{"id":50360,"date":"2018-10-18T12:03:48","date_gmt":"2018-10-18T10:03:48","guid":{"rendered":"https:\/\/www.retarus.com\/at\/protect-your-company-now\/"},"modified":"2024-04-30T22:14:12","modified_gmt":"2024-04-30T20:14:12","slug":"protect-your-company-now","status":"publish","type":"lp","link":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/","title":{"rendered":"Protect your company. Now."},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"Die 10 peinlichsten E-Mail Security Pannen! Nr. 10: Komplette IT-Infrastruktur von Hackern lahmgelegt. Zwangsurlaub f\u00fcr alle. Sch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker mit Retarus Advanced…","protected":false},"author":3,"featured_media":39685,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"[et_pb_section bb_built=\"1\" fullwidth=\"off\" specialty=\"off\" _builder_version=\"3.0.105\" custom_padding=\"|-110px||\" custom_padding_tablet=\"50px||50px|\" custom_padding_last_edited=\"on|desktop\" module_id=\"email-sec-lp\"][et_pb_row _builder_version=\"3.0.105\" custom_css_after_1=\"#post-40322 .et_pb_section .et_pb_column_1_3{ margin-right: 0; }\"][et_pb_column type=\"4_4\"][et_pb_divider _builder_version=\"3.0.105\" \/][et_pb_text admin_label=\"Die 10 peinlichsten E-Mail Security Pannen\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Die 10 peinlichsten E-Mail Security Pannen<\/h1>\r\n\r\n[\/et_pb_text][et_pb_image admin_label=\"Header Image\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/10-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#10\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#10\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Der CSO hat die Ransomware\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Der CSO hat die Ransomware im Anhang ge\u00f6ffnet.\r\nAlle Rechner gelocked.<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"Kann jedem mal passieren\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nKann jedem mal passieren, darf es aber nicht. Verhindern Sie deshalb solche erpresserischen Angriffe von Anfang an. Zum Beispiel mit dem Retarus Attachment Blocker<\/a>, der das \u00d6ffnen zuvor definierter Anh\u00e4nge unterbindet. Wie das genau funktioniert, erfahren Sie hier<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\"][et_pb_column type=\"4_4\"][et_pb_image admin_label=\"9\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/9-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#9\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#9\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Chef-Trick\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Der CFO ist auf den \u201eChef-Trick\u201d reingefallen.\r\n20 Tausend Tacken futsch.<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"Kein Wunder!\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nKein Wunder! Spear-Phishing Angreifer sammeln gezielt Informationen \u00fcber ihre Opfer, um sie dann per E-Mail zum Geldtransfer zu bewegen. Retarus CxO Fraud Detection<\/a> erkennt gef\u00e4lschte Absenderadressen und quarant\u00e4niert solche betr\u00fcgerischen Nachrichten. Wie das genau funktioniert, erfahren Sie hier<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_image admin_label=\"8\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/8-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#8\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#8\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Admin\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Der Admin hielt einen Virenscanner f\u00fcr ausreichend.\r\nAlle Rechner infiziert.<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"Rund 270 neue Virenvarianten\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nPro Minute entstehen inzwischen rund 270 neue Virenvarianten. Deshalb lohnt es sich, eingehende Nachrichten mit allen zur Verf\u00fcgung stehenden Mitteln zu pr\u00fcfen. Retarus AntiVirus MultiScan<\/a> erzielt deutlich h\u00f6here Erkennungsraten als herk\u00f6mmliche Scanner. Au\u00dferdem sch\u00fctzen bis zu vier Virenscanner und heuristische Analysen auch vor bislang unbekannten Schadprogrammen. Wie das genau funktioniert, erfahren Sie hier<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_image admin_label=\"7\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/7-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#7\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#7\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Scanner\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Trotz Scanner gelangte ein Virus ins Netzwerk.\r\nEin Jahr sp\u00e4ter brach er aus.