{"id":26072,"date":"2025-08-26T09:36:15","date_gmt":"2025-08-26T07:36:15","guid":{"rendered":"https:\/\/www.advens.com\/?p=26072"},"modified":"2025-10-27T14:47:47","modified_gmt":"2025-10-27T13:47:47","slug":"was-ist-cybersecurity-beginner","status":"publish","type":"post","link":"https:\/\/www.advens.com\/de\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/","title":{"rendered":"Was ist eigentlich Cybersecurity?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Warum reden pl\u00f6tzlich alle \u00fcber Cybersecurity?<\/h2>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Und vor allem: Was hat das mit dir pers\u00f6nlich zu tun?<\/p>\n\n\n\n<p><strong>Die kurze Antwort:<\/strong> Cybersecurity ist deine digitale Sicherheit.<\/p>\n\n\n\n<p>Doch was bedeutet das konkret?<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity einfach erkl\u00e4rt<\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-video\"><video width=\"404\" height=\"720\" controls loop preload=\"auto\" src=\"https:\/\/info.advens.com\/hubfs\/2025_DACH_Videos_LinkedIn\/warum-reden-alle-ueber-cybersecurity.mp4\" playsinline><\/video><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Cybersecurity umfasst alle Ma\u00dfnahmen, die Computer, Netzwerke und Daten vor Angriffen, Missbrauch oder Zerst\u00f6rung sch\u00fctzen.<\/p>\n\n\n\n<p>Stell dir vor, dein Computer oder Smartphone ist ein Haus:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Die Haust\u00fcr ist dein Passwort<\/li>\n\n\n\n<li>Die Alarmanlage ist deine Firewall<\/li>\n\n\n\n<li>Der Wachhund ist dein Antivirensystem<\/li>\n<\/ul>\n\n\n\n<p>Cybersecurity sorgt also daf\u00fcr, dass nur erw\u00fcnschte G\u00e4ste hereinkommen \u2013 und unerw\u00fcnschte drau\u00dfen bleiben.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:73px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Vor wem musst du dich sch\u00fctzen?<\/h2>\n\n\n\n<p>Die Bedrohungen im digitalen Raum sind vielf\u00e4ltig. Ein paar Beispiele:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hackerangriffe: <\/strong>Unbefugte versuchen, deine Daten zu stehlen oder dein System zu \u00fcbernehmen.<\/li>\n\n\n\n<li><strong>Phishing-Mails:<\/strong> Gef\u00e4lschte E-Mails, die dich dazu bringen sollen, Passw\u00f6rter oder Kreditkartendaten preiszugeben.<\/li>\n\n\n\n<li><strong>Ransomware:<\/strong> Schadsoftware, die deine Dateien verschl\u00fcsselt und L\u00f6segeld verlangt.<\/li>\n\n\n\n<li><strong>Datenlecks: <\/strong>Schwachstellen in Diensten oder Apps, durch die deine privaten Informationen im Internet landen k\u00f6nnen.<\/li>\n<\/ul>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Stell dir das so vor: <\/mark><\/strong>Du machst eine Party und pl\u00f6tzlich steht ein ungeladener Gast im Wohnzimmer. Cybersecurity ist der T\u00fcrsteher, der diesen Gast gar nicht erst reinl\u00e4sst. Oder, falls er es doch schafft, ihn schnell wieder hinausbef\u00f6rdert.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Wie sch\u00fctzt dich Cybersecurity konkret?<\/h2>\n\n\n\n<p>Damit deine digitale Party nicht von ungebetenen G\u00e4sten gest\u00f6rt wird, brauchst du ein paar grundlegende Sicherheitsma\u00dfnahmen:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Antiviren-Systeme<\/mark><\/strong>\n<ul class=\"wp-block-list\">\n<li>Dein automatischer W\u00e4chter, der bekannte Schadsoftware erkennt und blockiert.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Firewalls<\/mark><\/strong>\n<ul class=\"wp-block-list\">\n<li>Sie kontrollieren, wer rein- oder rausgehen darf \u2013 \u00e4hnlich wie ein T\u00fcrsteher, der Ausweise pr\u00fcft.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Starke Passw\u00f6rter<\/mark><\/strong>\n<ul class=\"wp-block-list\">\n<li>Nutze lange und komplexe Passw\u00f6rter<\/li>\n\n\n\n<li>Verwende f\u00fcr jeden Dienst ein eigenes Passwort<\/li>\n\n\n\n<li>Ein Passwortmanager hilft dir, den \u00dcberblick zu behalten.