{"id":321,"date":"2022-06-27T10:58:38","date_gmt":"2022-06-27T10:58:38","guid":{"rendered":"https:\/\/integral-safe.com\/?p=321"},"modified":"2024-02-01T20:54:59","modified_gmt":"2024-02-01T20:54:59","slug":"what-are-cybersecurity-controlsand-cyber-defence","status":"publish","type":"post","link":"https:\/\/integral-safe.com\/de\/what-are-cybersecurity-controlsand-cyber-defence\/","title":{"rendered":"Was sind Cybersicherheitskontrollen?<br>und Cyberverteidigung?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"321\" class=\"elementor elementor-321\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-261da363 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"261da363\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c9b67d6\" data-id=\"2c9b67d6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c4af4d elementor-widget__width-initial elementor-absolute floating pc elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2c4af4d\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.6 - 08-06-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"337\" height=\"387\" src=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-15-2.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-15-2.png 337w, https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-15-2-261x300.png 261w\" sizes=\"(max-width: 337px) 100vw, 337px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64f8942d elementor-widget__width-initial elementor-absolute light elementor-widget elementor-widget-image\" data-id=\"64f8942d\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1431\" height=\"1337\" src=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Vector-17.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-baf280b elementor-widget__width-initial elementor-absolute light elementor-widget elementor-widget-image\" data-id=\"baf280b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1431\" height=\"1337\" src=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Vector-17.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-737c9142 elementor-widget__width-initial elementor-absolute light pc elementor-widget elementor-widget-image\" data-id=\"737c9142\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1431\" height=\"1337\" src=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Vector-17.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ee2db3 elementor-widget__width-initial elementor-absolute light elementor-widget elementor-widget-image\" data-id=\"7ee2db3\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1431\" height=\"1337\" src=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Vector-17.svg\" class=\"attachment-large size-large\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-631c2de3 elementor-widget__width-initial elementor-absolute floating pc elementor-invisible elementor-widget elementor-widget-image\" data-id=\"631c2de3\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"348\" height=\"302\" src=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-13.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-13.png 348w, https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-13-300x260.png 300w\" sizes=\"(max-width: 348px) 100vw, 348px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-219c7299 elementor-widget__width-initial elementor-absolute floating pc elementor-invisible elementor-widget elementor-widget-image\" data-id=\"219c7299\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"348\" height=\"302\" src=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-13.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-13.png 348w, https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-13-300x260.png 300w\" sizes=\"(max-width: 348px) 100vw, 348px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4d03ce8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d03ce8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ad96ea\" data-id=\"ad96ea\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3309b0a6 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3309b0a6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.6 - 08-06-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Tipps zur Erstellung sicherer Kennw\u00f6rter und bew\u00e4hrte Praktiken f\u00fcr die Kennwortverwaltung<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-47f66e50 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47f66e50\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-39b96fb\" data-id=\"39b96fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-778f9a56 elementor-widget elementor-widget-image\" data-id=\"778f9a56\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"510\" height=\"43\" src=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-203.