{"id":28589,"date":"2025-08-29T16:29:56","date_gmt":"2025-08-29T14:29:56","guid":{"rendered":"https:\/\/www.advens.com\/?p=28589"},"modified":"2025-11-12T16:53:28","modified_gmt":"2025-11-12T15:53:28","slug":"back-to-school-the-cybersecurity-survival-guide","status":"publish","type":"post","link":"https:\/\/www.advens.com\/de\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/","title":{"rendered":"Back to School &#8211; THE CYBERSECURITY SURVIVAL GUIDE"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Back to School \u2013 und wie man dabei nicht in einer Black-Mirror-Folge landet \ud83c\udfac<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>Neues Semester, neues Gl\u00fcck: neuer Campus, neue Freundschaften, neue Entdeckungen \u2026 und leider auch: neue Cyberrisiken!<br>Keine Sorge! Wir wollen euch nicht ver\u00e4ngstigen, sondern euch zeigen, wie ihr euer digitales Leben entspannt und sicher gestalten k\u00f6nnt.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Stellt euch vor: Ihr wacht auf, und alle eure Dateien sind verschwunden, ersetzt durch eine L\u00f6segeldforderung.<br>Euer Instagram-Profil postet pl\u00f6tzlich peinliche Fotos, die ihr nie gemacht habt.<br>Euer Bankkonto ist leer, weil ihr auf einem fragw\u00fcrdigen WLAN eine Fake-Banking-App heruntergeladen habt.<br>Klingt nach einer Black-Mirror-Folge? Zum Gl\u00fcck lassen sich solche digitalen Albtr\u00e4ume im echten Leben leicht verhindern.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Kostenloses WLAN = kostenloses Risiko?<\/h3>\n\n\n\n<p>Nicht unbedingt!<br>Das Campus-WLAN klingt verlockend: unbegrenzt surfen, lernen, streamen. <\/p>\n\n\n\n<p>Aber Achtung: Nicht jeder Hotspot ist so harmlos, wie er aussieht.<\/p>\n\n\n\n<p><strong>Die Risiken:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Datendiebstahl auf ungesicherten Netzwerken<\/li>\n\n\n\n<li>\u201eEvil Twins\u201c: gef\u00e4lschte WLANs, die wie das echte Campus-Netz aussehen<\/li>\n\n\n\n<li>Passwort- oder Kontodatenklau<\/li>\n<\/ul>\n\n\n\n<p><strong>So sch\u00fctzt ihr euch:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nutzt ausschlie\u00dflich das offizielle Campus-WLAN (mit Studierenden-Login)<\/li>\n\n\n\n<li>Aktiviert einen kostenlosen VPN (z. B. Proton VPN oder Windscribe)<\/li>\n\n\n\n<li>Vermeidet Onlinek\u00e4ufe und Banking im \u00f6ffentlichen WLAN<\/li>\n\n\n\n<li>Finger weg von Netzwerken wie \u201eWiFi_Gratis_Campus\u201c ohne Anmeldung<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Laptop futsch = Semester futsch?<\/h3>\n\n\n\n<p>Euer Laptop ist euer treuester Begleiter \u2013 Lernhilfe, Datenspeicher, Lebensinhalt in 1,5 kg Aluminium.<br>Klar, physischer Schutz ist wichtig \u2013 aber digitaler Schutz ist noch wichtiger.<\/p>\n\n\n\n<p><strong>So bleibt euer Laptop sicher:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Festplattenverschl\u00fcsselung aktivieren (BitLocker auf Windows, FileVault auf Mac)<\/li>\n\n\n\n<li>Starkes Passwort f\u00fcr den Benutzerzugang<\/li>\n\n\n\n<li>Automatische Cloud-Backups (OneDrive, Google Drive, iCloud)<\/li>\n\n\n\n<li>Ger\u00e4teortung aktivieren (\u201eFind My\u201c &amp; Co.)<\/li>\n\n\n\n<li>Keine Passw\u00f6rter oder sensiblen Daten unverschl\u00fcsselt speichern<\/li>\n<\/ul>\n\n\n\n<p>\ud83d\udca1 <strong>Extra-Tipp:<\/strong><br>Ein Aufkleber \u201eProperty of [Dein Name]\u201c mit eurer Hochschul-Mailadresse hilft, wenn ihr euer Laptop mal im H\u00f6rsaal vergesst.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">K\u00fcnstliche Intelligenz: genialer Helfer oder heimt\u00fcckischer T\u00e4uscher?<\/h3>\n\n\n\n<p>ChatGPT, Copilot, Gemini \u2013 KI ist l\u00e4ngst im Studium angekommen. Aber wie Spider-Man schon sagte: <em>\u201eMit gro\u00dfer Macht kommt gro\u00dfe Verantwortung.