{"id":4953,"date":"2022-08-29T10:50:39","date_gmt":"2022-08-29T08:50:39","guid":{"rendered":"https:\/\/cyberfunk-security.com\/?page_id=4953"},"modified":"2022-11-01T13:12:39","modified_gmt":"2022-11-01T11:12:39","slug":"home","status":"publish","type":"page","link":"https:\/\/cyberfunk-security.com\/kl\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4953\" class=\"elementor elementor-4953\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8d69aeb elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8d69aeb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3fe71b2\" data-id=\"3fe71b2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3665b99 elementor-widget elementor-widget-image\" data-id=\"3665b99\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"170\" height=\"46\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/cyberfunk-security_made-and-hosted-in-germany_new.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47d767b top_line elementor-widget elementor-widget-heading\" data-id=\"47d767b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Wir machen <br>Sie <span>cyberfit<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72f0875 elementor-widget elementor-widget-text-editor\" data-id=\"72f0875\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.4 - 31-08-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Wir wollen IT-Sicherheit, Cybercrime und Darknet einfach erkl\u00e4ren und unseren Kunden die Sicherheit bieten, die sie aktuell ben\u00f6tigen.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6671dc check_btn elementor-widget elementor-widget-button\" data-id=\"e6671dc\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjIxNjMiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"34px\" viewBox=\"0 0 34 34\"><title>7FEC8EAE-F46A-449A-A694-526BBB31DC9D<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-537.000000, -692.000000)\"><g id=\"Group-9\" transform=\"translate(135.000000, 678.416103)\"><g id=\"Group-10-Copy-2\" transform=\"translate(38.250000, 13.777935)\"><g id=\"arrow-right-copy-3\" transform=\"translate(364.500000, 0.000000)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#F12078\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Darknet Monitoring f\u00fcr Ihr Unternehmen<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6606221 notify elementor-widget elementor-widget-text-editor\" data-id=\"6606221\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Durchlaufen Sie unser Darknet Check-up!<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ee8cc21\" data-id=\"ee8cc21\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b1cd0a elementor-widget elementor-widget-image\" data-id=\"6b1cd0a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"590\" height=\"696\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/cyberfunk-security_composition.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ca18431 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca18431\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-557e83c\" data-id=\"557e83c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4796b8 elementor-widget elementor-widget-heading\" data-id=\"e4796b8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Produkte & SERVICES<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9272ff2 services elementor-pagination-type-bullets elementor--star-style-star_fontawesome elementor-widget elementor-widget-global elementor-global-2856 elementor-widget-reviews\" data-id=\"9272ff2\" data-element_type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:&quot;4&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;slides_per_view_laptop&quot;:&quot;4&quot;,&quot;slides_per_view_tablet_extra&quot;:&quot;3&quot;,&quot;slides_per_view_tablet&quot;:&quot;2&quot;,&quot;space_between_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;speed&quot;:2000,&quot;pagination&quot;:&quot;bullets&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;space_between_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"reviews.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/cyberfunk-security.com\/wp-content\/plugins\/elementor-pro\/assets\/css\/widget-carousel.min.css\">\t\t<div class=\"elementor-swiper\">\n\t\t\t<div class=\"elementor-main-swiper swiper-container\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-d43230e\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/darknet-monitoring\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Darknet-Research.svg\" alt=\"Darknet Monitoring&lt;span&gt;Ermittlungen im Deep- &lt;\/br&gt;und Darkweb&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Darknet Monitoring<span>Ermittlungen im Deep- <\/br>und Darkweb<\/span><\/span><span class=\"elementor-testimonial__title\">Mehr Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-b8854f4\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/24-7-incident-response\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Incident-Response.svg\" alt=\"24\/7 