\"_blank\" rel=\"noopener\">hs2n Informationstechnologie GmbH<\/a><\/strong>, which was founded in Carinthia in 2001 and focuses its services on supporting <em>IT Infrastructure<\/em>, <em>Consulting<\/em>, <em>Product Development<\/em> and individual <em>Software Solutions<\/em> for medium-sized and large companies.<\/p>\n<p>Many years of project experience and a wide range of know-how combined with an innovative and creative approach make hs2n an efficient partner. <em>The focus of the company is also strongly in the area of IT security with its own products such as <a href=\"https:\/\/xeox.com\/\" target=\"_blank\" rel=\"noopener\">XEOX<\/a>, the remote monitoring and management tool, <\/em>as well as its own<a href=\"https:\/\/2factor-authentication.com\/\" target=\"_blank\" rel=\"noopener\"><em> application firewall with two-factor authentication<\/em><\/a>.[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][nectar_btn size=&#8221;medium&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; icon_family=&#8221;default_arrow&#8221; text=&#8221;Learn more&#8221; url=&#8221;https:\/\/sic.or.at\/en\/members\/hs2n-informationstechnologie-gmbh\/&#8221;][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221;][vc_column_text]\n<h3>Measures for the Separation of Powers in the AD<\/h3>\n<p>It must be avoided as far as possible that a domain administrator is compromised and the attacker gets hold of the so-called <strong><a href=\"https:\/\/www.secupedia.info\/wiki\/Golden_Ticket\/Silver_Ticket\" target=\"_blank\" rel=\"noopener\">Golden Ticket<\/a><\/strong>! The golden ticket is the ultimate entry ticket to all system resources that are integrated into an Active Directory, as it allows the entire domain in a company to be compromised with all the necessary rights. <em>As soon as such a Kerberos ticket gets into the hands of a hacker or hacker organization &#8211; it&#8217;s a security meltdown!<\/em><\/p>\n<p>It must be made more difficult for the attacker to obtain a domain administrator&#8217;s password. It has therefore proven itself to reduce such sensitive attack surfaces. For this reason it is advisable that domain administrators can only log on to domain controllers and not to other servers or even clients within the domain.<\/p>\n<h2><span style=\"color: #ffcc00;\"><strong>Checklist<\/strong><\/span><\/h2>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][divider line_type=&#8221;No Line&#8221;][nectar_icon_list animate=&#8221;true&#8221; color=&#8221;default&#8221; direction=&#8221;vertical&#8221; icon_size=&#8221;medium&#8221; icon_style=&#8221;no-border&#8221;][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;simple&#8221; title=&#8221;List Item&#8221; id=&#8221;1655132708060-4&#8243; tab_id=&#8221;1655132708061-10&#8243; icon_fontawesome=&#8221;fa fa-check-square-o&#8221; header=&#8221;Logon exclusively on Domain Controller&#8221; text=&#8221;A Windows domain policy must be created so that domain administrators can only log on to domain controllers.&#8221;][\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;simple&#8221; title=&#8221;List Item&#8221; id=&#8221;1655132708096-3&#8243; tab_id=&#8221;1655132708097-7&#8243; icon_fontawesome=&#8221;fa fa-check-square-o&#8221; header=&#8221;Administrator Account per Server&#8221; text=&#8221;Each server should have its own administrator account so that in case of a compromise, multiple servers are not affected at once. Giving IT staff global accounts that reside in local admin groups is an absolute no-no. The accounts of IT employees should only have normal user rights!&#8221;][\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;simple&#8221; title=&#8221;List Item&#8221; id=&#8221;1655132708114-9&#8243; tab_id=&#8221;1655132708114-8&#8243; icon_fontawesome=&#8221;fa fa-check-square-o&#8221; header=&#8221;Using Group Managed Service Accounts&#8221; text=&#8221;Only group-managed service accounts should be used on servers or clients.&#8221;][\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;icon&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1655132708132-10&#8243; tab_id=&#8221;1655132708133-10&#8243; icon_fontawesome=&#8221;fa fa-check-square-o&#8221; header=&#8221;Introduction of LAPS throughout the domain&#8221;]The local administrator should have a different password for all clients and servers. For this purpose, the introduction of <strong><a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=46899\" target=\"_blank\" rel=\"noopener\">Local Administrator Password Solution (LAPS)<\/a><\/strong> in the entire domain makes sense.[\/nectar_icon_list_item][\/nectar_icon_list][divider line_type=&#8221;No Line&#8221;][divider line_type=&#8221;No Line&#8221;][vc_column_text]<strong>You have any questions or need support with the professional implementation?<br \/>\n<\/strong>We would be glad to forward your request to our IT security experts.