\u201c<\/em><\/p>\n\n\n\n<p><strong>Achtet auf Urheberrecht:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Kein Copy-Paste aus KI-Texten in Hausarbeiten<\/li>\n\n\n\n<li>Richtlinien eurer Hochschule pr\u00fcfen<\/li>\n\n\n\n<li>Quellen immer korrekt angeben \u2013 auch bei KI-Inhalten<\/li>\n\n\n\n<li>Nutzt KI als Unterst\u00fctzung, nicht als Ghostwriter<\/li>\n<\/ul>\n\n\n\n<p><strong>Vorsicht bei Fehlinformationen:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>KI kann Fakten, Zitate oder Quellen erfinden<\/li>\n\n\n\n<li>Pr\u00fcft Infos immer gegen seri\u00f6se Quellen<\/li>\n\n\n\n<li>Verifiziert Aussagen \u00fcber mehrere Quellen hinweg<\/li>\n\n\n\n<li>Und denkt kritisch: Wenn\u2019s zu sch\u00f6n klingt, um wahr zu sein\u2026 ist es das meist auch<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Social Media: Dein k\u00fcnftiger Arbeitgeber scrollt mit <\/h3>\n\n\n\n<p>Instagram, TikTok, LinkedIn \u2013 euer digitaler Auftritt ist eure pers\u00f6nliche Visitenkarte. Und anders als euer Studenten-Zimmer wird sie <em>definitiv<\/em> gesehen.<\/p>\n\n\n\n<p><strong>Goldene Regeln f\u00fcr digitale Privatsph\u00e4re:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Datenschutzeinstellungen auf Maximum<\/li>\n\n\n\n<li>Zweimal \u00fcberlegen, bevor ihr etwas postet<\/li>\n\n\n\n<li>Privates und Berufliches trennen (am besten mit getrennten Accounts)<\/li>\n\n\n\n<li>Partyfotos? Die tauchen garantiert <em>immer<\/em> im falschen Moment wieder auf<\/li>\n\n\n\n<li>Googelt euch regelm\u00e4\u00dfig selbst \u2013 was erscheint \u00fcber euch?<\/li>\n\n\n\n<li>Der \u201eChef-Test\u201c: W\u00fcrdet ihr wollen, dass euer zuk\u00fcnftiger Arbeitgeber das sieht? Wenn nicht \u2013 lieber nicht posten.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Fazit: Cybersicherheit ist wie Sport<\/h3>\n\n\n\n<p>Am Anfang kostet\u2019s ein bisschen \u00dcberwindung, aber sobald ihr im Rhythmus seid, l\u00e4uft\u2019s von selbst.<br>Und anders als die 8-Uhr-Vorlesung zahlt sich das wirklich f\u00fcrs Leben aus!<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Die Must-haves f\u00fcr digitale Sicherheit im Studium <\/h3>\n\n\n\n<p><strong>\ud83d\udd10 Passwortmanager:<\/strong><br>Schluss mit <em>\u201epasswort123\u201c<\/em> oder Post-its auf dem Bildschirm!<br>Nutzt Tools wie <strong>Bitwarden<\/strong> (gratis &amp; top) oder <strong>KeePass<\/strong> (open source &amp; super sicher).<br>Sie erstellen komplexe Passw\u00f6rter und speichern sie verschl\u00fcsselt \u2013 ihr m\u00fcsst euch nur noch eins merken.<\/p>\n\n\n\n<p><strong>\ud83d\udcf1 Zwei-Faktor-Authentifizierung (MFA):<\/strong><br>Aktiviert sie \u00fcberall, vor allem auf Social Media!<br>Selbst wenn jemand euer Passwort kennt, kommt er ohne euer Handy nicht rein.<br>Das ist wie ein zweites Schloss an eurer Wohnungst\u00fcr.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Die 5 Gebote des cyber-sicheren Studis \ud83e\udde0<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Du sollst einen Passwortmanager nutzen<\/li>\n\n\n\n<li>Du sollst MFA \u00fcberall aktivieren<\/li>\n\n\n\n<li>Du sollst deine Daten sichern und verschl\u00fcsseln<\/li>\n\n\n\n<li>Du sollst KI nutzen \u2013 aber stets \u00fcberpr\u00fcfen<\/li>\n\n\n\n<li>Du sollst \u00f6ffentliches WLAN nur mit VPN verwenden<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Cybersicherheit ist keine Angelegenheit von Anzugtr\u00e4gern in klimatisierten B\u00fcros \u2013 sie betrifft uns alle, jeden Tag.<br>Also: Gew\u00f6hnt euch gute Sicherheitsroutinen an, schon jetzt im Studium.<br>Euer zuk\u00fcnftiges Ich wird es euch danken!<\/p>\n\n\n\n<p>\ud83d\udcac <strong>Mehr erfahren?<\/strong><br>Das Team von <strong>Advens<\/strong> unterst\u00fctzt Unternehmen bei ihrer digitalen Sicherheit.