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Updates installieren<\/mark><\/strong>\n<ul class=\"wp-block-list\">\n<li>Sicherheitsl\u00fccken werden st\u00e4ndig entdeckt \u2013 Updates schlie\u00dfen diese.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Wachsamkeit im Alltag<\/mark><\/strong>\n<ul class=\"wp-block-list\">\n<li>Kein Tool ersetzt gesunden Menschenverstand: Skeptisch bleiben bei Links, Anh\u00e4ngen oder Angeboten, die zu sch\u00f6n klingen, um wahr zu sein.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"491\" height=\"1024\" src=\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/finance_background_012-scaled-e1756136850928-491x1024.jpg\" alt=\"\" class=\"wp-image-26103\" srcset=\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/finance_background_012-scaled-e1756136850928-491x1024.jpg 491w, https:\/\/www.advens.com\/app\/uploads\/2025\/08\/finance_background_012-scaled-e1756136850928-144x300.jpg 144w, https:\/\/www.advens.com\/app\/uploads\/2025\/08\/finance_background_012-scaled-e1756136850928-67x140.jpg 67w, https:\/\/www.advens.com\/app\/uploads\/2025\/08\/finance_background_012-scaled-e1756136850928-300x625.jpg 300w, https:\/\/www.advens.com\/app\/uploads\/2025\/08\/finance_background_012-scaled-e1756136850928-390x813.jpg 390w, https:\/\/www.advens.com\/app\/uploads\/2025\/08\/finance_background_012-scaled-e1756136850928.jpg 690w\" sizes=\"auto, (max-width: 491px) 100vw, 491px\" \/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">Aber betrifft mich das wirklich?<\/h2>\n\n\n\n<p>Viele denken: \u201eIch bin doch gar nicht interessant f\u00fcr Hacker.\u201c<\/p>\n\n\n\n<p>Doch genau das Gegenteil ist der Fall. Jeder ist ein potenzielles Ziel.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deine Daten (z. B. Zugangsdaten, E-Mail-Adressen, Telefonnummern) lassen sich im Darknet verkaufen.<\/li>\n\n\n\n<li>Kriminelle k\u00f6nnen deine Ger\u00e4te nutzen, um Angriffe auf andere durchzuf\u00fchren.<\/li>\n\n\n\n<li>Schon kleine L\u00fccken k\u00f6nnen gro\u00dfen Schaden verursachen \u2013 auch f\u00fcr dich pers\u00f6nlich.<\/li>\n<\/ul>\n\n\n\n<p>Wenn du neugierig bist, wie oft deine Daten schon gestohlen wurden: Es gibt Dienste wie <a href=\"https:\/\/haveibeenpwned.com\/\">Have I Been Pwned,<\/a> wo du kostenlos pr\u00fcfen kannst, ob deine E-Mail-Adresse bereits in einem Datenleck aufgetaucht ist.<\/p>\n\n\n\n\n  \n<div id=\"block-buttons-1303563935\" class=\"acf-block-buttons buttons my-3 \">\n            <a class=\"btn btn-primary\" href=\"https:\/\/haveibeenpwned.com\/\" target=\"\" title=\"Hier geht zu Have I Been Pwned\">\n        Hier geht zu Have I Been Pwned\n      <\/a>\n      <\/div><\/div>\n<\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Fazit<\/h2>\n\n\n\n<p>Cybersecurity ist keine abstrakte IT-Theorie, sondern betrifft uns alle. T\u00e4glich.<\/p>\n\n\n\n<p>Sie ist dein T\u00fcrsteher, deine Alarmanlage und dein Wachhund in der digitalen Welt.<\/p>\n\n\n\n<p><strong>Zusammengefasst<\/strong>: Cybersecurity ist deine digitale Sicherheit.<\/p>\n\n\n\n<p>Mit den richtigen Tools, gesundem Menschenverstand und ein paar einfachen Regeln kannst du dich vor den meisten Gefahren sch\u00fctzen \u2013 und deine Daten bleiben sicher.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading\"><strong>Sie suchen die passende Cybersecurity-L\u00f6sung?<\/strong><\/h4>\n\n\n\n<p>Unsere erfahrenen Experten stehen bereit \u2013 <strong>schnell, pers\u00f6nlich und exakt auf Ihre Anforderungen zugeschnitten<\/strong>.<\/p>\n\n\n\n<p>\ud83d\udcde <strong>Sichern Sie Ihr Unternehmen \u2013 nehmen Sie jetzt Kontakt mit uns auf!