<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"Schadprogramme\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nBrandneue Schadprogramme sind auch den besten Virenscannern zun\u00e4chst unbekannt. Deshalb untersucht Retarus Postdelivery Protection<\/a> f\u00fcr Sie auch bereits zugestellte E-Mails auf Malware und Phishing-Links. Dank dieser zum Patent angemeldeten Technologie k\u00f6nnen Abwehrma\u00dfnahmen ergriffen werden, bevor es zu sp\u00e4t ist. Wie das genau funktioniert, erfahren Sie hier<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_image admin_label=\"6\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/6-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#6\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#6\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Kunden fl\u00f6ten\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Erst gingen die Kundendaten fl\u00f6ten.\r\nDanach die Kunden.<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"Datenbanken\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nDurch Phishing verschaffen sich Hacker Zugriff auf Datenbanken mit pers\u00f6nlichen Zugangsdaten. Unterbinden Sie deshalb den direkten Aufruf von nicht vertrauensw\u00fcrdigen Seiten. Mit Retarus Time-of-Click Protection<\/a> werden Phishing-Websites blockiert und Ihre User beim Anklicken gef\u00e4hrlicher Links gewarnt. Wie das genau funktioniert, erfahren Sie hier<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_image admin_label=\"5\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/5-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#5\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#5\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Hackern\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Komplette IT-Infrastruktur von Hackern lahmgelegt.\r\nSonderurlaub f\u00fcr all<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"ATP\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nSch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker. Mit Retarus Advanced Threat Protection<\/a> werden verd\u00e4chtige Dateien in Anh\u00e4ngen in einer virtuellen Maschine ausgef\u00fchrt und auf ungew\u00f6hnliches Verhalten \u00fcberpr\u00fcft. Nach diesem Sandboxing werden als infiziert erkannte E-Mails gel\u00f6scht oder in Quarant\u00e4ne verschoben. Wie das genau funktioniert, erfahren Sie hier<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_image admin_label=\"4\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/4-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#4\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#4\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Top Secret\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Der Konstruktionsplan war Top Secret.\r\nJetzt hat ihn der Wettbewerb.<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"DLP\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nDer Verlust von Pl\u00e4nen oder Vertragsunterlagen kann f\u00fcr Unternehmen existenzgef\u00e4hrdend sein. Retarus Data Loss Prevention<\/a> verhindert, dass vertrauliche Informationen wie z.B. Kunden-, Produktions- oder Konstruktionsdaten ungewollt aus Ihrem Firmennetzwerk gelangen. Wie das genau funktioniert, erfahren Sie hier<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_image admin_label=\"3\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/3-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#3\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#3\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Einkaufchef\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Der Einkaufschef wurde durch Phishing gelinkt.\r\nFirmenkonto leerger\u00e4umt.<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"Phishing\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nDurch Phishing verschaffen sich Hacker Zugriff auf pers\u00f6nliche Zugangsdaten. Unterbinden Sie deshalb den direkten Aufruf von nicht vertrauensw\u00fcrdigen Seiten. Mit Retarus Time-of-Click Protection<\/a> werden Phishing-Websites blockiert und Ihre User beim Anklicken gef\u00e4hrlicher Links gewarnt. Wie das genau funktioniert, erfahren Sie hier<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_image admin_label=\"2\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/2-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#2\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#2\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Asian Office\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

Jemand hat geheime Daten ans Asian Office gesendet.\r\nEs gibt gar kein Asian Office.<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"Domain-Spoofing\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nBeim Phishing gaukeln Betr\u00fcger vertrauensw\u00fcrdige Identit\u00e4ten vor, um an Daten zu gelangen. Verhindern Sie mit Retarus Advanced Threat Protection<\/a> zuverl\u00e4ssig, dass Ihre User darauf hereinfallen. Spezielle Algorithmen, identifizieren \u201eFrom-Spoofing\u201c und \u201eDomain-Spoofing\u201c und erkennen so gef\u00e4lschte Absenderadressen. Fake E-Mails werden direkt gel\u00f6scht oder in Quarant\u00e4ne verschoben. Wie das genau funktioniert, erfahren Sie hier<\/a>.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_image admin_label=\"1\" _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/1-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"3.0.105\" custom_padding_last_edited=\"off|phone\" padding_left_2=\"50px\" padding_2_last_edited=\"on|phone\" padding_2_phone=\"|||0px\"][et_pb_column type=\"1_3\"][et_pb_text admin_label=\"#1\" _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\" module_class=\"email-sec-lp-count\"]\r\n\r\n#1\r\n\r\n[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\"][et_pb_text admin_label=\"Datenklau\" _builder_version=\"3.0.105\" background_layout=\"light\"]\r\n\r\n