<br>Und wer wei\u00df \u2013 vielleicht bist du ja eines Tages Teil dieses spannenden Abenteuers. \ud83d\ude80<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back to School \u2013 und wie man dabei nicht in einer Black-Mirror-Folge landet \ud83c\udfac Neues Semester, neues Gl\u00fcck: neuer Campus, neue Freundschaften, neue Entdeckungen \u2026 und leider auch: neue Cyberrisiken!Keine Sorge! Wir wollen euch nicht ver\u00e4ngstigen, sondern euch zeigen, wie ihr euer digitales Leben entspannt und sicher gestalten k\u00f6nnt. Stellt euch vor: Ihr wacht auf, [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":26150,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[490],"tags":[],"custom_format":[],"class_list":["post-28589","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-strategy-de"],"acf":[],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Back to School - THE CYBERSECURITY SURVIVAL GUIDE - Advens<\/title>\n<meta name=\"description\" content=\"Back to School \u2013 und wie man dabei nicht in einer Black-Mirror-Folge landet \ud83c\udfac Neues Semester, neues Gl\u00fcck: neuer Campus, neue Freundschaften, neue\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Back to School - THE CYBERSECURITY SURVIVAL GUIDE - Advens\" \/>\n<meta property=\"og:description\" content=\"Back to School \u2013 und wie man dabei nicht in einer Black-Mirror-Folge landet \ud83c\udfac Neues Semester, neues Gl\u00fcck: neuer Campus, neue Freundschaften, neue\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-29T14:29:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-12T15:53:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandra Mueller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/\"},\"author\":{\"name\":\"Alexandra Mueller\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/b316ffa58318acdbaeb6375b1bb9736b\"},\"headline\":\"Back to School &#8211; THE CYBERSECURITY SURVIVAL GUIDE\",\"datePublished\":\"2025-08-29T14:29:56+00:00\",\"dateModified\":\"2025-11-12T15:53:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/\"},\"wordCount\":708,\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg\",\"articleSection\":[\"Cyber Strategy\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/\",\"url\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/\",\"name\":\"Back to School - THE CYBERSECURITY SURVIVAL GUIDE - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg\",\"datePublished\":\"2025-08-29T14:29:56+00:00\",\"dateModified\":\"2025-11-12T15:53:28+00:00\",\"description\":\"Back to School \u2013 und wie man dabei nicht in einer Black-Mirror-Folge landet \ud83c\udfac Neues Semester, neues Gl\u00fcck: neuer Campus, neue Freundschaften, neue\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#primaryimage\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg\",\"width\":2560,\"height\":1709,\"caption\":\"Le guide de sensibilisation cybers\u00e9curit\u00e9 pour \u00e9tudiants\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risque et Strat\u00e9gie\",\"item\":\"https:\/\/www.advens.com\/media\/risque-strategie\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Back to School &#8211; THE CYBERSECURITY SURVIVAL GUIDE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.com\/#website\",\"url\":\"https:\/\/www.advens.com\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.com\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/b316ffa58318acdbaeb6375b1bb9736b\",\"name\":\"Alexandra Mueller\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b2b455ca051d4dd21d021d91c9f21c65?