[\/vc_column_text][divider line_type=&#8221;No Line&#8221;][nectar_btn size=&#8221;medium&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; icon_family=&#8221;default_arrow&#8221; text=&#8221;Send Request&#8221; url=&#8221;mailto:patrick.struger@sic.or.at?subject=SIC%20IT-Security%20Measurements&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":9,"featured_media":7288,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[],"coauthors":[78],"class_list":{"0":"post-7279","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Security - Prevention against Ransomware - SIC (EN)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security - Prevention against Ransomware - SIC (EN)\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"SIC (EN)\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-10T16:18:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-13T15:11:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/06\/it_sec_erpresser_software_post_en-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1706\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Patrick Struger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Patrick Struger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/\",\"url\":\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/\",\"name\":\"IT Security - Prevention against Ransomware - SIC (EN)\",\"isPartOf\":{\"@id\":\"https:\/\/sic.or.at\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/06\/it_sec_erpresser_software_post_en-scaled.jpg\",\"datePublished\":\"2022-06-10T16:18:54+00:00\",\"dateModified\":\"2022-06-13T15:11:56+00:00\",\"author\":{\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd\"},\"breadcrumb\":{\"@id\":\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#primaryimage\",\"url\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/06\/it_sec_erpresser_software_post_en-scaled.jpg\",\"contentUrl\":\"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/06\/it_sec_erpresser_software_post_en-scaled.jpg\",\"width\":2560,\"height\":1706,\"caption\":\"internet security and data protection concept, blockchain and cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sic.or.at\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security &#8211; Prevention against Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sic.or.at\/en\/#website\",\"url\":\"https:\/\/sic.or.at\/en\/\",\"name\":\"SIC (EN)\",\"description\":\"Software Internet Cluster\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sic.or.at\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd\",\"name\":\"Patrick Struger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sic.or.at\/en\/#\/schema\/person\/image\/b614de6963b56042985724d9ffe7c18e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g\",\"caption\":\"Patrick Struger\"},\"sameAs\":[\"https:\/\/www.sic.or.at\"],\"url\":\"https:\/\/sic.or.at\/en\/author\/pstruger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security - Prevention against Ransomware - SIC (EN)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"IT Security - Prevention against Ransomware - SIC (EN)","og_description":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221;...","og_url":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/","og_site_name":"SIC (EN)","article_published_time":"2022-06-10T16:18:54+00:00","article_modified_time":"2022-06-13T15:11:56+00:00","og_image":[{"width":2560,"height":1706,"url":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/06\/it_sec_erpresser_software_post_en-scaled.jpg","type":"image\/jpeg"}],"author":"Patrick Struger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Patrick Struger","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/","url":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/","name":"IT Security - Prevention against Ransomware - SIC (EN)","isPartOf":{"@id":"https:\/\/sic.or.at\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/06\/it_sec_erpresser_software_post_en-scaled.jpg","datePublished":"2022-06-10T16:18:54+00:00","dateModified":"2022-06-13T15:11:56+00:00","author":{"@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd"},"breadcrumb":{"@id":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#primaryimage","url":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/06\/it_sec_erpresser_software_post_en-scaled.jpg","contentUrl":"https:\/\/sic.or.at\/en\/wp-content\/uploads\/sites\/3\/2022\/06\/it_sec_erpresser_software_post_en-scaled.jpg","width":2560,"height":1706,"caption":"internet security and data protection concept, blockchain and cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/sic.or.at\/en\/it-security-prevention-against-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sic.or.at\/en\/"},{"@type":"ListItem","position":2,"name":"IT Security &#8211; Prevention against Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/sic.or.at\/en\/#website","url":"https:\/\/sic.or.at\/en\/","name":"SIC (EN)","description":"Software Internet Cluster","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sic.or.at\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/250cff3277a5f5e388b264c7b43794bd","name":"Patrick Struger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sic.or.at\/en\/#\/schema\/person\/image\/b614de6963b56042985724d9ffe7c18e","url":"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/110dc54cd1c3930a57f5476d15284ad8fa513dab95aae7852d638e948e1fb23e?s=96&d=mm&r=g","caption":"Patrick Struger"},"sameAs":["https:\/\/www.sic.or.at"],"url":"https:\/\/sic.or.at\/en\/author\/pstruger\/"}]}},"_links":{"self":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/7279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/comments?post=7279"}],"version-history":[{"count":8,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/7279\/revisions"}],"predecessor-version":[{"id":7290,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/posts\/7279\/revisions\/7290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/media\/7288"}],"wp:attachment":[{"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/media?parent=7279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/categories?post=7279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/tags?post=7279"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sic.or.at\/en\/wp-json\/wp\/v2\/coauthors?post=7279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}