{"id":17,"date":"2024-03-11T09:00:54","date_gmt":"2024-03-11T09:00:54","guid":{"rendered":"https:\/\/encrypt-online.de\/?page_id=17"},"modified":"2025-04-16T14:16:12","modified_gmt":"2025-04-16T14:16:12","slug":"ueber-mich","status":"publish","type":"page","link":"https:\/\/encrypt-online.de\/?page_id=17","title":{"rendered":"T\u00e4tigkeitsgebieten"},"content":{"rendered":"\n<div class=\"wp-block-columns has-tertiary-background-color has-background is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-cyan-bluish-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"box-shadow:var(--wp--preset--shadow--sharp)\">\n<p class=\"has-cyan-bluish-gray-background-color has-background\"><strong>Beratung<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Machbarkeitsstudie<\/li>\n\n\n\n<li>Kosten-Nutzen-Analyse<\/li>\n\n\n\n<li>Bestandsaufnahme<\/li>\n\n\n\n<li>Schwachstellensuche<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-cyan-bluish-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"box-shadow:var(--wp--preset--shadow--sharp)\">\n<p><strong>Reparatur und Wartung<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PC und Laptops<\/li>\n\n\n\n<li>Server<\/li>\n\n\n\n<li>Firewalls<\/li>\n\n\n\n<li>Spamfilter<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-cyan-bluish-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"box-shadow:var(--wp--preset--shadow--sharp)\">\n<p><strong>DSL, Cloud, Internet<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Einrichten von Routern<\/li>\n\n\n\n<li>port forwarding<\/li>\n\n\n\n<li>Cloudanbindung<\/li>\n\n\n\n<li>Kindersicherung<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-tertiary-background-color has-background is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-cyan-bluish-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"box-shadow:var(--wp--preset--shadow--sharp)\">\n<p><strong>Datensicherung und Datenrettung<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Diebstahlschutz<\/li>\n\n\n\n<li>Mobile Device Management<\/li>\n\n\n\n<li>Datenrettung<\/li>\n\n\n\n<li>Disaster recovery<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-cyan-bluish-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"box-shadow:var(--wp--preset--shadow--sharp)\">\n<p><strong>Konzeptionierung<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IT-Sicherheitskonzept<\/li>\n\n\n\n<li>Datenschutzkonzept<\/li>\n\n\n\n<li>Backup und Wiederanlaufplan<\/li>\n\n\n\n<li>GoBD<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-cyan-bluish-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"box-shadow:var(--wp--preset--shadow--sharp)\">\n<p><strong>Backup und Recovery L\u00f6sungen<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Backupsysteme Lokal und in der Cloud<\/li>\n\n\n\n<li>Wiederherstellung<\/li>\n\n\n\n<li>Fallback Systeme<\/li>\n\n\n\n<li>Automatisierung von Datensicherungen<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns has-tertiary-background-color has-background is-layout-flex wp-container-core-columns-is-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-cyan-bluish-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"box-shadow:var(--wp--preset--shadow--sharp)\">\n<p><strong>Datenschutz<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Datenschutzgrundverordnung<\/li>\n\n\n\n<li>Datenschutz Folgeabsch\u00e4tzungen<\/li>\n\n\n\n<li>Verfahrensverzeichnis<\/li>\n\n\n\n<li>Datenschutz im privaten Sektor<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-cyan-bluish-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"box-shadow:var(--wp--preset--shadow--sharp)\">\n<p><strong>Cybersecurity<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Awareness Training<\/li>\n\n\n\n<li>Firewall und Endpoint Security<\/li>\n\n\n\n<li>Smart Home aber sicher<\/li>\n\n\n\n<li>Physische Absicherung von Schnittstellen<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-cyan-bluish-gray-background-color has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"box-shadow:var(--wp--preset--shadow--sharp)\">\n<p><strong>Netzwerk und Infrastruktur<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Netzwerkplanung<\/li>\n\n\n\n<li>W-Lan Verst\u00e4rker und Mesh Netzwerke<\/li>\n\n\n\n<li>Fehlersuche<\/li>\n\n\n\n<li>Vernetzung und V-Lan<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p style=\"margin-top:0;margin-right:0;margin-bottom:0;margin-left:0\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beratung Reparatur und Wartung DSL, Cloud, Internet Datensicherung und Datenrettung Konzeptionierung Backup und Recovery L\u00f6sungen Datenschutz Cybersecurity Netzwerk und Infrastruktur<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-17","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/encrypt-online.de\/index.php?rest_route=\/wp\/v2\/pages\/17"}],"collection":[{"href":"https:\/\/encrypt-online.de\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/encrypt-online.de\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/encrypt-online.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/encrypt-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=17"}],"version-history":[{"count":9,"href":"https:\/\/encrypt-online.de\/index.php?rest_route=\/wp\/v2\/pages\/17\/revisions"}],"predecessor-version":[{"id":150,"href":"https:\/\/encrypt-online.de\/index.php?rest_route=\/wp\/v2\/pages\/17\/revisions\/150"}],"wp:attachment":[{"href":"https:\/\/encrypt-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}