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-203.png 510w, https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-203-300x25.png 300w\" sizes=\"(max-width: 510px) 100vw, 510px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-55618ed2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55618ed2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-708699b2\" data-id=\"708699b2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37abfbc1 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"37abfbc1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.6 - 08-06-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Die Erstellung und ordnungsgem\u00e4\u00dfe Verwaltung sicherer Passw\u00f6rter ist f\u00fcr die Aufrechterhaltung guter Cybersicherheitspraktiken unerl\u00e4sslich. Passw\u00f6rter sind die erste Verteidigungslinie gegen unbefugten Zugang zu sensiblen Informationen, und schwache oder schlecht verwaltete Passw\u00f6rter k\u00f6nnen schnell ein ganzes System gef\u00e4hrden.<br \/>In diesem Artikel werden wir einige Tipps f\u00fcr die Erstellung sicherer Passw\u00f6rter und bew\u00e4hrte Verfahren f\u00fcr die Passwortverwaltung er\u00f6rtern.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8766fea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8766fea\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f4e0550\" data-id=\"f4e0550\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7824641 gradient-text elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7824641\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tipps zur Erstellung sicherer Passw\u00f6rter<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8435001 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"8435001\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Der erste Schritt bei der Schulung von Mitarbeitern in Sachen Cybersicherheit besteht darin, sie f\u00fcr die Risiken und Folgen von Cyberangriffen zu sensibilisieren. Dazu geh\u00f6rt, dass sie \u00fcber die verschiedenen Arten von Cyber-Bedrohungen aufgekl\u00e4rt werden, dar\u00fcber, wie man sie erkennt, und \u00fcber den potenziellen Schaden, den eine Sicherheitsverletzung verursachen kann.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-785ee7f article-list elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"785ee7f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li><strong>Verwenden Sie lange Passw\u00f6rter:<\/strong> Ein sicheres Passwort sollte mindestens 12 Zeichen lang sein; je l\u00e4nger, desto besser. L\u00e4ngere Passw\u00f6rter sind schwieriger zu knacken.<\/li><li><strong>Verwenden Sie eine Mischung von Zeichen:<\/strong> Ein sicheres Passwort sollte eine Mischung aus Gro\u00df- und Kleinbuchstaben, Zahlen und Sonderzeichen wie @, # oder ! enthalten. Das macht es f\u00fcr Angreifer schwieriger, es zu erraten.<\/li><li><strong>Vermeiden Sie gebr\u00e4uchliche W\u00f6rter oder Phrasen:<\/strong> Vermeiden Sie gebr\u00e4uchliche W\u00f6rter, Phrasen oder pers\u00f6nliche Informationen wie Ihren Namen, Ihr Geburtsdatum oder Ihre Lieblingssportmannschaft. Diese Arten von Passw\u00f6rtern k\u00f6nnen leicht erraten werden.<\/li><li><strong>Passphrasen verwenden:<\/strong> Eine Passphrase ist eine lange Folge von W\u00f6rtern, die leicht zu merken, aber schwer zu erraten sind. Eine gute Passphrase ist zum Beispiel \"correct-horse-battery-staple\".<\/li><li><strong>Verwenden Sie nicht dasselbe Passwort f\u00fcr mehrere Konten:<\/strong> Die Verwendung desselben Passworts f\u00fcr mehrere Konten stellt ein Sicherheitsrisiko dar. Wenn ein Konto kompromittiert wird, sind alle Ihre Konten gef\u00e4hrdet.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c78bd54 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c78bd54\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-85895be\" data-id=\"85895be\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a69e59 gradient-text elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8a69e59\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tipps zur Erstellung sicherer Passw\u00f6rter<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-046ba94 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"046ba94\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Der erste Schritt bei der Schulung von Mitarbeitern in Sachen Cybersicherheit besteht darin, sie f\u00fcr die Risiken und Folgen von Cyberangriffen zu sensibilisieren. Dazu geh\u00f6rt, dass sie \u00fcber die verschiedenen Arten von Cyber-Bedrohungen aufgekl\u00e4rt werden, dar\u00fcber, wie man sie erkennt, und \u00fcber den potenziellen Schaden, den eine Sicherheitsverletzung verursachen kann.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b17895 article-list elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"8b17895\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul><li><strong>Verwenden Sie einen Passwort-Manager:<\/strong> Ein Passwort-Manager ist ein Tool, das sichere Passw\u00f6rter f\u00fcr Sie erstellen und speichern kann. Er macht es auch einfach, verschiedene Passw\u00f6rter f\u00fcr verschiedene Konten zu verwenden.<\/li><li><strong>\u00c4ndern Sie Passw\u00f6rter regelm\u00e4\u00dfig:<\/strong> Es ist eine gute Praxis, Ihre Passw\u00f6rter alle 90 Tage zu \u00e4ndern. So k\u00f6nnen Sie verhindern, dass sich Angreifer im Laufe der Zeit Zugang zu Ihren Konten verschaffen.