{"id":5813,"date":"2023-06-01T15:59:35","date_gmt":"2023-06-01T13:59:35","guid":{"rendered":"https:\/\/www.loidl-consulting.at\/nicciTest\/wordpress6\/?page_id=5813"},"modified":"2024-07-18T09:56:46","modified_gmt":"2024-07-18T07:56:46","slug":"it-security","status":"publish","type":"page","link":"https:\/\/www.loidl-consulting.at\/en\/it-security\/","title":{"rendered":"IT Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"5813\" class=\"elementor elementor-5813\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f7701cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f7701cb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b4238d\" data-id=\"1b4238d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b853933 elementor-widget elementor-widget-spacer\" data-id=\"b853933\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-e587fe3 e-flex e-con-boxed e-con e-parent\" data-id=\"e587fe3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a5a2476 e-con-full e-flex e-con e-child\" data-id=\"a5a2476\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30ff22e e-con-full e-flex e-con e-child\" data-id=\"30ff22e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1661f69 elementor-widget elementor-widget-heading\" data-id=\"1661f69\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">IT Security \u2013 Bei uns ist die Infrastruktur Ihres Unternehmens sicher aufgehoben\u200b<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40155a9 elementor-widget elementor-widget-text-editor\" data-id=\"40155a9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Durch die laufende Security \u00dcberwachung, Validierung und Aktualisierung Ihrer IT, kann Ihr Unternehmen ein hohes Sicherheitslevel gegen m\u00f6gliche Cyberattacken erreichen<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5761a7 elementor-widget elementor-widget-heading\" data-id=\"a5761a7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-medium\">Cybersecurity\u200b<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68ea96b elementor-widget elementor-widget-text-editor\" data-id=\"68ea96b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At LOIDL Consulting, we protect your business from cybercrime attacks, such as phishing, DDoS, ransomware (e.g., Ransom demands), malware, domain hacking, etc . ..<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c1aee3 elementor-widget elementor-widget-heading\" data-id=\"7c1aee3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-medium\"><a href=\"https:\/\/www.loidl-consulting.at\/en\/screening\/\">\u00dcberpr\u00fcfung Ihrer kompletten IT-Infrastruktur - Vulnerabilit\u00e4tstest f\u00fcr mehr Sicherheit\n<\/a><\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c16a04 elementor-widget elementor-widget-text-editor\" data-id=\"9c16a04\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are happy to check your IT infrastructure, web applications, mobile input devices, WLAN, servers, firewalls, routers and various network components for maximum security and functionality.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc36fb3 elementor-widget elementor-widget-heading\" data-id=\"cc36fb3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-medium\">Compliance with the conformity requirements\n<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b569c31 elementor-widget elementor-widget-text-editor\" data-id=\"b569c31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wir sind Ihr verl\u00e4sslicher Partner, da wir nat\u00fcrlich gem\u00e4\u00df aller <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.dsb.gv.at\/recht-entscheidungen\/gesetze-in-oesterreich.html\" target=\"_blank\" rel=\"noopener\">GDPR Guidelines<\/a><\/span> arbeiten.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ccda74b e-con-full e-flex e-con e-child\" data-id=\"ccda74b\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9ba161d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ba161d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ef9db14\" data-id=\"ef9db14\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a69a24b elementor-widget elementor-widget-spacer\" data-id=\"a69a24b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4bfee05c elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"4bfee05c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4ece3854\" data-id=\"4ece3854\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44829269 elementor-widget__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"44829269\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"218\" height=\"218\" src=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png\" class=\"attachment-medium size-medium wp-image-5512\" alt=\"Loidl IT L\u00f6sungen: F\u00fcr IT Support, Security, monitoring, screening, Rechenzentrum, Datacenter, Cloud Office, 3CX Voip , Softwareentwicklung, VoIP Telefonie, 3cx, Telemedizin (VIVID, CAATS, KEOSITY) Application Development kontaktieren sie uns per mail oder telefonisch\" srcset=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png 218w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon-150x150.png 150w\" sizes=\"(max-width: 218px) 100vw, 218px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-17d06215\" data-id=\"17d06215\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a96e984 elementor-widget elementor-widget-spacer\" data-id=\"a96e984\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b4b8ed4 elementor-widget elementor-widget-heading\" data-id=\"4b4b8ed4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">We are here for you!