{"id":7868,"date":"2024-04-23T16:32:24","date_gmt":"2024-04-23T14:32:24","guid":{"rendered":"https:\/\/www.loidl-consulting.at\/?p=7868"},"modified":"2024-07-24T12:06:01","modified_gmt":"2024-07-24T10:06:01","slug":"vulnerability-check","status":"publish","type":"post","link":"https:\/\/www.loidl-consulting.at\/en\/vulnerability-check\/","title":{"rendered":"Vulnerability Check &#8211; GRATIS!"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"7868\" class=\"elementor elementor-7868\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ea873f e-flex e-con-boxed e-con e-parent\" data-id=\"9ea873f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e6fb172 e-con-full e-flex e-con e-child\" data-id=\"e6fb172\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5362729 elementor-widget elementor-widget-heading\" data-id=\"5362729\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Check<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b73f0d elementor-widget elementor-widget-heading\" data-id=\"4b73f0d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">mit Withsecure Elements Vulnerability Management<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-caf25cd elementor-widget elementor-widget-heading\" data-id=\"caf25cd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">GRATIS und risikofrei<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e76d84 e-flex e-con-boxed e-con e-parent\" data-id=\"1e76d84\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c810cbd e-con-full e-flex e-con e-child\" data-id=\"c810cbd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6cb7440 elementor-widget elementor-widget-image\" data-id=\"6cb7440\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"410\" height=\"60\" src=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png\" class=\"attachment-1536x1536 size-1536x1536 wp-image-48\" alt=\"Loidl Consulting &amp; IT Services - IT L\u00f6sungen mit Herz, Hirn und Humor f\u00fcr alle!\" srcset=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png 410w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting-300x44.png 300w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting-150x22.png 150w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting-200x29.png 200w\" sizes=\"(max-width: 410px) 100vw, 410px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8abbaf5 e-con-full e-flex e-con e-child\" data-id=\"8abbaf5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-87f4451 elementor-widget elementor-widget-image\" data-id=\"87f4451\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.withsecure.com\/de\/home\" class=\"broken_link\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"68\" src=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/07\/withsecure_logo_charcoal_black-300x68.png\" class=\"attachment-medium size-medium wp-image-7015\" alt=\"withsecure Logo\" srcset=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/07\/withsecure_logo_charcoal_black-300x68.png 300w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/07\/withsecure_logo_charcoal_black-1024x231.png 1024w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/07\/withsecure_logo_charcoal_black-150x34.png 150w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/07\/withsecure_logo_charcoal_black-768x174.png 768w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/07\/withsecure_logo_charcoal_black-1536x347.png 1536w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/07\/withsecure_logo_charcoal_black-2048x463.png 2048w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/07\/withsecure_logo_charcoal_black-18x4.png 18w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-809aad5 e-flex e-con-boxed e-con e-parent\" data-id=\"809aad5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-766cf4b elementor-widget elementor-widget-heading\" data-id=\"766cf4b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Nutzen Sie die Chance und lernen sie uns kennen!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eaec76e e-flex e-con-boxed e-con e-parent\" data-id=\"eaec76e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2d42f6c e-con-full e-flex e-con e-child\" data-id=\"2d42f6c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86da04b elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"86da04b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:0043720270790\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"218\" height=\"218\" src=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png\" class=\"attachment-large size-large wp-image-5512\" alt=\"Loidl IT L\u00f6sungen: F\u00fcr IT Support, Security, monitoring, screening, Rechenzentrum, Datacenter, Cloud Office, 3CX Voip , Softwareentwicklung, VoIP Telefonie, 3cx, Telemedizin (VIVID, CAATS, KEOSITY) Application Development kontaktieren sie uns per mail oder telefonisch\" srcset=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon.png 218w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Loidl-support-tel-icon-150x150.png 150w\" sizes=\"(max-width: 218px) 100vw, 218px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1ceb33 elementor-button-danger elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e1ceb33\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"tel:0043720270790\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-comments\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">FRAGEN SIE UNS<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2277251 elementor-button-danger elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2277251\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"mailto:office@loidl-consulting.at\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-edit\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">SCHREIBEN SIE UNS<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1cf8cc e-con-full e-flex e-con e-child\" data-id=\"c1cf8cc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af57859 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"af57859\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><strong>Mit unserem Vulnerability Check erhalten Sie einen \u00dcberblick \u00fcber die aktuelle Sicherheitslage Ihrer Systeme!