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b2b455ca051d4dd21d021d91c9f21c65?s=96&d=mm&r=g\",\"caption\":\"Alexandra Mueller\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Back to School - THE CYBERSECURITY SURVIVAL GUIDE - Advens","description":"Back to School \u2013 und wie man dabei nicht in einer Black-Mirror-Folge landet \ud83c\udfac Neues Semester, neues Gl\u00fcck: neuer Campus, neue Freundschaften, neue","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/","og_locale":"de_DE","og_type":"article","og_title":"Back to School - THE CYBERSECURITY SURVIVAL GUIDE - Advens","og_description":"Back to School \u2013 und wie man dabei nicht in einer Black-Mirror-Folge landet \ud83c\udfac Neues Semester, neues Gl\u00fcck: neuer Campus, neue Freundschaften, neue","og_url":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/","og_site_name":"Advens","article_published_time":"2025-08-29T14:29:56+00:00","article_modified_time":"2025-11-12T15:53:28+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg","type":"image\/jpeg"}],"author":"Alexandra Mueller","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#article","isPartOf":{"@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/"},"author":{"name":"Alexandra Mueller","@id":"https:\/\/www.advens.com\/#\/schema\/person\/b316ffa58318acdbaeb6375b1bb9736b"},"headline":"Back to School &#8211; THE CYBERSECURITY SURVIVAL GUIDE","datePublished":"2025-08-29T14:29:56+00:00","dateModified":"2025-11-12T15:53:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/"},"wordCount":708,"publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"image":{"@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg","articleSection":["Cyber Strategy"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/","url":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/","name":"Back to School - THE CYBERSECURITY SURVIVAL GUIDE - Advens","isPartOf":{"@id":"https:\/\/www.advens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg","datePublished":"2025-08-29T14:29:56+00:00","dateModified":"2025-11-12T15:53:28+00:00","description":"Back to School \u2013 und wie man dabei nicht in einer Black-Mirror-Folge landet \ud83c\udfac Neues Semester, neues Gl\u00fcck: neuer Campus, neue Freundschaften, neue","breadcrumb":{"@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#primaryimage","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg","width":2560,"height":1709,"caption":"Le guide de sensibilisation cybers\u00e9curit\u00e9 pour \u00e9tudiants"},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.com\/media\/cyber-strategy-de\/back-to-school-the-cybersecurity-survival-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.com\/de\/"},{"@type":"ListItem","position":2,"name":"Risque et Strat\u00e9gie","item":"https:\/\/www.advens.com\/media\/risque-strategie\/"},{"@type":"ListItem","position":3,"name":"Back to School &#8211; THE CYBERSECURITY SURVIVAL GUIDE"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.com\/#website","url":"https:\/\/www.advens.com\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.advens.com\/#organization","name":"Advens","url":"https:\/\/www.advens.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.com\/#\/schema\/person\/b316ffa58318acdbaeb6375b1bb9736b","name":"Alexandra Mueller","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b2b455ca051d4dd21d021d91c9f21c65?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b2b455ca051d4dd21d021d91c9f21c65?s=96&d=mm&r=g","caption":"Alexandra Mueller"}}]}},"featured_url":"https:\/\/www.advens.com\/app\/uploads\/2025\/08\/Student-scaled.jpg","_links":{"self":[{"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/posts\/28589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/comments?post=28589"}],"version-history":[{"count":5,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/posts\/28589\/revisions"}],"predecessor-version":[{"id":28614,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/posts\/28589\/revisions\/28614"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/media\/26150"}],"wp:attachment":[{"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/media?parent=28589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/categories?post=28589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/tags?post=28589"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.advens.com\/de\/wp-json\/wp\/v2\/custom_format?post=28589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}