Incident Response &lt;span&gt;Notfall Hotline f\u00fcr  IT-Sicherheitsvorf\u00e4lle&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">24\/7 Incident Response <span>Notfall Hotline f\u00fcr  IT-Sicherheitsvorf\u00e4lle<\/span><\/span><span class=\"elementor-testimonial__title\">Mehr Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-1f135ac\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/red-team-assessment\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Red-Team-Assessment.svg\" alt=\"Red Team Assessment &lt;span&gt;Realistische Angriffssimulation&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Red Team Assessment <span>Realistische Angriffssimulation<\/span><\/span><span class=\"elementor-testimonial__title\">Mehr Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-acc21f3\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/threat-intelligence\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Threat-Intelligence.svg\" alt=\"CYBER&gt;WATCH&lt;\/br&gt;Threat Intelligence &lt;span&gt;Kundenspezifische Bedrohungsanalyse&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">CYBER&gt;WATCH<\/br>Threat Intelligence <span>Kundenspezifische Bedrohungsanalyse<\/span><\/span><span class=\"elementor-testimonial__title\">Mehr Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-0143a65\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/secure-dns\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Secure-DNS.svg\" alt=\"Secure DNS &lt;span&gt;Sicherer und legitimierter Internetverkehr&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Secure DNS <span>Sicherer und legitimierter Internetverkehr<\/span><\/span><span class=\"elementor-testimonial__title\">Mehr Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-a366fd2\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"https:\/\/cyberfunk-security.com\/active-directory-hardening\/\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/Active-Directory-Hardening.svg\" alt=\"Active Directory Hardening &lt;span&gt;Absicherung der Windows Server Berechtigungen&lt;\/span&gt;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Active Directory Hardening <span>Absicherung der Windows Server Berechtigungen<\/span><\/span><span class=\"elementor-testimonial__title\">Mehr Info<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9959a38 elementor-widget elementor-widget-heading\" data-id=\"9959a38\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DEMN\u00e4CHST ERH\u00e4LTLICH<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-690999e cmsoon elementor-pagination-type-bullets elementor--star-style-star_fontawesome elementor-widget elementor-widget-reviews\" data-id=\"690999e\" data-element_type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:&quot;2&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;slides_per_view_laptop&quot;:&quot;4&quot;,&quot;slides_per_view_tablet_extra&quot;:&quot;3&quot;,&quot;slides_per_view_tablet&quot;:&quot;2&quot;,&quot;space_between_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;space_between_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"reviews.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t<div class=\"elementor-main-swiper swiper-container\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-d43230e\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjIyMjUiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/icon_Services_Coming-Soon.svg\" alt=\"MDR, XDR &amp; Managed SOC\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">MDR, XDR &amp; Managed SOC<\/span><span class=\"elementor-testimonial__title\">Coming Soon<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-b8854f4\">\n\t\t\t\t\t\t\t<a class=\"elementor-testimonial__header\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjIyMjUiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/08\/icon_Services_Coming-Soon.svg\" alt=\"Cybersecurity Awareness &amp; C-Level Training\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Cybersecurity Awareness &amp; C-Level Training<\/span><span class=\"elementor-testimonial__title\">Coming Soon<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\"><span class=\"elementor-screen-only\">Read More<\/span><\/div>\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c2e579 elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet_extra elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c2e579\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e68b50\" data-id=\"2e68b50\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-785d248 elementor-section-content-middle homectatxt elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"785d248\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ab0fed6\" data-id=\"ab0fed6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b371767 cta_txt elementor-widget elementor-widget-heading\" data-id=\"b371767\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Verstehen Sie cyber? <br><span>Wir sprechen Klartext!