{"id":20168,"date":"2022-03-14T12:03:45","date_gmt":"2022-03-14T11:03:45","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/security-news\/resources\/"},"modified":"2024-12-06T17:33:58","modified_gmt":"2024-12-06T16:33:58","slug":"resources","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-f80720fa9f73fc71d7e4638d677239db entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-c5c6beb376c97062166c45347c33fd07\">\n.flex_cell.av-junyesco-c5c6beb376c97062166c45347c33fd07{\nvertical-align:middle;\nheight:300px;\nmin-height:300px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/downloads-1200.jpg) 0% 0% no-repeat scroll #ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-c5c6beb376c97062166c45347c33fd07{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-c5c6beb376c97062166c45347c33fd07 av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:300px;\nmin-height:300px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ky8mhiyf-0930bc20fa3388b666d99c127e976ac5\">\n#top .av-special-heading.av-ky8mhiyf-0930bc20fa3388b666d99c127e976ac5{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-ky8mhiyf-0930bc20fa3388b666d99c127e976ac5 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-ky8mhiyf-0930bc20fa3388b666d99c127e976ac5 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-ky8mhiyf-0930bc20fa3388b666d99c127e976ac5 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-ky8mhiyf-0930bc20fa3388b666d99c127e976ac5 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-ky8mhiyf-0930bc20fa3388b666d99c127e976ac5 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-ky8mhiyf-0930bc20fa3388b666d99c127e976ac5 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-ky8mhiyf-0930bc20fa3388b666d99c127e976ac5 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  avia-builder-el-no-sibling  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Downloads \/ Resources<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-4  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-5  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6\">\n.flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6 av-gridrow-cell av_one_half no_margin  avia-builder-el-6  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div>\n<div id='av-layout-grid-3'  class='av-layout-grid-container av-3uw0y3-8a6fbbc83af3de59d9476fc65d542127 entry-content-wrapper main_color av-flex-cells  avia-builder-el-7  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n<div class='flex_cell av-28g47f-fdf21df6a448102433a3d72aa95bda50 av-gridrow-cell av_two_third no_margin  avia-builder-el-8  el_before_av_cell_one_third  avia-builder-el-first '  ><div class='flex_cell_inner'><div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-9  avia-builder-el-no-sibling  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-24858 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_half first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/resources\/improving-cyber-security-for-energy-suppliers\/' data-rel='slide-1' class='slide-image' title='Improving Cyber Security for Energy Suppliers'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/energieversorger2-495x400.jpg\" class=\"wp-image-18061 avia-img-lazy-loading-not-18061 attachment-portfolio size-portfolio wp-post-image\" alt=\"Energy Suppliers\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/energieversorger2-495x400.jpg 495w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/energieversorger2-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Improving Cyber Security for Energy Suppliers\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/resources\/improving-cyber-security-for-energy-suppliers\/' title='Improving Cyber Security for Energy Suppliers'>Improving Cyber Security for Energy Suppliers<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-10-20T16:20:45+02:00\" >20. October 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><small>PDF download<\/small><br \/><br \/>Energy supply is one of the most attractive targets for cyber-attacks. The potential consequences are serious: power outages pose a key risk to a functioning society and economic stability. More cyber security in the increasingly complex automation and process control also strengthens resilience to disruptions and one's own business capability.<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/energieversorger2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>800<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1200<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-03-14T12:03:45+01:00\" >2022-10-20 16:20:45<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-10-21 10:17:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Improving Cyber Security for Energy Suppliers<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-19606 slide-entry-overview slide-loop-2 slide-parity-even  post-entry-last  av_one_half  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/resources\/ransomware-attacks-dos-and-donts\/' data-rel='slide-1' class='slide-image' title='Ransomware attacks: Do\u2018s and Don\u2019ts'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"338\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/12\/ransomware-600-495x338.jpg\" class=\"wp-image-17675 avia-img-lazy-loading-not-17675 attachment-portfolio size-portfolio wp-post-image\" alt=\"Ransomware\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Ransomware attacks: Do\u2018s and Don\u2019ts\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/resources\/ransomware-attacks-dos-and-donts\/' title='Ransomware attacks: Do\u2018s and Don\u2019ts'>Ransomware attacks: Do\u2018s and Don\u2019ts<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-02-21T15:20:59+01:00\" >21. February 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" ><small>PDF download<\/small><br \/><br \/>\r\nAnyone who suddenly finds themselves facing locked devices and encrypted data should be aware: The attackers have most likely not just penetrated your network to plant their ransomware. Expect that they have already been looking around your systems for some time and may have taken a lot of sensitive data beforehand.<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/12\/ransomware-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>338<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-03-14T12:03:45+01:00\" >2022-02-21 15:20:59<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-02-21 16:58:46<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Ransomware attacks: Do\u2018s and Don\u2019ts<\/span><\/span><\/span><\/article><\/div><\/div><\/div>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-28g47f-1adab90b2fdd791e5b797192923f1f6e\">\n.flex_cell.av-28g47f-1adab90b2fdd791e5b797192923f1f6e{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-28g47f-1adab90b2fdd791e5b797192923f1f6e{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-28g47f-1adab90b2fdd791e5b797192923f1f6e av-gridrow-cell av_one_third no_margin  avia-builder-el-10  el_after_av_cell_two_third  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-482f9f6d73497d98f2fe22615b954610\">\n#top .av-special-heading.av-av_heading-482f9f6d73497d98f2fe22615b954610{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-av_heading-482f9f6d73497d98f2fe22615b954610 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-av_heading-482f9f6d73497d98f2fe22615b954610 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-482f9f6d73497d98f2fe22615b954610 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-11  