<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-leadin-hubspot-form-block\">\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 9016142,\n\t\t\t\t\t\t\t\t\tformId: \"4ea2d01c-3206-425b-af3d-0170bbe98ff5\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1777453712000-8361605696\",\n\t\t\t\t\t\t\t\t\tregion: \"eu1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1777453712000-8361605696\"><\/div><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Warum reden pl\u00f6tzlich alle \u00fcber Cybersecurity? Und vor allem: Was hat das mit dir pers\u00f6nlich zu tun? Die kurze Antwort: Cybersecurity ist deine digitale Sicherheit. Doch was bedeutet das konkret? Cybersecurity einfach erkl\u00e4rt Cybersecurity umfasst alle Ma\u00dfnahmen, die Computer, Netzwerke und Daten vor Angriffen, Missbrauch oder Zerst\u00f6rung sch\u00fctzen. Stell dir vor, dein Computer oder Smartphone [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":26130,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[484,489],"tags":[526,527,525,524,523,528],"custom_format":[516],"class_list":["post-26072","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advens-inside-de","category-cyber-news-de","tag-cybersecurity","tag-erste-hile-gehackt","tag-gehackt","tag-ich-wurde-gehackt","tag-was-ist-cybersecurity","tag-wurde-ich-gehackt"],"acf":[],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Was ist eigentlich Cybersecurity? - Advens<\/title>\n<meta name=\"description\" content=\"Cybersecurity sch\u00fctzt Computer &amp; Netzwerke. Erfahre, wie du dich absicherst und was zu tun ist, wenn es bereits zu sp\u00e4t scheint.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Was ist eigentlich Cybersecurity? - Advens\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity sch\u00fctzt Computer &amp; Netzwerke. Erfahre, wie du dich absicherst und was zu tun ist, wenn es bereits zu sp\u00e4t scheint.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-26T07:36:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-27T13:47:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1463\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandra Mueller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/\"},\"author\":{\"name\":\"Alexandra Mueller\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/b316ffa58318acdbaeb6375b1bb9736b\"},\"headline\":\"Was ist eigentlich Cybersecurity?\",\"datePublished\":\"2025-08-26T07:36:15+00:00\",\"dateModified\":\"2025-10-27T13:47:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/\"},\"wordCount\":538,\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg\",\"keywords\":[\"cybersecurity\",\"Erste Hile gehackt\",\"gehackt\",\"ich wurde gehackt\",\"was ist Cybersecurity\",\"wurde ich gehackt\"],\"articleSection\":[\"Advens Inside\",\"Cyber News\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/\",\"url\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/\",\"name\":\"Was ist eigentlich Cybersecurity? - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg\",\"datePublished\":\"2025-08-26T07:36:15+00:00\",\"dateModified\":\"2025-10-27T13:47:47+00:00\",\"description\":\"Cybersecurity sch\u00fctzt Computer & Netzwerke. Erfahre, wie du dich absicherst und was zu tun ist, wenn es bereits zu sp\u00e4t scheint.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#primaryimage\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg\",\"width\":2560,\"height\":1463},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Advens Inside\",\"item\":\"https:\/\/www.advens.com\/de\/kategorie\/advens-inside-de\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Was ist eigentlich Cybersecurity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.com\/#website\",\"url\":\"https:\/\/www.advens.com\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.com\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/b316ffa58318acdbaeb6375b1bb9736b\",\"name\":\"Alexandra Mueller\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b2b455ca051d4dd21d021d91c9f21c65?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b2b455ca051d4dd21d021d91c9f21c65?s=96&d=mm&r=g\",\"caption\":\"Alexandra Mueller\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Was ist eigentlich Cybersecurity? - Advens","description":"Cybersecurity sch\u00fctzt Computer & Netzwerke. Erfahre, wie du dich absicherst und was zu tun ist, wenn es bereits zu sp\u00e4t scheint.