<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8f5ea63\" data-id=\"8f5ea63\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e9c7bb check_btn elementor-align-right elementor-widget elementor-widget-button\" data-id=\"7e9c7bb\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"#\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"34px\" viewBox=\"0 0 34 34\"><title>7FEC8EAE-F46A-449A-A694-526BBB31DC9D<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-537.000000, -692.000000)\"><g id=\"Group-9\" transform=\"translate(135.000000, 678.416103)\"><g id=\"Group-10-Copy-2\" transform=\"translate(38.250000, 13.777935)\"><g id=\"arrow-right-copy-3\" transform=\"translate(364.500000, 0.000000)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#F12078\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt Sprache auf Klartext umstellen<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-996334c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"996334c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45f3cdb\" data-id=\"45f3cdb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dc271fb elementor-section-content-middle elementor-reverse-mobile_extra elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dc271fb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3aee156\" data-id=\"3aee156\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e64bf3e img_border1 elementor-widget elementor-widget-image\" data-id=\"e64bf3e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"843\" height=\"843\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min.jpg 843w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-300x300.jpg 300w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-150x150.jpg 150w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-768x768.jpg 768w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-24x24.jpg 24w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-36x36.jpg 36w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/01_cf_home-image-min-60x60.jpg 60w\" sizes=\"auto, (max-width: 843px) 100vw, 843px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bf561fb\" data-id=\"bf561fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6329d9b elementor-widget elementor-widget-heading\" data-id=\"6329d9b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wir bieten Ihnen einen\nRund-um-Schutz f\u00fcr\nalle Bereiche der IT<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c904f03 elementor-widget elementor-widget-text-editor\" data-id=\"c904f03\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Sie m\u00fcssen kein Ziel sein um Opfer eines Cyber-Angriffes zu werden. Egal in welcher Branche Sie t\u00e4tig sind und welche Anwendungen Sie verwenden: <span style=\"text-decoration: underline;\"><strong>Wir beraten Sie individuell und diskret.<\/strong><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88b62ba check_btn elementor-align-left elementor-mobile_extra-align-center elementor-widget elementor-widget-button\" data-id=\"88b62ba\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberfunk-security.com\/produkte-services\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"33px\" viewBox=\"0 0 34 33\"><title>1D23DB06-6094-4B1D-8480-8B266B467B29<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-1329.000000, -90.000000)\"><g id=\"Group-12\" transform=\"translate(1216.000000, 82.872205)\"><g id=\"arrow-right-copy-11\" transform=\"translate(113.527359, 7.127795)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#FDDC48\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Zu unseren Produkten & Services<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98a90e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98a90e2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c67be7a\" data-id=\"c67be7a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d3a2a6 elementor-widget elementor-widget-heading\" data-id=\"3d3a2a6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UNSER TEAM IN DER PRESSE<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8aa283b press elementor-skin-carousel elementor-pagination-type-bullets elementor-pagination-position-outside elementor-widget elementor-widget-media-carousel\" data-id=\"8aa283b\" data-element_type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:&quot;5&quot;,&quot;slides_per_view_laptop&quot;:&quot;5&quot;,&quot;slides_per_view_tablet&quot;:&quot;3&quot;,&quot;slides_per_view_mobile&quot;:&quot;2&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;space_between_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;space_between_tablet_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;skin&quot;:&quot;carousel&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;space_between_mobile_extra&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"media-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t<div class=\"elementor-main-swiper swiper-container\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.beobachter.ch\/digital\/handel-mit-kinderpornografie-in-den-sozialen-medien-gibt-es-praktisch-keine-hurden-mehr\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_1.