{"id":27337,"date":"2021-04-20T16:51:00","date_gmt":"2021-04-20T14:51:00","guid":{"rendered":"https:\/\/perseus.de\/use-cloud-services-securely\/"},"modified":"2026-03-30T16:09:19","modified_gmt":"2026-03-30T14:09:19","slug":"use-cloud-services-securely","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/","title":{"rendered":"Use cloud services securely"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27337\" class=\"elementor elementor-27337 elementor-22644\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"416\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cloud-computing-pixabay-600x416-1.png\" class=\"attachment-medium_large size-medium_large wp-image-27336\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cloud-computing-pixabay-600x416-1.png 600w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cloud-computing-pixabay-600x416-1-300x208.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e007ad e-flex e-con-boxed e-con e-parent\" data-id=\"9e007ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d589f2e e-con-full e-flex e-con e-child\" data-id=\"d589f2e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-aa4e451 e-con-full e-flex e-con e-child\" data-id=\"aa4e451\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f2cbfe elementor-widget elementor-widget-text-editor\" data-id=\"8f2cbfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>20.04.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5e781c elementor-widget elementor-widget-heading\" data-id=\"c5e781c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Use cloud services securely\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51c1e83 elementor-widget elementor-widget-text-editor\" data-id=\"51c1e83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | IT Protection | Attack Vectors | Remarks  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9403380 e-con-full e-flex e-con e-child\" data-id=\"9403380\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-250d01c elementor-widget elementor-widget-text-editor\" data-id=\"250d01c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Reputable cloud providers such as DATEV offer companies, law firms and self-employed people very high security standards. This makes it all the more important to also pay attention to <a href=\"http:\/\/52.57.197.213\/2022\/04\/19\/cybersicherheit\/\">cybersecurity<\/a> when using these cloud solutions \u2013 so as not to allow vulnerable vulnerabilities to arise. <\/strong><\/p><p><strong> <\/strong><\/p><p><strong>A common vulnerability: access to your cloud solution<\/strong><\/p><p>The same applies to clouds as it does to all systems: they are only as secure as their weakest link. Due to the high security standards of reputable cloud providers, the people and companies that use them are usually the biggest potential vulnerability. <\/p><p>However, if you are aware of this, you can minimize many security risks. The most important thing is to protect the access data to your cloud solution. This is because logging in with the right access data is hardly recognizable as an attack or abuse for cloud providers.  <\/p><p><strong> <\/strong><\/p><p><strong>Key concrete actions<\/strong><\/p><p>Strong, unique passwords. The harder a password is to guess or calculate, the better. Passwords that are used multiple times become a risk as soon as a provider has been hacked and the captured access data circulates on the darknet. Therefore, treat your cloud access to an individual, <a href=\"http:\/\/52.57.197.213\/2022\/04\/22\/passwortsicherheit\/\">complex password<\/a>.   <br><a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/zwei-faktor-authentisierung-zwei-faktor-authentifizierung\/\">Two-factor authentication<\/a>. If it&#8217;s offered, take advantage of it. However, be careful not to allow a permanent connection. Because if someone spies on your password, a permanent connection is not a protective second factor.<br>Block access that is not needed. Delete cloud access that is no longer needed. For example, after someone has changed departments or companies.     <\/p><p>Lock screen when leaving the workplace. A small precaution that can make a big difference and quickly becomes a habit. Practice them consciously, even if you are currently working from home. A nice side effect in the home office: when the screen is locked, toddlers and pets can abuse the keyboard without causing much damage.<br>General measure: Increasing your cyber security   <\/p><p>Many general measures to increase your cyber security also indirectly increase the security of your cloud solution. This is because the higher the overall cybersecurity of your company, the lower the risk that cybercriminals can spy on your cloud credentials. <\/p><p>Cyber security has many aspects \u2013 technical, human and organizational. With the help of guidelines or with the help of a service provider such as Perseus, you can increase the cyber security of your company in a targeted manner. In addition to the security of your cloud solution, you also increase your protection against data loss and ransomware, among other things.  <\/p><p><strong> <\/strong><\/p><p><strong>Four key measures to increase your cyber security<\/strong><\/p><ol><li>Optimize your protection against <a href=\"http:\/\/52.57.197.213\/2022\/04\/22\/phishing\/\">phishing attacks<\/a>. The legitimate-looking phishing emails with their malware attachments are widespread. For example, they may contain <a href=\"http:\/\/52.57.197.213\/2022\/04\/22\/keylogger\/\">so-called keyloggers<\/a> \u2013 software that allows cybercriminals to log your keystrokes and thus spy on your passwords. Their best defense is sustainably sensitized employees who consciously look twice at e-mails, even in hectic everyday work.   <\/li><li>Keep an eye out for <a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/update\/\">updates<\/a>. Keep your entire system up to date, from the browser to the server. Many updates close newly discovered security vulnerabilities. If possible, install them immediately or enable the automatic installation of updates.   <\/li><li>Be careful with other people&#8217;s and private devices. The smartphone, the colleague&#8217;s fitness tracker, the colleague&#8217;s USB stick \u2013 any device can contain <a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/schadprogramme-malware\/\">malware<\/a> . After contact with the company Wi-Fi or after connecting to a company computer, these malware programs can spread through the company network. Formulate rules on how to deal with this risk, e.g. through separate networks, <a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/virenscanner\/\">virus scanners<\/a>, <a href=\"http:\/\/52.57.197.213\/2022\/04\/20\/firewall\/\">firewalls<\/a> , etc.   <\/li><li>Increase cyber awareness in the company. Employees with a trained awareness of cyber security are an irreplaceable protective factor. You can deflect attacks such as phishing emails, <a href=\"http:\/\/52.57.197.213\/2022\/04\/19\/ceo-fraud\/\">CEO fraud<\/a> , and fraudulent support calls. In the event of successful attacks via other routes, they can react prudently and thus minimize or even avert damage. Perseus offers a sustainable cyber awareness training program that can be easily integrated into everyday work. But every self-imposed measure also contributes to increasing cyber security.     <\/li><\/ol><p><strong> <\/strong><\/p><p><strong>Special service for members of the auditing and tax consulting professions<\/strong><\/p><p>In the field of auditing and tax consulting, you work with highly sensitive data on a daily basis. Perseus provides you with targeted information on which cyber risks you should pay attention to \u2013 and is happy to support you in increasing your cyber security. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Reputable cloud providers such as DATEV offer companies, law firms and self-employed people very high security standards. This makes it all the more important to also pay attention to cybersecurity when using these cloud solutions \u2013 so as not to allow vulnerable vulnerabilities to arise. <\/p>\n","protected":false},"author":3,"featured_media":27336,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27337","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Use cloud services securely - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/use-cloud-services-securely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Use cloud services securely - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Reputable cloud providers such as DATEV offer companies, law firms and self-employed people very high security standards. This makes it all the more important to also pay attention to cybersecurity when using these cloud solutions \u2013 so as not to allow vulnerable vulnerabilities to arise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/use-cloud-services-securely\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-20T14:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T14:09:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cloud-computing-pixabay-600x416-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"416\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Use cloud services securely\",\"datePublished\":\"2021-04-20T14:51:00+00:00\",\"dateModified\":\"2026-03-30T14:09:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/\"},\"wordCount\":733,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cloud-computing-pixabay-600x416-1.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/\",\"name\":\"Use cloud services securely - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cloud-computing-pixabay-600x416-1.png\",\"datePublished\":\"2021-04-20T14:51:00+00:00\",\"dateModified\":\"2026-03-30T14:09:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cloud-computing-pixabay-600x416-1.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/cloud-computing-pixabay-600x416-1.png\",\"width\":600,\"height\":416},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/use-cloud-services-securely\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Use cloud services securely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Use cloud services securely - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/","og_locale":"en_US","og_type":"article","og_title":"Use cloud services securely - Perseus Technologies","og_description":"Reputable cloud providers such as DATEV offer companies, law firms and self-employed people very high security standards. This makes it all the more important to also pay attention to cybersecurity when using these cloud solutions \u2013 so as not to allow vulnerable vulnerabilities to arise.","og_url":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/","og_site_name":"Perseus Technologies","article_published_time":"2021-04-20T14:51:00+00:00","article_modified_time":"2026-03-30T14:09:19+00:00","og_image":[{"width":600,"height":416,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cloud-computing-pixabay-600x416-1.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Use cloud services securely","datePublished":"2021-04-20T14:51:00+00:00","dateModified":"2026-03-30T14:09:19+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/"},"wordCount":733,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cloud-computing-pixabay-600x416-1.png","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/use-cloud-services-securely\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/","url":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/","name":"Use cloud services securely - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cloud-computing-pixabay-600x416-1.png","datePublished":"2021-04-20T14:51:00+00:00","dateModified":"2026-03-30T14:09:19+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/use-cloud-services-securely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cloud-computing-pixabay-600x416-1.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/cloud-computing-pixabay-600x416-1.png","width":600,"height":416},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/use-cloud-services-securely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Use cloud services securely"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27337"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27337\/revisions"}],"predecessor-version":[{"id":27339,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27337\/revisions\/27339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27336"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}