F\u00fcr hundert Mille Datenklau vertuscht.\r\nPresse gabs trotzdem.<\/h2>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"Email Infrastruktur\" _builder_version=\"3.0.105\" background_layout=\"light\" text_font_size=\"18px\" module_class=\"cc-seccomp email-sec-lp-text\"]\r\n\r\nEs gibt viele Gr\u00fcnde das Schutzniveau Ihrer E-Mail-Infrastruktur zu erh\u00f6hen. Viele davon kann man erst wirklich nachvollziehen, wenn es schon zu sp\u00e4t ist. Mit den innovativen Retarus E-Mail Security Services<\/a> tun Sie alles daf\u00fcr, dass es gar nicht erst so weit kommt. Entdecken Sie hier<\/a> genau das Angebotspaket, das zum individuellen Sicherheitsbedarf Ihres Unternehmens passt.\r\n\r\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_image _builder_version=\"3.0.105\" src=\"https:\/\/www.retarus.com\/de\/wp-content\/uploads\/sites\/2\/2018\/03\/0-email-fails.jpg\" show_in_lightbox=\"off\" url_new_window=\"off\" use_overlay=\"off\" always_center_on_mobile=\"on\" force_fullwidth=\"off\" show_bottom_space=\"on\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][et_pb_row][et_pb_column type=\"4_4\"][et_pb_text _builder_version=\"3.0.105\" background_layout=\"light\" text_text_color=\"#16a086\"]\r\n\r\nSch\u00fctzen Sie Ihr Unternehmen:<\/span>\r\n\r\n[\/et_pb_text][et_pb_text admin_label=\"Contact Form\" background_layout=\"dark\" use_border_color=\"off\" background_position=\"top_left\" background_repeat=\"repeat\" background_size=\"initial\" module_alignment=\"left\" _builder_version=\"3.0.105\"]\r\n\r\n[gravityform id=\"22\" title=\"false\" description=\"false\" ajax=\"true\"]\r\n\r\n[\/et_pb_text][et_pb_divider color=\"#ffffff\" show_divider=\"off\" height=\"10\" divider_style=\"solid\" divider_position=\"top\" hide_on_mobile=\"on\" disabled_on=\"on|on|off\" \/][et_pb_divider _builder_version=\"3.0.105\" \/][\/et_pb_column][\/et_pb_row][\/et_pb_section]","_et_gb_content_width":"","footnotes":""},"categories":[1331,2,1],"tags":[],"acf":[],"yoast_head":"\nProtect your Company - Email Security von Retarus - Retarus \u00d6sterreich<\/title>\n<meta name=\"description\" content=\"Die 10 peinlichsten E-Mail Security Pannen! Nr. 10: Komplette IT-Infrastruktur von Hackern lahmgelegt. Zwangsurlaub f\u00fcr alle. Sch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker mit Retarus Advanced Threat Protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect your Company - Email Security von Retarus\" \/>\n<meta property=\"og:description\" content=\"Die 10 peinlichsten E-Mail Security Pannen! Nr. 10: Komplette IT-Infrastruktur von Hackern lahmgelegt. Zwangsurlaub f\u00fcr alle. Sch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker mit Retarus Advanced Threat Protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/\" \/>\n<meta property=\"og:site_name\" content=\"Retarus \u00d6sterreich\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/retarus\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-30T20:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.retarus.com\/at\/wp-content\/uploads\/sites\/5\/2018\/03\/5-email-fails.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Protect your Company - Email Security von Retarus\" \/>\n<meta name=\"twitter:description\" content=\"Die 10 peinlichsten E-Mail Security Pannen! Nr. 10: Komplette IT-Infrastruktur von Hackern lahmgelegt. Zwangsurlaub f\u00fcr alle. Sch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker mit Retarus Advanced Threat Protection.\" \/>\n<meta name=\"twitter:site\" content=\"@retarus\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/\",\"url\":\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/\",\"name\":\"Protect your Company - Email Security von Retarus - Retarus \u00d6sterreich\",\"isPartOf\":{\"@id\":\"https:\/\/www.retarus.com\/at\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.retarus.com\/at\/wp-content\/uploads\/sites\/5\/2018\/03\/5-email-fails.jpg\",\"datePublished\":\"2018-10-18T10:03:48+00:00\",\"dateModified\":\"2024-04-30T20:14:12+00:00\",\"description\":\"Die 10 peinlichsten E-Mail Security Pannen! Nr. 10: Komplette IT-Infrastruktur von Hackern lahmgelegt. Zwangsurlaub f\u00fcr alle. Sch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker mit Retarus Advanced Threat Protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#breadcrumb\"},\"inLanguage\":\"de-AT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-AT\",\"@id\":\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#primaryimage\",\"url\":\"https:\/\/www.retarus.com\/at\/wp-content\/uploads\/sites\/5\/2018\/03\/5-email-fails.jpg\",\"contentUrl\":\"https:\/\/www.retarus.com\/at\/wp-content\/uploads\/sites\/5\/2018\/03\/5-email-fails.jpg\",\"width\":1250,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.retarus.com\/at\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect your company. Now.