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.welt.de\/wirtschaft\/plus238479523\/Erpressung-von-Firmen-Sensible-Daten-als-Geisel-Loesegeld-gegen-Code-Unterwegs-mit-dem-Cyberjaeger.html\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_2.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.inside-it.ch\/post\/bericht-kriminelle-haben-in-einem-jahr-daten-von-2700-schweizer-firmen-geklaut-20211008\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_3.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.blick.ch\/schweiz\/cyberkriminalitaet-boomt-jetzt-kann-jeder-mit-hacken-geld-machen-id17495294.html\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_4.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.virusbulletin.com\/blog\/2020\/10\/vb2020-tips-presentations-cybercrime-dach-region-and-ransomware-latam\/\" target=\"_blank\">\t\t<div class=\"elementor-carousel-image\" style=\"background-image: url(https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/logo_5.svg)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d753468 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d753468\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-199fd15\" data-id=\"199fd15\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3dd20f1 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3dd20f1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a720423\" data-id=\"a720423\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a4597d elementor-widget elementor-widget-heading\" data-id=\"4a4597d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die besten Experten Deutschlands f\u00fcr Ihre Cybersicherheit<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06627fd elementor-widget elementor-widget-text-editor\" data-id=\"06627fd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tDie besten K\u00f6pfe arbeiten mit uns und kommen aus den exklusiven Netzwerken: C3, ISACA &#038; SANS.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d14af8 check_btn elementor-align-left elementor-mobile_extra-align-center elementor-widget elementor-widget-button\" data-id=\"8d14af8\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberfunk-security.com\/ueber-uns\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"34px\" viewBox=\"0 0 34 34\"><title>7FEC8EAE-F46A-449A-A694-526BBB31DC9D<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-537.000000, -692.000000)\"><g id=\"Group-9\" transform=\"translate(135.000000, 678.416103)\"><g id=\"Group-10-Copy-2\" transform=\"translate(38.250000, 13.777935)\"><g id=\"arrow-right-copy-3\" transform=\"translate(364.500000, 0.000000)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#F12078\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Mehr \u00fcber Cyberfunk Security<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-be7f273\" data-id=\"be7f273\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-006fb30 img_border elementor-widget elementor-widget-image\" data-id=\"006fb30\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"843\" height=\"843\" src=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min.jpg 843w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-300x300.jpg 300w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-150x150.jpg 150w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-768x768.jpg 768w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-24x24.jpg 24w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-36x36.jpg 36w, https:\/\/cyberfunk-security.com\/wp-content\/uploads\/2022\/09\/02_cf_home-image-min-60x60.jpg 60w\" sizes=\"auto, (max-width: 843px) 100vw, 843px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-63236ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"63236ce\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-716ba86\" data-id=\"716ba86\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bf48541 elementor-widget elementor-widget-heading\" data-id=\"bf48541\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">FAQ>TEN CYBERCRIME <\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fa4028 elementor-widget elementor-widget-heading\" data-id=\"9fa4028\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Was sie \u00fcber Cybersecurity <br>\nwissen wollten, es aber nie gewagt <br>\nhaben zu fragen?