{"id":23107,"date":"2022-07-29T11:01:21","date_gmt":"2022-07-29T09:01:21","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/uncategorized\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/"},"modified":"2022-07-29T12:01:07","modified_gmt":"2022-07-29T10:01:07","slug":"enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life","status":"publish","type":"post","link":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/","title":{"rendered":"Enterprise Mobility Management has become an indispensable part of everyday IT life"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-10w0ne-83275210999af2721c3b7a850c3db44d entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-51e084b814d6b4cc15f972273d333894\">\n.flex_cell.av-jumkwvcm-51e084b814d6b4cc15f972273d333894{\nvertical-align:middle;\nheight:200px;\nmin-height:200px;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-51e084b814d6b4cc15f972273d333894{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-51e084b814d6b4cc15f972273d333894 av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-c03b457ab9760610044e5d1acd2550fb\">\n.flex_cell.av-jumkxgop-c03b457ab9760610044e5d1acd2550fb{\nvertical-align:top;\nheight:200px;\nmin-height:200px;\nbackground-color:#d4310f;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-c03b457ab9760610044e5d1acd2550fb{\npadding:80px 80px 80px 80px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-c03b457ab9760610044e5d1acd2550fb av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l1c33trk-ad9fb272640c72339a1999547844e3ef\">\n#top .av-special-heading.av-l1c33trk-ad9fb272640c72339a1999547844e3ef{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-l1c33trk-ad9fb272640c72339a1999547844e3ef .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-l1c33trk-ad9fb272640c72339a1999547844e3ef .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-l1c33trk-ad9fb272640c72339a1999547844e3ef .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-l1c33trk-ad9fb272640c72339a1999547844e3ef .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-l1c33trk-ad9fb272640c72339a1999547844e3ef .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-l1c33trk-ad9fb272640c72339a1999547844e3ef .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-l1c33trk-ad9fb272640c72339a1999547844e3ef av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  avia-builder-el-no-sibling  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Enterprise Mobility Management has become an indispensable part of everyday IT life<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-10w0ne-946d652e60d0b6ad208db73a875431fa entry-content-wrapper main_color av-fixed-cells  avia-builder-el-4  el_after_av_layout_row  el_before_av_textblock  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec\">\n.flex_cell.av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec{\nvertical-align:top;\nbackground-color:#ac1502;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec av-gridrow-cell av_one_half no_margin  avia-builder-el-5  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0\">\n.flex_cell.av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0 av-gridrow-cell av_one_half no_margin  avia-builder-el-6  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div><div id='after_grid_row_2'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-23107'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-jy8jdxp7-91e998ac1550f5d5931067c3ea798043 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-20579\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm-300x225.jpg\" alt=\"MDM\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm-300x225.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm-768x576.jpg 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm-705x529.jpg 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/h3>\n<h3>Daily life in companies<\/h3>\n<p>New employees who start at the company receive their technical equipment. PCs or laptops are already integrated into the company\u2019s domain, e-mail accounts and other accesses are configured, and all necessary applications are installed. If any adjustment or help is needed later, this can be conveniently carried out remotely via domain management.<\/p>\n<p>For some years, the mobilisation of work processes has been on the rise. As a result, mobile devices such as smartphones and tablets have become an integral part of everyday work. But how does an administrator go about setting up and supporting them?<\/p>\n<p>As a rule, the devices must first be unboxed, started and manually configured. Many companies create separate documents with each employee&#8217;s App Store or Play Store accounts and install the necessary applications on the devices via these accounts. In addition, settings such as WLAN, e-mail accounts and VPN access are entered and tested manually.<\/p>\n<p>Depending on the requirements, these steps can take several minutes or even hours per device. The device can be only handed over to the corresponding user once this time-consuming process is completed.