{"id":27437,"date":"2021-02-16T17:09:00","date_gmt":"2021-02-16T16:09:00","guid":{"rendered":"https:\/\/perseus.de\/information-security-must-be-made-a-top-priority-1\/"},"modified":"2026-03-31T07:08:44","modified_gmt":"2026-03-31T05:08:44","slug":"information-security-must-be-made-a-top-priority-1","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/","title":{"rendered":"&#8220;Information security must be made a top priority&#8221; (1)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27437\" class=\"elementor elementor-27437 elementor-22681\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"339\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27426\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg 600w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-stockvault-cyber-security-concept-600x339-1-300x170.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Source: CSM Stockvault<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c5030b8 e-flex e-con-boxed e-con e-parent\" data-id=\"3c5030b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-930660f e-con-full e-flex e-con e-child\" data-id=\"930660f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-51a8774 e-con-full e-flex e-con e-child\" data-id=\"51a8774\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df81643 elementor-widget elementor-widget-text-editor\" data-id=\"df81643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>16.02.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-582d2da elementor-widget elementor-widget-heading\" data-id=\"582d2da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\"Information security must be made a top priority\" (1)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-220b514 elementor-widget elementor-widget-text-editor\" data-id=\"220b514\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber security | Damage management | Information<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7fc8760 e-con-full e-flex e-con e-child\" data-id=\"7fc8760\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b98842 elementor-widget elementor-widget-text-editor\" data-id=\"4b98842\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>In IT, forensic experts are among the most sought-after specialists, both by investigative authorities and companies. They are responsible for securing evidence in the event of a cyberattack. We asked our forensic expert Julian Krautwald about his work. In the first part of our interview, we find out what an IT forensic expert actually does.   <\/strong><\/p><p>Julian, you are an IT forensic expert.<\/p><p><strong>How does your work differ from that of an IT expert?<\/strong><\/p><p>The IT expert is your first point of contact for all technical matters. They ensure that your IT equipment is working properly and that you have all the tools you need to do your daily work on your work computer. They should also be the first point of contact for technical problems and malfunctions at your workplace.  <\/p><p>More specifically, they take care of the installation, configuration, operation and maintenance of infrastructure\/network components, systems and services, both hardware and software. They are responsible for technical fault diagnosis and take care of system and data recovery. They also maintain documentation of technical processes, instructions and configurations.  <\/p><p><strong>Then there is the IT security expert. What exactly do they do \u2013 and how do they differ from you? <\/strong><\/p><p>You won&#8217;t notice much of the IT security expert&#8217;s work in your day-to-day activities. This is mainly because IT security experts work very closely with IT experts to implement IT security measures, but they are not the first point of contact for employees. You are more likely to notice the measures implemented by the IT security expert subconsciously. For example, when your work computer&#8217;s operating system suddenly asks you (again) to change your login password. Many of these measures initially appear to most employees as a restriction on the user-friendliness of the systems they use. Only when an IT security expert gives employees an insight into why certain measures are extremely important and what can happen if they are not implemented does this usually lead to greater acceptance of their work within the company.     <\/p><p><strong>And where does your work as an IT forensic expert come in?<\/strong><\/p><p>Only when your company has already fallen victim to a cyber attack \u2013 or you at least suspect that this is the case \u2013 and the colleagues described above are unable to clearly determine how the incident occurred and\/or what the best strategy is to contain the damage and return operations to &#8216;normal&#8217;. An IT forensic expert supports and advises these colleagues in the diagnosis, analysis and investigation of causes, but also in prioritising immediate measures in response to information security incidents. <\/p><p>This involves analysing large amounts of data, technical logs and entire system images. The aim of the analysis is to identify signs and causes of an information security incident, evaluate the level of compromise and, if necessary, prepare the evidence found in a form that can be used in court. In addition, they are responsible for developing defence strategies and initiating the necessary measures to mitigate damage. They also define the countermeasures. And last but not least, they document the facts and the activities carried out.    <\/p><p><strong>What questions should victims ideally be able to answer so that you can quickly clarify and deal with the cyber emergency?<\/strong><\/p><p>To clarify what happened, it should at least be possible to answer the classic W questions:<\/p><p><strong>Questionnaire in an emergency<\/strong><\/p><ul><li>What exactly happened?