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2db6c9 faqs elementor-widget elementor-widget-accordion\" data-id=\"b2db6c9\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>.elementor-accordion{text-align:left}.elementor-accordion .elementor-accordion-item{border:1px solid #d4d4d4}.elementor-accordion .elementor-accordion-item+.elementor-accordion-item{border-top:none}.elementor-accordion .elementor-tab-title{margin:0;padding:15px 20px;font-weight:700;line-height:1;cursor:pointer;outline:none}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{display:inline-block;width:1.5em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon svg{width:1em;height:1em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-right{float:right;text-align:right}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-left{float:left;text-align:left}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-closed{display:block}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-opened,.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-closed{display:none}.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-opened{display:block}.elementor-accordion .elementor-tab-content{display:none;padding:15px 20px;border-top:1px solid #d4d4d4}@media (max-width:480px){.elementor-accordion .elementor-tab-title{padding:12px 15px}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{width:1.2em}.elementor-accordion .elementor-tab-content{padding:7px 15px}}.e-container>.elementor-widget-accordion{width:var(--container-widget-width,100%)}<\/style>\t\t<div class=\"elementor-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1871\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1871\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">Was ist Cybersicherheit?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1871\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1871\"><p>Cybersicherheit ist die Praxis des Schutzes von mit dem Internet verbundenen Netzwerken, Computern, mobilen Ger\u00e4ten, Software, Anwendungen &#8211; und der sensiblen Daten, die in einem Netzwerk gespeichert sind oder durch dieses \u00fcbertragen werden &#8211; vor b\u00f6swilligen Angriffen. <br \/><br \/>Die verschiedenen Technologien und Verfahren, aus denen sich die gesamte Palette der Cybersicherheitsma\u00dfnahmen zusammensetzt, dienen dazu, Sicherheitsl\u00fccken zu schlie\u00dfen und Angreifer abzuwehren, die versuchen, sich Zugang zu sensiblen Kundendaten zu verschaffen, diese zu ver\u00e4ndern, zu zerst\u00f6ren oder zu erpressen. Es ist auch ein wichtiger Schutz, um sich schnell und effizient von Angriffen zu erholen, die darauf abzielen, die F\u00e4higkeit einer Organisation, ihre eigenen Systeme zu betreiben, zu blockieren, zu st\u00f6ren oder zu deaktivieren. <\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1872\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-1872\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">Wer braucht Cybersicherheit?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1872\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1872\"><p>Einige Branchen sind aufgrund der Art ihrer Gesch\u00e4ftst\u00e4tigkeit st\u00e4rker von Cyber-Bedrohungen bedroht (z. B. Gesundheitswesen, Finanzwesen und Bildungswesen). Im Grunde genommen sollten jedoch alle Unternehmen Ma\u00dfnahmen zum Schutz ihrer Netzwerke und der vertraulichen Daten ihrer Kunden ergreifen.<\/p><p>Angesichts des technologischen Fortschritts, der zunehmenden Konnektivit\u00e4t und der kriminellen Kreativit\u00e4t werden Cyberangriffe weiterhin exponentiell zunehmen &#8211; und das zu hohen Kosten. Laut einer aktuellen Studie wird die Cyberkriminalit\u00e4t die Welt bis Ende 2021 mehr als 6 Billionen Dollar und bis 2025 sogar 10,5 Billionen Dollar j\u00e4hrlich kosten.<\/p><p>Bei solch hohen Schadenssummen w\u00e4re es leicht zu glauben, dass Cyber-Kriminelle es vor allem auf gro\u00dfe Unternehmen und Konzerne abgesehen haben. Angreifer haben jedoch festgestellt, dass kleine Unternehmen (SMBs) &#8211; insbesondere solche, die Teil einer Lieferkette zu gr\u00f6\u00dferen Unternehmen sind &#8211; anf\u00e4llige und lohnenswerte Ziele sind.<\/p><p>Einem Bericht \u00fcber den globalen Stand der Sicherheit zufolge haben 71 % der KMU weltweit seit der Gr\u00fcndung ihres Unternehmens mindestens einen Cyberangriff erlebt, und 66 % wurden allein im Jahr 2021 angegriffen.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1873\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"tab\" aria-controls=\"elementor-tab-content-1873\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">Warum hat Cybersicherheit Priorit\u00e4t?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1873\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1873\"><p>Seit sich der erste bekannte Computerwurm 1971 zwischen infizierten Computern verbreitete, haben eine ganze Reihe gut dokumentierter Angriffe in den letzten 50 Jahren Unternehmen weltweit Sch\u00e4den in Billionenh\u00f6he verursacht. Sie alle sind eine deutliche Erinnerung daran, dass Cybersicherheit heute ein Muss ist.