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-114063ea elementor-widget elementor-widget-heading\" data-id=\"114063ea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-medium\">Not sure if your corporate IT infrastructure is secure?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cc2535b elementor-widget elementor-widget-heading\" data-id=\"3cc2535b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Simply arrange a consultation with us:<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7882a884 elementor-widget elementor-widget-heading\" data-id=\"7882a884\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\"><a href=\"tel:0043720270790\">+43 (0) 720 270 790<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cac15bf elementor-widget elementor-widget-spacer\" data-id=\"cac15bf\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0e30911 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0e30911\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e39c667\" data-id=\"e39c667\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8fcb42f elementor-widget elementor-widget-spacer\" data-id=\"8fcb42f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30772be elementor-widget elementor-widget-spacer\" data-id=\"30772be\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>IT Security \u2013 Bei uns ist die Infrastruktur Ihres Unternehmens sicher aufgehoben\u200b Durch die laufende Security \u00dcberwachung, Validierung und Aktualisierung Ihrer IT, kann Ihr Unternehmen ein hohes Sicherheitslevel gegen m\u00f6gliche Cyberattacken erreichen Cybersecurity\u200b Wir bei LOIDL Consulting\u00a0sch\u00fctzen Ihr Unternehmen vor\u00a0Cybercrime-Angriffen, wie Phishing, DDoS, Ransomware (z.B. L\u00f6segeldforderungen), Malware, Domain-Hacking, usw. . . \u00dcberpr\u00fcfung Ihrer kompletten IT-Infrastruktur [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-5813","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Security - LOIDL Consulting &amp; IT Services<\/title>\n<meta name=\"description\" content=\"IT Security - Erreichen Sie ein hohes Sicherheitslevel durch laufende IT Security \u00dcberwachung, Validierung und Aktualisierung Ihrer, ....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.loidl-consulting.at\/en\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security - LOIDL Consulting &amp; IT Services\" \/>\n<meta property=\"og:description\" content=\"IT Security - Erreichen Sie ein hohes Sicherheitslevel durch laufende IT Security \u00dcberwachung, Validierung und Aktualisierung Ihrer, ....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.loidl-consulting.at\/en\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"LOIDL Consulting &amp; IT Services\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-18T07:56:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.loidl-consulting.at\/it-security\/\",\"url\":\"https:\/\/www.loidl-consulting.at\/it-security\/\",\"name\":\"IT Security - LOIDL Consulting &amp; IT Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png\",\"datePublished\":\"2023-06-01T13:59:35+00:00\",\"dateModified\":\"2024-07-18T07:56:46+00:00\",\"description\":\"IT Security - Erreichen Sie ein hohes Sicherheitslevel durch laufende IT Security \u00dcberwachung, Validierung und Aktualisierung Ihrer, ....\",\"breadcrumb\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/it-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.loidl-consulting.at\/it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.loidl-consulting.at\/it-security\/#primaryimage\",\"url\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png\",\"contentUrl\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.loidl-consulting.at\/it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.loidl-consulting.at\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.loidl-consulting.at\/#website\",\"url\":\"https:\/\/www.loidl-consulting.at\/\",\"name\":\"LOIDL Consulting &amp; IT Services\",\"description\":\"IT Services- Rechenzentrum - 3CX VoIP Telefonie - Telemedizin\",\"publisher\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/#organization\"},\"alternateName\":\"Loidl consulting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.loidl-consulting.at\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.loidl-consulting.at\/#organization\",\"name\":\"LOIDL