{"id":27488,"date":"2020-12-03T15:30:00","date_gmt":"2020-12-03T14:30:00","guid":{"rendered":"https:\/\/perseus.de\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/"},"modified":"2026-03-30T16:43:02","modified_gmt":"2026-03-30T14:43:02","slug":"data-protection-and-cybersecurity-go-hand-in-hand-with-security","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/","title":{"rendered":"&#8220;Data protection and cybersecurity go hand in hand with security&#8221;"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27488\" class=\"elementor elementor-27488 elementor-22798\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"401\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\" class=\"attachment-medium_large size-medium_large wp-image-27487\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png 600w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1-300x201.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Joshua Sortino via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-184962d8 e-flex e-con-boxed e-con e-parent\" data-id=\"184962d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5a6e84d e-con-full e-flex e-con e-child\" data-id=\"5a6e84d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0059cfb e-con-full e-flex e-con e-child\" data-id=\"0059cfb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-037ae8b elementor-widget elementor-widget-text-editor\" data-id=\"037ae8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>03.12.2020<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ab3163 elementor-widget elementor-widget-heading\" data-id=\"1ab3163\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\"Data protection and cybersecurity go hand in hand with security\"\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-043bf63 elementor-widget elementor-widget-text-editor\" data-id=\"043bf63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | IT Protection | Privacy Policy | Interview<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1398b61 e-con-full e-flex e-con e-child\" data-id=\"1398b61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b64fd1 elementor-widget elementor-widget-text-editor\" data-id=\"9b64fd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Especially in times of advancing digitization and more complex networking, companies that process personal data should put the topic of data protection at the top of the priority list. However, GDPR-compliant work still poses major challenges for many companies. However, a violation or non-compliance with the GDPR regulation can result in high fines.  <\/strong><\/p><p><strong>Data protection expert Annika Fuchs-Langanke, lawyer and owner of the law firm Fuchs &amp; Coll. Rechtsanwaltsgesellschaft mbH in Potsdam, explains in an interview with Perseus what needs to be considered in particular <\/strong><\/p><p><strong>The introduction of the GDPR in Germany is now a good two years ago. Is there a general assessment of how companies have accepted and implemented them? <\/strong><\/p><p><em> <\/em><\/p><p><em>There is certainly no general answer to this question. Large companies in particular have made considerable efforts to become &#8220;GDPR compliant&#8221;. But here, too, some companies are likely to have some catching up to do in one place or another \u2013 I&#8217;m thinking of the topic of &#8220;deletion&#8221;, for example.  <\/em><\/p><p><em>For medium-sized and especially small companies, the picture is likely to be much more differentiated. Here, too, there are numerous companies that have made an effort and are now in a good position. Unfortunately, there are also companies that have done relatively little in terms of GDPR. There is certainly still a need for implementation here. However, this cannot be generalized<\/em>.<\/p><p><strong> <\/strong><\/p><p><strong>Do data protection and cybersecurity go hand in hand, or do they get in each other&#8217;s way?<\/strong><\/p><p><em>Data protection and cybersecurity go hand in hand with security. For example, the GDPR requires companies to take appropriate measures to protect the personal data they process. Especially in times when personal data is predominantly processed digitally, measures such as firewalls, encryption mechanisms, patch management and backups are playing an increasingly important role. One only has to think of the topic of &#8220;home office&#8221;, which is becoming more and more relevant and would not be conceivable without cybersecurity measures.   <\/em><\/p><p><strong> <\/strong><\/p><p><strong>In terms of data protection, what types of cyberattacks are particularly dangerous? And which data is particularly interesting for cybercriminals? <\/strong><\/p><p><em>Of course, all attacks involving personal data are particularly dangerous, and those that can lead to destruction, loss, alteration and, most importantly, unauthorized disclosure. Cybercriminals are likely to target bank data, among other things. But that doesn&#8217;t always have to be the case. For example, cybercriminals can also target access data or passwords and cause considerable damage.   <\/em><\/p><p><strong> <\/strong><\/p><p><strong>A company has been the victim of a cyber attack. When does a data protection officer need to be consulted, and what exactly are the steps taken by him\/her? <\/strong><\/p><p><em>There is no general answer to this question. Of course, it always depends on how a company has organized itself, whether it has an internal or external data protection officer at all. Even though it certainly makes sense for smaller companies to have a data protection officer, this is not always required by law.  <\/em><\/p><p><em>In any case, companies \u2013 whether small or large \u2013 should know what to do in the event of a cyberattack or a data breach that is very likely to result from it, and provide an appropriate process for doing so.<\/em><\/p><p><em>From a data protection perspective, the most important thing here is to first gain knowledge of the cyber attack \u2013 and then not to lose any time. Of course, corrective action must be taken immediately. In addition, it must be determined whether the data breach is likely to lead to a risk or even a high risk for those affected. If necessary, the supervisory authority must be informed and those affected notified. Of course, the data breach and the measures taken must also be documented accordingly.    <\/em><\/p><p><strong> <\/strong><\/p><p><strong>Assuming that the supervisory authority has to be informed, are there any legal requirements by when this notification must be made?<\/strong><\/p><p><em>There are. The GDPR requires that data breaches that are likely to lead to a risk to the data subjects must be reported to the supervisory authority immediately and, if possible, within 72 hours of becoming aware of them. <\/em><\/p><p><strong> <\/strong><\/p><p><strong>What are the possible consequences if this reporting obligation is ignored?  <\/strong><\/p><p><em>First of all, a violation of the reporting obligation can lead to a fine of up to 10 million euros or up to 2 percent of the previous year&#8217;s turnover. Even if the supervisory authorities have a fine framework here, i.e. they do not necessarily have to impose a fine of this magnitude, the risk of a severe fine should be taken seriously in any case. <\/em><\/p><p><em>But claims for damages and, of course, a considerable loss of image cannot be ruled out if an attempt is made to sweep a data breach under the carpet.<\/em><\/p><p>You can read everything you need to know about data security <a href=\"http:\/\/52.57.197.213\/2022\/04\/19\/datensicherheit\/\">here<\/a>.<\/p><p>You can read about how to behave correctly in a cyber emergency in our guide &#8220;What to do in a cyber emergency&#8221;.<\/p><p>You can read about the offenses that are punished with fines and how high they can be in an <a href=\"https:\/\/www.sueddeutsche.de\/politik\/datenschutz-hannover-datenschutz-knapp-480-000-euro-bussgelder-verhaengt-dpa.urn-newsml-dpa-com-20090101-200903-99-417777\">article in the S\u00fcddeutsche Zeitung<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Especially in times of advancing digitization and more complex networking, companies that process personal data should put the topic of data protection at the top of the priority list. However, GDPR-compliant work still poses major challenges for many companies. However, a violation or non-compliance with the GDPR regulation can result in high fines.  <\/p>\n","protected":false},"author":3,"featured_media":27487,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;Data protection and cybersecurity go hand in hand with security&quot; - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Data protection and cybersecurity go hand in hand with security&quot; - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Especially in times of advancing digitization and more complex networking, companies that process personal data should put the topic of data protection at the top of the priority list. However, GDPR-compliant work still poses major challenges for many companies. However, a violation or non-compliance with the GDPR regulation can result in high fines.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-03T14:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T14:43:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"&#8220;Data protection and cybersecurity go hand in hand with security&#8221;\",\"datePublished\":\"2020-12-03T14:30:00+00:00\",\"dateModified\":\"2026-03-30T14:43:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/\"},\"wordCount\":862,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/\",\"name\":\"\\\"Data protection and cybersecurity go hand in hand with security\\\" - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\",\"datePublished\":\"2020-12-03T14:30:00+00:00\",\"dateModified\":\"2026-03-30T14:43:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\",\"width\":600,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Data protection and cybersecurity go hand in hand with security&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"Data protection and cybersecurity go hand in hand with security\" - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/","og_locale":"en_US","og_type":"article","og_title":"\"Data protection and cybersecurity go hand in hand with security\" - Perseus Technologies","og_description":"Especially in times of advancing digitization and more complex networking, companies that process personal data should put the topic of data protection at the top of the priority list. However, GDPR-compliant work still poses major challenges for many companies. However, a violation or non-compliance with the GDPR regulation can result in high fines.","og_url":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/","og_site_name":"Perseus Technologies","article_published_time":"2020-12-03T14:30:00+00:00","article_modified_time":"2026-03-30T14:43:02+00:00","og_image":[{"width":600,"height":401,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"&#8220;Data protection and cybersecurity go hand in hand with security&#8221;","datePublished":"2020-12-03T14:30:00+00:00","dateModified":"2026-03-30T14:43:02+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/"},"wordCount":862,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/","url":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/","name":"\"Data protection and cybersecurity go hand in hand with security\" - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","datePublished":"2020-12-03T14:30:00+00:00","dateModified":"2026-03-30T14:43:02+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","width":600,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/data-protection-and-cybersecurity-go-hand-in-hand-with-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"&#8220;Data protection and cybersecurity go hand in hand with security&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27488"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27488\/revisions"}],"predecessor-version":[{"id":27489,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27488\/revisions\/27489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27487"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}