<\/p><p>Jetzt, nach COVID-19, haben die explosionsartige Zunahme der Home Office und Remote T\u00e4tigkeiten sowie die Verbreitung des Internets der Dinge (IoT) in unserer sich st\u00e4ndig ver\u00e4ndernden digitalen Landschaft das Potenzial f\u00fcr Cyberangriffe deutlich erh\u00f6ht. Cyberkriminelle passen ihre Angriffsmethoden an und konzentrieren sich auf das schw\u00e4chste Glied in der Kette der Cybersicherheit: menschliches Versagen.<\/p><p>Mit mehr Ger\u00e4ten an mehr Standorten, die mit mehr Software verbunden sind, war die Notwendigkeit einer fortschrittlichen Cybersicherheit f\u00fcr Unternehmen jeder Gr\u00f6\u00dfe, die sensible Kundendaten sch\u00fctzen m\u00fcssen, noch nie so gro\u00df.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1874\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"tab\" aria-controls=\"elementor-tab-content-1874\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-chevron-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-chevron-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">Was ist ein Cyberangriff?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1874\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1874\"><p>Ob es darum geht, Daten zu stehlen, Netzwerkaktivit\u00e4ten zu st\u00f6ren oder Ger\u00e4te zu besch\u00e4digen, Cyberangriffe erfolgen oft in mehreren Schritten:<\/p><p>1) durch Scannen nach Schwachstellen; <br \/>2) Initiierung der Kompromittierung und; <br \/>3) Ausf\u00fchren eines Angriffs.<br \/><br \/>Es gibt zwar keine M\u00f6glichkeit, sich vollst\u00e4ndig gegen alle Angriffe zu sch\u00fctzen, aber wenn Sie wissen, womit Ihr System konfrontiert ist, und die aktuellen Bedrohungen kennen, k\u00f6nnen Sie einen umfassenderen Cybersicherheitsplan erstellen.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab07a5c check_btn elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ab07a5c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a href=\"https:\/\/cyberfunk-security.com\/faq\/\" class=\"elementor-button-link elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"34px\" height=\"34px\" viewBox=\"0 0 34 34\"><title>7FEC8EAE-F46A-449A-A694-526BBB31DC9D<\/title><g id=\"Page-1\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\"><g id=\"Cyberfunk-Security-&#x2013;-Startseite-(v1)-Deutsch\" transform=\"translate(-537.000000, -692.000000)\"><g id=\"Group-9\" transform=\"translate(135.000000, 678.416103)\"><g id=\"Group-10-Copy-2\" transform=\"translate(38.250000, 13.777935)\"><g id=\"arrow-right-copy-3\" transform=\"translate(364.500000, 0.000000)\"><ellipse id=\"Oval\" fill=\"#FFFFFF\" cx=\"17.2031615\" cy=\"16.9135166\" rx=\"12.3830454\" ry=\"12.3675048\"><\/ellipse><path d=\"M16.5198143,0 C8.83081089,0 1.97107152,5.51966692 0.362636068,13.0358986 C-0.440950239,16.7914919 0.100386581,20.7850417 1.89319647,24.1832798 C3.61865497,27.4537108 6.44741347,30.0968783 9.83182097,31.5948274 C13.3521941,33.1533166 17.3936986,33.4249066 21.0938158,32.3620901 C24.6634396,31.3371112 27.8285341,29.0874549 29.9833577,26.0675929 C34.488745,19.754177 33.886371,10.8858813 28.5858163,5.22873771 C25.4792333,1.91332197 21.0668752,0 16.5198143,0 L16.5198143,0 Z M24.4458104,17.3830199 L19.941686,21.9899595 C18.8013427,23.1566192 16.9988511,21.3891823 18.1345639,20.227988 L20.4072525,17.9034973 L9.63692288,17.9034973 C8.87206362,17.9034973 8.23390917,17.2657233 8.23390917,16.5022443 C8.23390917,15.7387654 8.87248457,15.1009914 9.63692288,15.1009914 L20.3533714,15.1009914 L18.0356416,12.7865907 C16.8839328,11.6363273 18.6695866,9.85249403 19.8212954,11.0027575 L24.4352867,15.6105379 C24.9244262,16.0986431 24.9290566,16.8890288 24.4458104,17.3830199 L24.4458104,17.3830199 Z\" id=\"Shape\" fill=\"#F12078\" fill-rule=\"nonzero\"><\/path><\/g><\/g><\/g><\/g><\/g><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Mehr Fakten \u00fcber Cybercrime<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Wir machen Sie cyberfit Wir wollen IT-Sicherheit, Cybercrime und Darknet einfach erkl\u00e4ren und unseren Kunden die Sicherheit bieten, die sie aktuell ben\u00f6tigen. 7FEC8EAE-F46A-449A-A694-526BBB31DC9D Darknet Monitoring f\u00fcr Ihr Unternehmen Durchlaufen Sie unser Darknet Check-up! Produkte &#038; SERVICES Darknet MonitoringErmittlungen im Deep- und DarkwebMehr Info Read More 24\/7 Incident Response Notfall Hotline f\u00fcr IT-Sicherheitsvorf\u00e4lleMehr Info Read More [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-4953","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/pages\/4953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/comments?post=4953"}],"version-history":[{"count":4,"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/pages\/4953\/revisions"}],"predecessor-version":[{"id":5943,"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/pages\/4953\/revisions\/5943"}],"wp:attachment":[{"href":"https:\/\/cyberfunk-security.com\/kl\/wp-json\/wp\/v2\/media?parent=4953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}