{"id":28372,"date":"2026-02-21T17:49:19","date_gmt":"2026-02-21T16:49:19","guid":{"rendered":"https:\/\/perseus.de\/guide\/"},"modified":"2026-04-02T17:13:35","modified_gmt":"2026-04-02T15:13:35","slug":"whitepapers","status":"publish","type":"page","link":"https:\/\/perseus.de\/en\/whitepapers\/","title":{"rendered":"Whitepapers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"28372\" class=\"elementor elementor-28372 elementor-25467\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec52a39 e-flex e-con-boxed e-con e-parent\" data-id=\"ec52a39\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d66c3e4 e-con-full e-flex e-con e-child\" data-id=\"d66c3e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-417aed6 elementor-widget elementor-widget-heading\" data-id=\"417aed6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Useful information on cyber security, data protection and much more<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0dcf94 elementor-widget elementor-widget-heading\" data-id=\"c0dcf94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Whitepapers<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c5ea04 elementor-widget elementor-widget-text-editor\" data-id=\"5c5ea04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"614\" data-end=\"867\">Our <strong data-start=\"618\" data-end=\"651\">cybersecurity guides for SMEs<\/strong> provide practical tips, clear instructions, and easy-to-follow <strong data-start=\"715\" data-end=\"761\">how-tos on IT security and data protection<\/strong>. We show you how to identify common risks, avoid security pitfalls, and protect your systems effectively.<\/p><p data-start=\"869\" data-end=\"1040\">From simple measures to structured security strategies, you\u2019ll find <strong data-start=\"937\" data-end=\"967\">actionable recommendations<\/strong> tailored specifically to the needs of small and medium-sized businesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c46bcb e-con-full e-flex e-con e-child\" data-id=\"7c46bcb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26c4f1e elementor-widget elementor-widget-image\" data-id=\"26c4f1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"799\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel.png\" class=\"attachment-large size-large wp-image-28371\" alt=\"An Active Directory check is carried out on a computer to identify security gaps and incorrect user rights in the IT infrastructure.\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel.png 841w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel-768x767.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0aaa61c e-flex e-con-boxed e-con e-parent\" data-id=\"0aaa61c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f65ed90 e-flex e-con-boxed e-con e-parent\" data-id=\"f65ed90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ea969f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4ea969f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Useful information on cyber security, data protection and much more Whitepapers Our cybersecurity guides for SMEs provide practical tips, clear instructions, and easy-to-follow how-tos on IT security and data protection. We show you how to identify common risks, avoid security pitfalls, and protect your systems effectively. From simple measures to structured security strategies, you\u2019ll find [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-28372","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity knowledge \u2013 compact, understandable, up-to-date<\/title>\n<meta name=\"description\" content=\"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/whitepapers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity knowledge \u2013 compact, understandable, up-to-date\" \/>\n<meta property=\"og:description\" content=\"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/whitepapers\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T15:13:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel.png\" \/>\n\t<meta property=\"og:image:width\" content=\"841\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/whitepapers\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/whitepapers\\\/\",\"name\":\"Cybersecurity knowledge \u2013 compact, understandable, up-to-date\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/whitepapers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/whitepapers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Active-Dircetory-Check-Bild-Kachel.png\",\"datePublished\":\"2026-02-21T16:49:19+00:00\",\"dateModified\":\"2026-04-02T15:13:35+00:00\",\"description\":\"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/whitepapers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/whitepapers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/whitepapers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Active-Dircetory-Check-Bild-Kachel.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Active-Dircetory-Check-Bild-Kachel.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/whitepapers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepapers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity knowledge \u2013 compact, understandable, up-to-date","description":"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/whitepapers\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity knowledge \u2013 compact, understandable, up-to-date","og_description":"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.","og_url":"https:\/\/perseus.de\/en\/whitepapers\/","og_site_name":"Perseus Technologies","article_modified_time":"2026-04-02T15:13:35+00:00","og_image":[{"width":841,"height":840,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/whitepapers\/","url":"https:\/\/perseus.de\/en\/whitepapers\/","name":"Cybersecurity knowledge \u2013 compact, understandable, up-to-date","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/whitepapers\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/whitepapers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel.png","datePublished":"2026-02-21T16:49:19+00:00","dateModified":"2026-04-02T15:13:35+00:00","description":"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/whitepapers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/whitepapers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/whitepapers\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/07\/Active-Dircetory-Check-Bild-Kachel.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/whitepapers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Whitepapers"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/pages\/28372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=28372"}],"version-history":[{"count":8,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/pages\/28372\/revisions"}],"predecessor-version":[{"id":28402,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/pages\/28372\/revisions\/28402"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=28372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}