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.retarus.com\/at\/#website\",\"url\":\"https:\/\/www.retarus.com\/at\/\",\"name\":\"Retarus \u00d6sterreich\",\"description\":\"Just another Retarus Global Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.retarus.com\/at\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-AT\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protect your Company - Email Security von Retarus - Retarus \u00d6sterreich","description":"Die 10 peinlichsten E-Mail Security Pannen! Nr. 10: Komplette IT-Infrastruktur von Hackern lahmgelegt. Zwangsurlaub f\u00fcr alle. Sch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker mit Retarus Advanced Threat Protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/","og_locale":"de_DE","og_type":"article","og_title":"Protect your Company - Email Security von Retarus","og_description":"Die 10 peinlichsten E-Mail Security Pannen! Nr. 10: Komplette IT-Infrastruktur von Hackern lahmgelegt. Zwangsurlaub f\u00fcr alle. Sch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker mit Retarus Advanced Threat Protection.","og_url":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/","og_site_name":"Retarus \u00d6sterreich","article_publisher":"https:\/\/www.facebook.com\/retarus","article_modified_time":"2024-04-30T20:14:12+00:00","og_image":[{"url":"https:\/\/www.retarus.com\/at\/wp-content\/uploads\/sites\/5\/2018\/03\/5-email-fails.jpg"}],"twitter_card":"summary_large_image","twitter_title":"Protect your Company - Email Security von Retarus","twitter_description":"Die 10 peinlichsten E-Mail Security Pannen! Nr. 10: Komplette IT-Infrastruktur von Hackern lahmgelegt. Zwangsurlaub f\u00fcr alle. Sch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker mit Retarus Advanced Threat Protection.","twitter_site":"@retarus","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"9 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/","url":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/","name":"Protect your Company - Email Security von Retarus - Retarus \u00d6sterreich","isPartOf":{"@id":"https:\/\/www.retarus.com\/at\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#primaryimage"},"image":{"@id":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#primaryimage"},"thumbnailUrl":"https:\/\/www.retarus.com\/at\/wp-content\/uploads\/sites\/5\/2018\/03\/5-email-fails.jpg","datePublished":"2018-10-18T10:03:48+00:00","dateModified":"2024-04-30T20:14:12+00:00","description":"Die 10 peinlichsten E-Mail Security Pannen! Nr. 10: Komplette IT-Infrastruktur von Hackern lahmgelegt. Zwangsurlaub f\u00fcr alle. Sch\u00fctzen Sie Ihre IT vor den immer intelligenteren Schadroutinen der Hacker mit Retarus Advanced Threat Protection.","breadcrumb":{"@id":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#breadcrumb"},"inLanguage":"de-AT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/"]}]},{"@type":"ImageObject","inLanguage":"de-AT","@id":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#primaryimage","url":"https:\/\/www.retarus.com\/at\/wp-content\/uploads\/sites\/5\/2018\/03\/5-email-fails.jpg","contentUrl":"https:\/\/www.retarus.com\/at\/wp-content\/uploads\/sites\/5\/2018\/03\/5-email-fails.jpg","width":1250,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.retarus.com\/at\/lp\/protect-your-company-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.retarus.com\/at\/"},{"@type":"ListItem","position":2,"name":"Protect your company. Now."}]},{"@type":"WebSite","@id":"https:\/\/www.retarus.com\/at\/#website","url":"https:\/\/www.retarus.com\/at\/","name":"Retarus \u00d6sterreich","description":"Just another Retarus Global Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.retarus.com\/at\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-AT"}]}},"_links":{"self":[{"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/lp\/50360"}],"collection":[{"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/lp"}],"about":[{"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/types\/lp"}],"author":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/comments?post=50360"}],"version-history":[{"count":20,"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/lp\/50360\/revisions"}],"predecessor-version":[{"id":67504,"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/lp\/50360\/revisions\/67504"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/media\/39685"}],"wp:attachment":[{"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/media?parent=50360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/categories?post=50360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.retarus.com\/at\/wp-json\/wp\/v2\/tags?post=50360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}