<br \/><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58f08d8 elementor-widget elementor-widget-text-editor\" data-id=\"58f08d8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gerade in der heutigen Zeit des digitalen Wandels,<br \/>wird die Sicherheit der internen IT-Systeme immer<br \/>wichtiger. <br \/>Welches Unternehmen m\u00f6chte schon<br \/>mehrere Tage Ausfall oder eine komplett<br \/>verschl\u00fcsselte Infrastruktur riskieren?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b633ec e-con-full e-flex e-con e-child\" data-id=\"1b633ec\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdb7fff elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"cdb7fff\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"368\" src=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/04\/screening-768x368.jpg\" class=\"attachment-medium_large size-medium_large wp-image-8596\" alt=\"Vulnerability Check - Network discovery - Vulnerability Scan - Screening\" srcset=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/04\/screening-768x368.jpg 768w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/04\/screening-300x144.jpg 300w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/04\/screening-1024x491.jpg 1024w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/04\/screening-150x72.jpg 150w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/04\/screening-18x9.jpg 18w, https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/04\/screening.jpg 1145w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13cf7dd elementor-button-danger elementor-align-center elementor-widget elementor-widget-button\" data-id=\"13cf7dd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm broken_link\" href=\"https:\/\/www.loidl-consulting.at\/en\/buchung-gratis-vulnerability-check\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-circle-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ja, ich will gratis buchen!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bebecae e-flex e-con-boxed e-con e-parent\" data-id=\"bebecae\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a45cc65 e-con-full e-flex e-con e-child\" data-id=\"a45cc65\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5146d8c elementor-widget elementor-widget-heading\" data-id=\"5146d8c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network Discovery<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bb9994 elementor-widget elementor-widget-text-editor\" data-id=\"1bb9994\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sammeln Sie Informationen \u00fcber Ihre internetf\u00e4higen Systeme und kartieren Sie Ihre internen Ger\u00e4te. <br \/>Bleiben Sie mit Ihrer sich st\u00e4ndig ver\u00e4ndernden IT-Umgebung Schritt und entdecken unbekannte<br \/>Ressourcen, um sp\u00e4ter Schwachstellen in Ihrer Angriffsfl\u00e4che zu beheben.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73c5e7d e-con-full e-flex e-con e-child\" data-id=\"73c5e7d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e32791f elementor-widget elementor-widget-heading\" data-id=\"e32791f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Scan<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-849e05e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"849e05e\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Liste der installierten Software<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Verwundbare Softwareversionen & Betriebssystemversionen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Offene Ports<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Bekannte Schwachstellen (CVE)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Standardpassw\u00f6rter<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fehlkonfigurationen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69b4e0d e-flex e-con-boxed e-con e-parent\" data-id=\"69b4e0d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-46c0da8 e-con-full e-flex e-con e-child\" data-id=\"46c0da8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36d766e elementor-widget__width-initial elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"36d766e\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-star\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8352277 e-con-full e-flex e-con e-child\" data-id=\"8352277\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d3e6a2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"9d3e6a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">Pers\u00f6nliche \u00dcbergabe eines KURZBERICHTES und Empfehlungen<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f92556 e-flex e-con-boxed e-con e-child\" data-id=\"5f92556\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccbf1b2 elementor-widget elementor-widget-text-editor\" data-id=\"ccbf1b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Erfahren Sie, wie es um die Sicherheit Ihrer IT-Landschaft bestellt ist!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdb624f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"cdb624f\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-star\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4979438 e-con-full e-flex e-con e-child\" data-id=\"4979438\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aab0d9c elementor-widget__width-initial elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"aab0d9c\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-star\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be532a8 e-con-full e-flex e-con e-child\" data-id=\"be532a8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b02416a elementor-widget elementor-widget-text-editor\" data-id=\"b02416a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff;\">Die M\u00f6glichkeit verg\u00fcnstigt einen vollst\u00e4ndigen Vulnerabilit\u00e4tstest zu erhalten!