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/","og_locale":"de_DE","og_type":"article","og_title":"Was ist eigentlich Cybersecurity? - Advens","og_description":"Cybersecurity sch\u00fctzt Computer & Netzwerke. Erfahre, wie du dich absicherst und was zu tun ist, wenn es bereits zu sp\u00e4t scheint.","og_url":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/","og_site_name":"Advens","article_published_time":"2025-08-26T07:36:15+00:00","article_modified_time":"2025-10-27T13:47:47+00:00","og_image":[{"width":2560,"height":1463,"url":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg","type":"image\/jpeg"}],"author":"Alexandra Mueller","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#article","isPartOf":{"@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/"},"author":{"name":"Alexandra Mueller","@id":"https:\/\/www.advens.com\/#\/schema\/person\/b316ffa58318acdbaeb6375b1bb9736b"},"headline":"Was ist eigentlich Cybersecurity?","datePublished":"2025-08-26T07:36:15+00:00","dateModified":"2025-10-27T13:47:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/"},"wordCount":538,"publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"image":{"@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg","keywords":["cybersecurity","Erste Hile gehackt","gehackt","ich wurde gehackt","was ist Cybersecurity","wurde ich gehackt"],"articleSection":["Advens Inside","Cyber News"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/","url":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/","name":"Was ist eigentlich Cybersecurity? - Advens","isPartOf":{"@id":"https:\/\/www.advens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg","datePublished":"2025-08-26T07:36:15+00:00","dateModified":"2025-10-27T13:47:47+00:00","description":"Cybersecurity sch\u00fctzt Computer & Netzwerke. Erfahre, wie du dich absicherst und was zu tun ist, wenn es bereits zu sp\u00e4t scheint.","breadcrumb":{"@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#primaryimage","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg","width":2560,"height":1463},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.com\/media\/advens-inside-de\/was-ist-cybersecurity-beginner\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.com\/de\/"},{"@type":"ListItem","position":2,"name":"Advens Inside","item":"https:\/\/www.advens.com\/de\/kategorie\/advens-inside-de\/"},{"@type":"ListItem","position":3,"name":"Was ist eigentlich Cybersecurity?"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.com\/#website","url":"https:\/\/www.advens.com\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.advens.com\/#organization","name":"Advens","url":"https:\/\/www.advens.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.com\/#\/schema\/person\/b316ffa58318acdbaeb6375b1bb9736b","name":"Alexandra Mueller","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b2b455ca051d4dd21d021d91c9f21c65?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b2b455ca051d4dd21d021d91c9f21c65?s=96&d=mm&r=g","caption":"Alexandra Mueller"}}]}},"featured_url":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/abstrakte-konzeption-des-cybersicherheitskonzepts-scaled.jpg","_links":{"self":[{"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/posts\/26072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/comments?post=26072"}],"version-history":[{"count":48,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/posts\/26072\/revisions"}],"predecessor-version":[{"id":26135,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/posts\/26072\/revisions\/26135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/media\/26130"}],"wp:attachment":[{"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/media?parent=26072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/categories?post=26072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/tags?post=26072"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/custom_format?post=26072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}