<\/li><li><strong>Verwenden Sie die Zwei-Faktoren-Authentifizierung:<\/strong> Die Zwei-Faktor-Authentifizierung bietet mehr Sicherheit f\u00fcr Ihre Konten. Sie m\u00fcssen einen Code und Ihr Passwort eingeben, um sich anzumelden.<\/li><li><strong>Seien Sie vorsichtig bei der gemeinsamen Nutzung von Passw\u00f6rtern:<\/strong> Geben Sie Ihre Passw\u00f6rter an niemanden weiter, auch nicht an Kollegen oder Familienangeh\u00f6rige. Wenn Sie ein Konto mit jemandem teilen m\u00fcssen, erstellen Sie ein separates Konto f\u00fcr diese Person.<\/li><li><strong>Vermeiden Sie die Speicherung von Passw\u00f6rtern im Klartext:<\/strong> Das Speichern von Passw\u00f6rtern im Klartext, z. B. in einer Tabelle oder auf einem Zettel, stellt ein Sicherheitsrisiko dar. Verwenden Sie stattdessen einen Passwort-Manager.<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a87cff elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4a87cff\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Zusammenfassend l\u00e4sst sich sagen, dass die Erstellung sicherer Passw\u00f6rter und deren ordnungsgem\u00e4\u00dfe Verwaltung f\u00fcr die Aufrechterhaltung guter Cybersicherheitspraktiken unerl\u00e4sslich sind. Wenn Sie diese Tipps f\u00fcr die Erstellung sicherer Passw\u00f6rter und bew\u00e4hrte Verfahren f\u00fcr die Passwortverwaltung befolgen, k\u00f6nnen Sie das Risiko eines Sicherheitsversto\u00dfes erheblich verringern.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bc7dcd5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc7dcd5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6eb4888\" data-id=\"6eb4888\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1009838 elementor-widget elementor-widget-image\" data-id=\"1009838\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"510\" height=\"43\" src=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-203.png\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-203.png 510w, https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/Group-203-300x25.png 300w\" sizes=\"(max-width: 510px) 100vw, 510px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Tipps zur Erstellung sicherer Passw\u00f6rter und bew\u00e4hrte Praktiken f\u00fcr die Passwortverwaltung Die Erstellung und ordnungsgem\u00e4\u00dfe Verwaltung sicherer Passw\u00f6rter ist f\u00fcr die Aufrechterhaltung guter Cybersicherheitspraktiken unerl\u00e4sslich. Passw\u00f6rter sind die erste Verteidigungslinie gegen unbefugten Zugriff auf sensible Daten, und schwache oder schlecht verwaltete Passw\u00f6rter k\u00f6nnen schnell ein ganzes System gef\u00e4hrden. In diesem Artikel werden wir [...]<\/p>","protected":false},"author":1,"featured_media":502,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tips for creating strong passwords and best practices for password management<\/title>\n<meta name=\"description\" content=\"Let&#039;s take a closer look at creating and managing strong passwords properly. Why is it vital to maintain good cybersecurity practices?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/integral-safe.com\/de\/what-are-cybersecurity-controlsand-cyber-defence\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are cybersecurity controls and cyber defence?\" \/>\n<meta property=\"og:description\" content=\"Let&#039;s take a closer look at the terms and their meanings. A range of IT and information system control areas form the technical line of defence against cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/integral-safe.com\/de\/what-are-cybersecurity-controlsand-cyber-defence\/\" \/>\n<meta property=\"og:site_name\" content=\"Integral Safe\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-27T10:58:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-01T20:54:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/1024-\u00d7-514-Integral-Safe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What are cybersecurity controls and cyber defence?\" \/>\n<meta name=\"twitter:description\" content=\"Let&#039;s take a closer look at the terms and their meanings. A range of IT and information system control areas form the technical line of defence against cyberattacks.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/1024-\u00d7-514-Integral-Safe.png\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/integral-safe.com\/#website\",\"url\":\"https:\/\/integral-safe.com\/\",\"name\":\"Integral Safe\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/integral-safe.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#primaryimage\",\"url\":\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/1024-\u00d7-514-Integral-Safe.png\",\"contentUrl\":\"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/1024-\u00d7-514-Integral-Safe.png\",\"width\":1024,\"height\":512},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#webpage\",\"url\":\"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/\",\"name\":\"Tips for creating strong passwords and best practices for password management\",\"isPartOf\":{\"@id\":\"https:\/\/integral-safe.