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Vulnerability Check mit Withsecure Elements Vulnerability Management GRATIS und risikofrei Nutzen Sie die Chance und lernen sie uns kennen! FRAGEN SIE UNS SCHREIBEN SIE UNS Mit unserem Vulnerability Check erhalten Sie einen \u00dcberblick \u00fcber die aktuelle Sicherheitslage Ihrer Systeme! Gerade in der heutigen Zeit des digitalen Wandels,wird die Sicherheit der internen IT-Systeme immerwichtiger. Welches Unternehmen [&hellip;]<\/p>","protected":false},"author":3,"featured_media":8653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[43],"tags":[57,41,61,59,65,64,63,62,58],"class_list":["post-7868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-angebote","tag-angebot","tag-cloud","tag-gratis","tag-securitycheck","tag-sicherheits-check","tag-sicherheitstest","tag-vulnerabilitatstest","tag-vulnerability-check","tag-withsecure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Check - GRATIS! - LOIDL Consulting &amp; IT Services<\/title>\n<meta name=\"description\" content=\"Vulnerability Check - und das gratis! Erfahren Sie, wie es um die Sicherheit Ihrer IT-Landschaft bestellt ist...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.loidl-consulting.at\/en\/vulnerability-check\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Check - GRATIS! - LOIDL Consulting &amp; IT Services\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Check - und das gratis! Erfahren Sie, wie es um die Sicherheit Ihrer IT-Landschaft bestellt ist...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.loidl-consulting.at\/en\/vulnerability-check\/\" \/>\n<meta property=\"og:site_name\" content=\"LOIDL Consulting &amp; IT Services\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-23T14:32:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-24T10:06:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"444\" \/>\n\t<meta property=\"og:image:height\" content=\"259\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Barbara Lechner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Barbara Lechner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/\"},\"author\":{\"name\":\"Barbara Lechner\",\"@id\":\"https:\/\/www.loidl-consulting.at\/#\/schema\/person\/1ea241a8271a30cfa9e13365f149e681\"},\"headline\":\"Vulnerability Check &#8211; GRATIS!\",\"datePublished\":\"2024-04-23T14:32:24+00:00\",\"dateModified\":\"2024-07-24T10:06:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/\"},\"wordCount\":164,\"publisher\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg\",\"keywords\":[\"Angebot\",\"Cloud\",\"Gratis\",\"securitycheck\",\"Sicherheits-check\",\"sicherheitstest\",\"vulnerabilit\u00e4tstest\",\"Vulnerability check\",\"withsecure\"],\"articleSection\":[\"Angebote\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/\",\"url\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/\",\"name\":\"Vulnerability Check - GRATIS! - LOIDL Consulting &amp; IT Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg\",\"datePublished\":\"2024-04-23T14:32:24+00:00\",\"dateModified\":\"2024-07-24T10:06:01+00:00\",\"description\":\"Vulnerability Check - und das gratis! Erfahren Sie, wie es um die Sicherheit Ihrer IT-Landschaft bestellt ist...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#primaryimage\",\"url\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg\",\"contentUrl\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg\",\"width\":444,\"height\":259},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.loidl-consulting.at\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Check &#8211; GRATIS!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.loidl-consulting.at\/#website\",\"url\":\"https:\/\/www.loidl-consulting.at\/\",\"name\":\"LOIDL Consulting &amp; IT Services\",\"description\":\"IT Services- Rechenzentrum - 3CX VoIP Telefonie - Telemedizin\",\"publisher\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/#organization\"},\"alternateName\":\"Loidl consulting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.loidl-consulting.at\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.loidl-consulting.at\/#organization\",\"name\":\"LOIDL Consulting & IT Services\",\"alternateName\":\"LOIDL Consulting\",\"url\":\"https:\/\/www.loidl-consulting.at\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.loidl-consulting.at\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png\",\"contentUrl\":\"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png\",\"width\":410,\"height\":60,\"caption\":\"LOIDL Consulting & IT Services\"},\"image\":{\"@id\":\"https:\/\/www.loidl-consulting.at\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/loidl-consulting-it-services\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.loidl-consulting.at\/#\/schema\/person\/1ea241a8271a30cfa9e13365f149e681\",\"name\":\"Barbara Lechner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.loidl-consulting.at\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f7a7a649041e3c3345ff7f133c13792e0fde0d703df2cee43c65cce703101de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f7a7a649041e3c3345ff7f133c13792e0fde0d703df2cee43c65cce703101de?s=96&d=mm&r=g\",\"caption\":\"Barbara Lechner\"},\"url\":\"https:\/\/www.loidl-consulting.at\/en\/author\/barbara-lechner\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Check - GRATIS! - LOIDL Consulting &amp; IT Services","description":"Vulnerability Check - und das gratis! Erfahren Sie, wie es um die Sicherheit Ihrer IT-Landschaft bestellt ist...