el_before_av_iconlist  avia-builder-el-first '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Datasheet PDF Downloads<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kyikilzm-bc2c11870a24b8dd26bcff43ac9c750c\">\n#top .avia-icon-list-container.av-kyikilzm-bc2c11870a24b8dd26bcff43ac9c750c .iconlist_icon{\ncolor:#d4310f;\nfont-size:13px;\n}\n#top .avia-icon-list-container.av-kyikilzm-bc2c11870a24b8dd26bcff43ac9c750c .iconlist_icon svg:first-child{\nstroke:#d4310f;\nfill:#d4310f;\nheight:13px;\nwidth:13px;\n}\n#top #wrap_all .avia-icon-list-container.av-kyikilzm-bc2c11870a24b8dd26bcff43ac9c750c .av_iconlist_title{\nfont-size:13px;\n}\n.avia-icon-list-container.av-kyikilzm-bc2c11870a24b8dd26bcff43ac9c750c .iconlist_content{\nfont-size:11px;\n}\n<\/style>\n<div  class='avia-icon-list-container av-kyikilzm-bc2c11870a24b8dd26bcff43ac9c750c  avia-builder-el-12  el_after_av_heading  avia-builder-el-last '><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-small av-kyikilzm-bc2c11870a24b8dd26bcff43ac9c750c avia-iconlist-animate'>\n<li><div class='iconlist_icon av-5tptxye-eb9ea2edb06036506f6cd6a92cbc7d18 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue808' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-antivirus-cloud-datasheet-en.pdf&#039; title=&#039;Central antivirus management in the cloud&#039; target=&quot;_blank&quot;  rel=&quot;noopener noreferrer&quot;&gt;Central antivirus management in the cloud&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small  '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-antivirus-cloud-datasheet-en.pdf' title='Central antivirus management in the cloud' target=\"_blank\"  rel=\"noopener noreferrer\">Central antivirus management in the cloud<\/a><\/div><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>IKARUS anti.virus in the cloud<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-5fj4b8m-5726511d1f9cf2ed1eae93772f2c5ad2 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue808' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-mailsecurity-datasheet-en.pdf&#039; title=&#039;Email security with advanced threat protection&#039; target=&quot;_blank&quot;  rel=&quot;noopener noreferrer&quot;&gt;Email security with advanced threat protection&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small  '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-mailsecurity-datasheet-en.pdf' title='Email security with advanced threat protection' target=\"_blank\"  rel=\"noopener noreferrer\">Email security with advanced threat protection<\/a><\/div><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>IKARUS mail.security<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-h5lbuu-a20b8925652be7de03facbf0ad4dda80 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue808' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-mobile-management-datasheet-en.pdf&#039; title=&#039;Mobility solutions for corporate environments&#039; target=&quot;_blank&quot;  rel=&quot;noopener noreferrer&quot;&gt;Mobility solutions for corporate environments&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small  '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-mobile-management-datasheet-en.pdf' title='Mobility solutions for corporate environments' target=\"_blank\"  rel=\"noopener noreferrer\">Mobility solutions for corporate environments<\/a><\/div><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>IKARUS mobile.management<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-4jcxs5i-3a4192099ca0e6fe5591428e39aeb222 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue808' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-24-7-incident-response-de.pdf&#039; title=&#039;Emergency plan for security incidents in IT, OT or IoT environments&#039; target=&quot;_blank&quot;  rel=&quot;noopener noreferrer&quot;&gt;Emergency plan for security incidents in IT, OT or IoT environments&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small  '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-24-7-incident-response-de.pdf' title='Emergency plan for security incidents in IT, OT or IoT environments' target=\"_blank\"  rel=\"noopener noreferrer\">Emergency plan for security incidents in IT, OT or IoT environments<\/a><\/div><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>IKARUS 24\/7 incident.response<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-3ql5z1i-991e1649201feb8a89e52ed8e84d5b18 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue808' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-managed-defense-datasheet-de.pdf&#039; title=&#039;Prevention, Identification &amp; Detection of Cyber Threats&#039; target=&quot;_blank&quot;  rel=&quot;noopener noreferrer&quot;&gt;Prevention, Identification &amp; Detection of Cyber Threats&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small  '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/wp-content\/downloads\/IKARUS-managed-defense-datasheet-de.pdf' title='Prevention, Identification &amp; Detection of Cyber Threats' target=\"_blank\"  rel=\"noopener noreferrer\">Prevention, Identification & Detection of Cyber Threats<\/a><\/div><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>IKARUS managed.defense<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><\/p>\n<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4729,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-20168","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Resources - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Resources - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-06T16:33:58+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/\",\"name\":\"Resources - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\"},\"datePublished\":\"2022-03-14T11:03:45+00:00\",\"dateModified\":\"2024-12-06T16:33:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security News\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/security-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ikarusantivirussoftware\",\"https:\/\/x.com\/ikarusantivirus\",\"https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh\",\"https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh\",\"https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Resources - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/","og_locale":"en_US","og_type":"article","og_title":"Resources - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2024-12-06T16:33:58+00:00","twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/","url":"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/","name":"Resources - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"datePublished":"2022-03-14T11:03:45+00:00","dateModified":"2024-12-06T16:33:58+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news\/resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security News","item":"https:\/\/www.ikarussecurity.com\/en\/security-news\/"},{"@type":"ListItem","position":3,"name":"Resources"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/20168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=20168"}],"version-history":[{"count":37,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/20168\/revisions"}],"predecessor-version":[{"id":37957,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/20168\/revisions\/37957"}],"up":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/4729"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=20168"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=20168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}