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#primaryimage\"},\"datePublished\":\"2022-06-27T10:58:38+00:00\",\"dateModified\":\"2024-02-01T20:54:59+00:00\",\"author\":{\"@id\":\"https:\/\/integral-safe.com\/#\/schema\/person\/77c126fc617db04ba988bd437a9c5418\"},\"description\":\"Let's take a closer look at creating and managing strong passwords properly. Why is it vital to maintain good cybersecurity practices?\",\"breadcrumb\":{\"@id\":\"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/integral-safe.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are cybersecurity controlsand cyber defence?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/integral-safe.com\/#\/schema\/person\/77c126fc617db04ba988bd437a9c5418\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/integral-safe.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/52ea38b6616cc4e9db801ddce5b594f6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/52ea38b6616cc4e9db801ddce5b594f6?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/integral-safe.com\"],\"url\":\"https:\/\/integral-safe.com\/de\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tips for creating strong passwords and best practices for password management","description":"Let's take a closer look at creating and managing strong passwords properly. Why is it vital to maintain good cybersecurity practices?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/integral-safe.com\/de\/what-are-cybersecurity-controlsand-cyber-defence\/","og_locale":"de_DE","og_type":"article","og_title":"What are cybersecurity controls and cyber defence?","og_description":"Let's take a closer look at the terms and their meanings. A range of IT and information system control areas form the technical line of defence against cyberattacks.","og_url":"https:\/\/integral-safe.com\/de\/what-are-cybersecurity-controlsand-cyber-defence\/","og_site_name":"Integral Safe","article_published_time":"2022-06-27T10:58:38+00:00","article_modified_time":"2024-02-01T20:54:59+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/1024-\u00d7-514-Integral-Safe.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"What are cybersecurity controls and cyber defence?","twitter_description":"Let's take a closer look at the terms and their meanings. A range of IT and information system control areas form the technical line of defence against cyberattacks.","twitter_image":"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/1024-\u00d7-514-Integral-Safe.png","twitter_misc":{"Verfasst von":"admin","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/integral-safe.com\/#website","url":"https:\/\/integral-safe.com\/","name":"Integral Safe","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integral-safe.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#primaryimage","url":"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/1024-\u00d7-514-Integral-Safe.png","contentUrl":"https:\/\/integral-safe.com\/wp-content\/uploads\/2022\/06\/1024-\u00d7-514-Integral-Safe.png","width":1024,"height":512},{"@type":"WebPage","@id":"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#webpage","url":"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/","name":"Tips for creating strong passwords and best practices for password management","isPartOf":{"@id":"https:\/\/integral-safe.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#primaryimage"},"datePublished":"2022-06-27T10:58:38+00:00","dateModified":"2024-02-01T20:54:59+00:00","author":{"@id":"https:\/\/integral-safe.com\/#\/schema\/person\/77c126fc617db04ba988bd437a9c5418"},"description":"Let's take a closer look at creating and managing strong passwords properly. Why is it vital to maintain good cybersecurity practices?","breadcrumb":{"@id":"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/integral-safe.com\/what-are-cybersecurity-controlsand-cyber-defence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integral-safe.com\/"},{"@type":"ListItem","position":2,"name":"What are cybersecurity controlsand cyber defence?"}]},{"@type":"Person","@id":"https:\/\/integral-safe.com\/#\/schema\/person\/77c126fc617db04ba988bd437a9c5418","name":"admin","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/integral-safe.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/52ea38b6616cc4e9db801ddce5b594f6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52ea38b6616cc4e9db801ddce5b594f6?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/integral-safe.com"],"url":"https:\/\/integral-safe.com\/de\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/posts\/321"}],"collection":[{"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":43,"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":3806,"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/posts\/321\/revisions\/3806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/media\/502"}],"wp:attachment":[{"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/integral-safe.com\/de\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}