<\/li><li>How was the incident discovered (e.g. was there a warning message from the system? Did you notice increased system utilisation or longer response times?)<\/li><li>How does the incident manifest itself (e.g. anomalies on clients)?<\/li><li>What activities were carried out beforehand (e.g. surfing the web, reading emails, inserting a USB stick)?<\/li><li>Were immediate measures taken after the incident was discovered (e.g. virus scans, deletion of data, changes to system files)?<\/li><li>Has there been a similar problem in the past? How was this problem dealt with? <\/li><li>Which systems (OS) and\/or applications are affected?<\/li><li>How many systems are affected?<\/li><li>Are these client or server systems, or both?<\/li><li>Who has access to the affected systems?<\/li><li>Which users\/user groups are affected?<\/li><li>How many users are affected?<\/li><li>What rights do the affected users have on the affected systems?<\/li><li>How are the affected systems secured (firewalls, antivirus, IDS, IPS, etc.)?<\/li><\/ul><p>In general, however, the more detailed the incident can be described, the better it is for diagnosing and solving the problem. If a smartphone with a camera function is available, it can also be helpful to document the incident with photos. <\/p><p>(End of Part 1)<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In IT, forensic experts are among the most sought-after specialists of all, both by investigative authorities and in companies. They take care of securing evidence and evidence in the event of a cyberattack. We asked our forensics expert Julian Krautwald about his work. In the first part of our conversation, we learn: What does an IT forensic scientist actually do?   <\/p>\n","protected":false},"author":3,"featured_media":27426,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;Information security must be made a top priority&quot; (1) - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Information security must be made a top priority&quot; (1) - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"In IT, forensic experts are among the most sought-after specialists of all, both by investigative authorities and in companies. They take care of securing evidence and evidence in the event of a cyberattack. We asked our forensics expert Julian Krautwald about his work. In the first part of our conversation, we learn: What does an IT forensic scientist actually do?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-16T16:09:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:08:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"339\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"&#8220;Information security must be made a top priority&#8221; (1)\",\"datePublished\":\"2021-02-16T16:09:00+00:00\",\"dateModified\":\"2026-03-31T05:08:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/\"},\"wordCount\":775,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/\",\"name\":\"\\\"Information security must be made a top priority\\\" (1) - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg\",\"datePublished\":\"2021-02-16T16:09:00+00:00\",\"dateModified\":\"2026-03-31T05:08:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg\",\"width\":600,\"height\":339},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/information-security-must-be-made-a-top-priority-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Information security must be made a top priority&#8221; (1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Information security must be made a top priority\" (1) - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/","og_locale":"en_US","og_type":"article","og_title":"\"Information security must be made a top priority\" (1) - Perseus Technologies","og_description":"In IT, forensic experts are among the most sought-after specialists of all, both by investigative authorities and in companies. They take care of securing evidence and evidence in the event of a cyberattack. We asked our forensics expert Julian Krautwald about his work. In the first part of our conversation, we learn: What does an IT forensic scientist actually do?","og_url":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/","og_site_name":"Perseus Technologies","article_published_time":"2021-02-16T16:09:00+00:00","article_modified_time":"2026-03-31T05:08:44+00:00","og_image":[{"width":600,"height":339,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"&#8220;Information security must be made a top priority&#8221; (1)","datePublished":"2021-02-16T16:09:00+00:00","dateModified":"2026-03-31T05:08:44+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/"},"wordCount":775,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/","url":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/","name":"\"Information security must be made a top priority\" (1) - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg","datePublished":"2021-02-16T16:09:00+00:00","dateModified":"2026-03-31T05:08:44+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Blog-Header-stockvault-cyber-security-concept-600x339-1.jpg","width":600,"height":339},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/information-security-must-be-made-a-top-priority-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"&#8220;Information security must be made a top priority&#8221; (1)"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27437"}],"version-history":[{"count":3,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27437\/revisions"}],"predecessor-version":[{"id":27798,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27437\/revisions\/27798"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27426"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}