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.loidl-consulting.at\/en\/vulnerability-check\/","og_locale":"en_GB","og_type":"article","og_title":"Vulnerability Check - GRATIS! - LOIDL Consulting &amp; IT Services","og_description":"Vulnerability Check - und das gratis! Erfahren Sie, wie es um die Sicherheit Ihrer IT-Landschaft bestellt ist...","og_url":"https:\/\/www.loidl-consulting.at\/en\/vulnerability-check\/","og_site_name":"LOIDL Consulting &amp; IT Services","article_published_time":"2024-04-23T14:32:24+00:00","article_modified_time":"2024-07-24T10:06:01+00:00","og_image":[{"width":444,"height":259,"url":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg","type":"image\/jpeg"}],"author":"Barbara Lechner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Barbara Lechner","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#article","isPartOf":{"@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/"},"author":{"name":"Barbara Lechner","@id":"https:\/\/www.loidl-consulting.at\/#\/schema\/person\/1ea241a8271a30cfa9e13365f149e681"},"headline":"Vulnerability Check &#8211; GRATIS!","datePublished":"2024-04-23T14:32:24+00:00","dateModified":"2024-07-24T10:06:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/"},"wordCount":164,"publisher":{"@id":"https:\/\/www.loidl-consulting.at\/#organization"},"image":{"@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#primaryimage"},"thumbnailUrl":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg","keywords":["Angebot","Cloud","Gratis","securitycheck","Sicherheits-check","sicherheitstest","vulnerabilit\u00e4tstest","Vulnerability check","withsecure"],"articleSection":["Angebote"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/","url":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/","name":"Vulnerability Check - GRATIS! - LOIDL Consulting &amp; IT Services","isPartOf":{"@id":"https:\/\/www.loidl-consulting.at\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#primaryimage"},"image":{"@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#primaryimage"},"thumbnailUrl":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg","datePublished":"2024-04-23T14:32:24+00:00","dateModified":"2024-07-24T10:06:01+00:00","description":"Vulnerability Check - und das gratis! Erfahren Sie, wie es um die Sicherheit Ihrer IT-Landschaft bestellt ist...","breadcrumb":{"@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.loidl-consulting.at\/vulnerability-check\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#primaryimage","url":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg","contentUrl":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg","width":444,"height":259},{"@type":"BreadcrumbList","@id":"https:\/\/www.loidl-consulting.at\/vulnerability-check\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.loidl-consulting.at\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Check &#8211; GRATIS!"}]},{"@type":"WebSite","@id":"https:\/\/www.loidl-consulting.at\/#website","url":"https:\/\/www.loidl-consulting.at\/","name":"LOIDL Consulting &amp; IT Services","description":"IT Services- Rechenzentrum - 3CX VoIP Telefonie - Telemedizin","publisher":{"@id":"https:\/\/www.loidl-consulting.at\/#organization"},"alternateName":"Loidl consulting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.loidl-consulting.at\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.loidl-consulting.at\/#organization","name":"LOIDL Consulting & IT Services","alternateName":"LOIDL Consulting","url":"https:\/\/www.loidl-consulting.at\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.loidl-consulting.at\/#\/schema\/logo\/image\/","url":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png","contentUrl":"https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2023\/05\/Logo-Loidl-Consulting.png","width":410,"height":60,"caption":"LOIDL Consulting & IT Services"},"image":{"@id":"https:\/\/www.loidl-consulting.at\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/loidl-consulting-it-services\/"]},{"@type":"Person","@id":"https:\/\/www.loidl-consulting.at\/#\/schema\/person\/1ea241a8271a30cfa9e13365f149e681","name":"Barbara Lechner","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.loidl-consulting.at\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f7a7a649041e3c3345ff7f133c13792e0fde0d703df2cee43c65cce703101de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f7a7a649041e3c3345ff7f133c13792e0fde0d703df2cee43c65cce703101de?s=96&d=mm&r=g","caption":"Barbara Lechner"},"url":"https:\/\/www.loidl-consulting.at\/en\/author\/barbara-lechner\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg",444,259,false],"thumbnail":["https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-150x87.jpg",150,87,true],"medium":["https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-300x175.jpg",300,175,true],"medium_large":["https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-768x448.jpg",768,448,true],"large":["https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-1024x597.jpg",1024,597,true],"1536x1536":["https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg",444,259,false],"2048x2048":["https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg",444,259,false],"trp-custom-language-flag":["https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-18x10.jpg",18,10,true],"mailpoet_newsletter_max":["https:\/\/www.loidl-consulting.at\/wp-content\/uploads\/2024\/06\/check-muster-e1719394239536.jpg",444,259,false]},"uagb_author_info":{"display_name":"Barbara Lechner","author_link":"https:\/\/www.loidl-consulting.at\/en\/author\/barbara-lechner\/"},"uagb_comment_info":0,"uagb_excerpt":"Vulnerability Check mit Withsecure Elements Vulnerability Management GRATIS und risikofrei Nutzen Sie die Chance und lernen sie uns kennen! FRAGEN SIE UNS SCHREIBEN SIE UNS Mit unserem Vulnerability Check erhalten Sie einen \u00dcberblick \u00fcber die aktuelle Sicherheitslage Ihrer Systeme! Gerade in der heutigen Zeit des digitalen Wandels,wird die Sicherheit der internen IT-Systeme immerwichtiger. Welches Unternehmen&hellip;","_links":{"self":[{"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/posts\/7868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/comments?post=7868"}],"version-history":[{"count":137,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/posts\/7868\/revisions"}],"predecessor-version":[{"id":10028,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/posts\/7868\/revisions\/10028"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/media\/8653"}],"wp:attachment":[{"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/media?parent=7868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/categories?post=7868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.loidl-consulting.at\/en\/wp-json\/wp\/v2\/tags?post=7868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}