Consulting & IT Services\",\"alternateName\":\"LOIDL Consulting\",\"url\":\"https:\/\/www.loidl-consulting.at\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.loidl-consulting.at\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png\",\"contentUrl\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png\",\"width\":410,\"height\":60,\"caption\":\"LOIDL Consulting & IT Services\"},\"image\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/loidl-consulting-it-services\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security - LOIDL Consulting &amp; IT Services","description":"IT Security - Erreichen Sie ein hohes Sicherheitslevel durch laufende IT Security \u00dcberwachung, Validierung und Aktualisierung Ihrer, ....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.loidl-consulting.at\/en\/it-security\/","og_locale":"en_GB","og_type":"article","og_title":"IT Security - LOIDL Consulting &amp; IT Services","og_description":"IT Security - Erreichen Sie ein hohes Sicherheitslevel durch laufende IT Security \u00dcberwachung, Validierung und Aktualisierung Ihrer, ....","og_url":"https:\/\/www.loidl-consulting.at\/en\/it-security\/","og_site_name":"LOIDL Consulting &amp; IT Services","article_modified_time":"2024-07-18T07:56:46+00:00","og_image":[{"url":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.loidl-consulting.at\/it-security\/","url":"https:\/\/www.loidl-consulting.at\/it-security\/","name":"IT Security - LOIDL Consulting &amp; IT Services","isPartOf":{"@id":"https:\/\/www.loidl-consulting.at\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.loidl-consulting.at\/it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.loidl-consulting.at\/it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png","datePublished":"2023-06-01T13:59:35+00:00","dateModified":"2024-07-18T07:56:46+00:00","description":"IT Security - Erreichen Sie ein hohes Sicherheitslevel durch laufende IT Security \u00dcberwachung, Validierung und Aktualisierung Ihrer, ....","breadcrumb":{"@id":"https:\/\/www.loidl-consulting.at\/it-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.loidl-consulting.at\/it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.loidl-consulting.at\/it-security\/#primaryimage","url":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png","contentUrl":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.loidl-consulting.at\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.loidl-consulting.at\/"},{"@type":"ListItem","position":2,"name":"IT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.loidl-consulting.at\/#website","url":"https:\/\/www.loidl-consulting.at\/","name":"LOIDL Consulting &amp; IT Services","description":"IT Services- Rechenzentrum - 3CX VoIP Telefonie - Telemedizin","publisher":{"@id":"https:\/\/www.loidl-consulting.at\/#organization"},"alternateName":"Loidl consulting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.loidl-consulting.at\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.loidl-consulting.at\/#organization","name":"LOIDL Consulting & IT Services","alternateName":"LOIDL Consulting","url":"https:\/\/www.loidl-consulting.at\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.loidl-consulting.at\/#\/schema\/logo\/image\/","url":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png","contentUrl":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png","width":410,"height":60,"caption":"LOIDL Consulting & IT Services"},"image":{"@id":"https:\/\/www.loidl-consulting.at\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/loidl-consulting-it-services\/"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false,"mailpoet_newsletter_max":false},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/www.loidl-consulting.at\/en\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"IT Security \u2013 Bei uns ist die Infrastruktur Ihres Unternehmens sicher aufgehoben\u200b Durch die laufende Security \u00dcberwachung, Validierung und Aktualisierung Ihrer IT, kann Ihr Unternehmen ein hohes Sicherheitslevel gegen m\u00f6gliche Cyberattacken erreichen Cybersecurity\u200b Wir bei LOIDL Consulting\u00a0sch\u00fctzen Ihr Unternehmen vor\u00a0Cybercrime-Angriffen, wie Phishing, DDoS, Ransomware (z.B. L\u00f6segeldforderungen), Malware, Domain-Hacking, usw. . . \u00dcberpr\u00fcfung Ihrer kompletten IT-Infrastruktur&hellip;","_links":{"self":[{"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/pages\/5813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/comments?post=5813"}],"version-history":[{"count":57,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/pages\/5813\/revisions"}],"predecessor-version":[{"id":9842,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/pages\/5813\/revisions\/9842"}],"wp:attachment":[{"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/media?parent=5813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}