{"id":27355,"date":"2021-03-24T16:58:00","date_gmt":"2021-03-24T15:58:00","guid":{"rendered":"https:\/\/perseus.de\/hacked-what-now-incident-response-at-a-glance\/"},"modified":"2026-03-30T16:13:17","modified_gmt":"2026-03-30T14:13:17","slug":"hacked-what-now-incident-response-at-a-glance","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/","title":{"rendered":"Hacked \u2013 what now? Incident response at a glance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27355\" class=\"elementor elementor-27355 elementor-22656\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"417\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Notfallmanagement-600x417-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27354\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Notfallmanagement-600x417-1.jpg 600w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Notfallmanagement-600x417-1-300x209.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Gerd Altmann via Pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44c1d596 e-flex e-con-boxed e-con e-parent\" data-id=\"44c1d596\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8efceed e-con-full e-flex e-con e-child\" data-id=\"8efceed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8396511 e-con-full e-flex e-con e-child\" data-id=\"8396511\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b99262 elementor-widget elementor-widget-text-editor\" data-id=\"1b99262\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>24.03.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-adb3746 elementor-widget elementor-widget-heading\" data-id=\"adb3746\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hacked \u2013 what now? Incident response at a glance \n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-401429e elementor-widget elementor-widget-text-editor\" data-id=\"401429e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | Cyber attack | Tips and Trends Hints<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a649909 e-con-full e-flex e-con e-child\" data-id=\"a649909\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e867fc1 elementor-widget elementor-widget-text-editor\" data-id=\"e867fc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>In the event of a cyber emergency, it is important to have a fast, deliberate response \u2013 incident response. What does it involve? You can find out here. We also give a few concrete tips on how to optimize them.   <\/strong><\/p><p>First of all, we hope you never need an incident response. But as with all emergencies, cyber emergencies are better prepared to cope with them. We would like to contribute to this with this article.  <\/p><p>If you know what needs to be done and have already made arrangements for your incident response, your company can get back to productive everyday life more quickly in the event of an emergency. At the same time, you can better keep calm in the hustle and bustle of a cyber emergency, act more thoughtfully and give others orientation. <\/p><p><strong> <\/strong><\/p><p><strong>Particularly important: The right, specialized contact persons<\/strong><\/p><p>Cybercriminals often penetrate deep into the system they attack. For example, to make their ransom demand as unavoidable as possible through a comprehensive ransomware attack. Or to be able to attack again after an incomplete removal of the malware. Therefore, we strongly recommend that you consult appropriately specialized cybersecurity or IT forensics professionals in a cyber emergency.   <\/p><p>Basic considerations for your company&#8217;s incident response<\/p><p>The best way to estimate how important good incident response is for your company is to do it yourself. What damage would a cyber emergency cause? For example: If all computers, servers, printers and other systems such as computer-controlled production lines fail. If you can no longer access your customer data or incoming orders no longer arrive in your system.   <\/p><p>These considerations are rarely pleasant. But on the basis of this, responsible decisions can be made with regard to incident response. At the same time, these considerations help you to identify data and systems that are particularly worthy of protection.  <\/p><p><strong> <\/strong><\/p><p><strong>How an incident response works<\/strong><\/p><p>Good incident response takes place in three phases: before a cyber emergency, in acute cases and after a cyber emergency. The first phase is particularly important. Because all other measures are based on it.  <\/p><p><strong>Phase 1: Measures before a cyber emergency<\/strong><\/p><p>This phase has a huge advantage: there is no time pressure. You can review and optimize your considerations and your approach at your leisure. Ideally, you will already be supported by specialized experts in the field of cybersecurity or IT forensics.  <\/p><p>The key question is: How can damage caused by a cyber attack be avoided or reduced in the best possible way? Of course, the respective measures must be adapted to the specifics of your company. Many of them also have a preventive effect, i.e. they can prevent cyber emergencies.  <\/p><p><strong> <\/strong><\/p><p><strong>Typical measures include:<\/strong><\/p><ul><li>Optimization of the company&#8217;s IT structure to protect sensitive areas in a targeted manner<\/li><li>Technical review of servers and networks for security vulnerability<\/li><li>Minimizing organizational security gaps, e.g. due to devices used for work and personal purposes<\/li><li>Training employees on cybersecurity and how to behave in cyber emergencies<\/li><li>A contingency plan for fast, structured responses in the event of an emergency<\/li><li>An emergency contact list of cybersecurity or IT forensics professionals, among others<\/li><li>A backup strategy that takes into account data loss due to ransomware, among other things<\/li><\/ul><p><strong> <\/strong><\/p><p><strong>Phase 2: Measures in acute cases<\/strong><\/p><p>In the event of an emergency, it has to be done quickly. This is because cyber emergencies often cause production stops. However, many hackers rely on precisely this time pressure and &#8220;hide&#8221; parts of their malware in the system that are difficult to find. Therefore, thoroughness is also of crucial importance in acute cases.   <\/p><p><strong> <\/strong><\/p><p><strong>Key measures of incident response in acute cases:<\/strong><\/p><ul><li>Analysis of which systems are infected, with which malware, what damage already exists<\/li><li>Checking how the malware got into the system and whether there are other, perhaps still inactive components<\/li><li>Closing security gaps, including those caused by the malware itself<\/li><li>Malware removal<\/li><li>Recovery of lost data, e.g. via backup<\/li><\/ul><p><strong> <\/strong><\/p><p><strong>Phase 3: Measures after a cyber emergency<\/strong><\/p><p>A cyber emergency must be documented and, in most cases, reported to the relevant authorities. It may also affect your customers or partner companies \u2013 who will then have to inform you. Last but not least, a cyber emergency shows you where your company&#8217;s cybersecurity should be improved.  <\/p><p><strong> <\/strong><\/p><p><strong>Common measures taken after a cyber emergency include:<\/strong><\/p><ul><li>Documentation of the incident<\/li><li>If necessary, report to the responsible authorities<\/li><li>If necessary, report to the insurance company<\/li><li>If necessary, notification of data subjects, e.g. if customer data could be viewed<\/li><li>Optimization of cybersecurity through technical measures and training for employees<\/li><\/ul><p><strong> <\/strong><\/p><p><strong>Our top 3 tips for your incident response<\/strong><\/p><ol><li>Get started. Define: Who is responsible for incident response in your organization? Talk to the appropriate person or department about it. If necessary, contact external experts in the field of cybersecurity or IT forensics and arrange a consultation appointment (often free of charge).   <\/li><li>Reduce one of your biggest cyber risks. Improve phishing awareness in your organization. Because a legitimate-looking email with a malicious attachment or link is quickly clicked on in the hectic working day. How fast? Perseus offers you a free test of how vulnerable your company is to <a href=\"http:\/\/52.57.197.213\/2022\/04\/22\/phishing\/\">phishing attacks<\/a> . On the basis of this, you can plan further steps.     <\/li><li>Back up your data. Cyber emergencies, such as ransomware, can lead to major data losses. The more up-to-date your back-up data is, the better. IMPORTANT: Always keep at least one backup inaccessible from your system. For example, on an external, unplugged hard drive. This is because in many attacks, backups are specifically searched for in the system and destroyed or encrypted.     <\/li><\/ol><p> <\/p><p>Do you have a cyber emergency or would you like to optimize your incident response with us? Then contact our experts at Perseus. <\/p><p>Would you like to take a closer look at the topic of incident response? Then request our free guide &#8220;What to do in a cyber emergency&#8221;. In it you will find significantly more information than fits in a blog article.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the event of a cyber emergency, it is important to have a fast, deliberate response \u2013 incident response. What does it involve? You can find out here. We also give a few concrete tips on how to optimize them.   <\/p>\n","protected":false},"author":3,"featured_media":27354,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacked \u2013 what now? Incident response at a glance - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacked \u2013 what now? Incident response at a glance - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"In the event of a cyber emergency, it is important to have a fast, deliberate response \u2013 incident response. What does it involve? You can find out here. We also give a few concrete tips on how to optimize them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-24T15:58:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T14:13:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Notfallmanagement-600x417-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Hacked \u2013 what now? Incident response at a glance\",\"datePublished\":\"2021-03-24T15:58:00+00:00\",\"dateModified\":\"2026-03-30T14:13:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/\"},\"wordCount\":1017,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Notfallmanagement-600x417-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/\",\"name\":\"Hacked \u2013 what now? Incident response at a glance - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Notfallmanagement-600x417-1.jpg\",\"datePublished\":\"2021-03-24T15:58:00+00:00\",\"dateModified\":\"2026-03-30T14:13:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Notfallmanagement-600x417-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Notfallmanagement-600x417-1.jpg\",\"width\":600,\"height\":417},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/hacked-what-now-incident-response-at-a-glance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacked \u2013 what now? Incident response at a glance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacked \u2013 what now? Incident response at a glance - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/","og_locale":"en_US","og_type":"article","og_title":"Hacked \u2013 what now? Incident response at a glance - Perseus Technologies","og_description":"In the event of a cyber emergency, it is important to have a fast, deliberate response \u2013 incident response. What does it involve? You can find out here. We also give a few concrete tips on how to optimize them.","og_url":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/","og_site_name":"Perseus Technologies","article_published_time":"2021-03-24T15:58:00+00:00","article_modified_time":"2026-03-30T14:13:17+00:00","og_image":[{"width":600,"height":417,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Notfallmanagement-600x417-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Hacked \u2013 what now? Incident response at a glance","datePublished":"2021-03-24T15:58:00+00:00","dateModified":"2026-03-30T14:13:17+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/"},"wordCount":1017,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Notfallmanagement-600x417-1.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/","url":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/","name":"Hacked \u2013 what now? Incident response at a glance - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Notfallmanagement-600x417-1.jpg","datePublished":"2021-03-24T15:58:00+00:00","dateModified":"2026-03-30T14:13:17+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Notfallmanagement-600x417-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Notfallmanagement-600x417-1.jpg","width":600,"height":417},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/hacked-what-now-incident-response-at-a-glance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Hacked \u2013 what now? Incident response at a glance"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27355"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27355\/revisions"}],"predecessor-version":[{"id":27356,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27355\/revisions\/27356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27354"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}