<\/p>\n<h3>High configuration effort and data protection<\/h3>\n<p>If a problem occurs on the mobile device, the employee has to come to the IT department &#8211; which is often not even present in smaller companies. The Covid-19 situation has made the whole thing even more complicated, as many employees work for days in their home offices. Nevertheless, it must be ensured that mobile devices are fully functional and the employees always have access to e-mails and company data.<\/p>\n<p>The contents and effects of the European General Data Protection Regulation (EU GDPR), which came into force in 2016, are often too complex to familiarise oneself with. But, it defines, among many other points, that personal and especially sensitive data must be protected against unauthorized access by third parties. This also applies to mobile devices used in companies. In order to protect this data, companies have to take appropriate, state-of-the-art measures.<\/p>\n<p>With these two points, most administrators reach their limits: The device status is no longer known just a few minutes after the handover, and mobile operating systems often do not offer any options for data protection or data separation (private and corporate).<\/p>\n<blockquote>\n<h3>Typical uncertainties in handling mobile devices are:<\/h3>\n<ul>\n<li>Are operating system and applications up-to-date?<\/li>\n<li>Are there any security risks or gaps?<\/li>\n<li>Is the device in use at all?<\/li>\n<li>Is there a technical-organisational measure (TOM) that complies with the EU GDPR?<\/li>\n<\/ul>\n<\/blockquote>\n<p>But these insecurities and questions don\u2019t have to be.<\/p>\n<h3>There is a solution<\/h3>\n<p>Let\u2019s imagine that a mobile device was ordered for a new colleague. It is sent to the IT department or even the user&#8217;s home address, switched on, and the device is fully operational a short time later.<\/p>\n<p>Neither administrators nor employees had to install apps manually or type in access data by hand &#8211; all necessary data, apps and accounts were installed entirely automatically.<\/p>\n<p>Depending on the use cases required in the company, a technical-organisational measure has already been put in place \u2013 that is, a measure that guarantees the security of the processing of personal data.<\/p>\n<p>Dream of the future? No, this is already a reality in many companies. The key to success here is an Enterprise Mobility Management System (EMM, often called MDM or UEM).<\/p>\n<p>With such a solution, which is often offered as a cloud service, administrators have a tool to manage mobile devices quickly and easily at their fingertips. After an initial configuration of the system, all applications, accounts and rules are ready, and the device only needs to be registered in the system. After activation, it connects and fetches all previously defined settings. Through a regular connection, administrators always have an up-to-date inventory and can take action if necessary.<\/p>\n<p>Even in case of problems with applications, it is no longer necessary to visit the IT department. With the EMM, the device can be remotely managed or even controlled. Errors can be corrected within a few minutes \u2013 even if the employee is in the home office or on a business trip.<\/p>\n<p>This tool can make IT life more manageable for administrators and simultaneously offer a technical solution for complying with the legal requirements on data protection.<\/p>\n<p><strong>Links:<\/strong><\/p>\n<p><a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/\">Mobility solutions for corporate environments<\/a><\/p>\n<p><strong>Reading recommendation:<\/strong><\/p>\n<p><a href=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/\">Seamless data protection even with mobile working<\/a><br \/>\n<a href=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/eu-gdpr-compliance-security-and-data-protection-to-go\/\">EU-GDPR Compliance: Security and Data Protection To-Go<\/a><\/p>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4\">\n#top .hr.hr-invisible.av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4 hr-invisible  avia-builder-el-8  el_after_av_textblock  el_before_av_postslider '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-9  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-39223 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/hacktivism-ethical-hacking-and-grey-hats-between-protection-protest-and-crime\/' data-rel='slide-1' class='slide-image' title='Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking-260x185.png\" class=\"wp-image-39212 avia-img-lazy-loading-not-39212 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Ethical Hacking\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking-600x430.png 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/hacktivism-ethical-hacking-and-grey-hats-between-protection-protest-and-crime\/' title='Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime'>Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-04T11:47:35+01:00\" >4. February 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>600<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2025-02-04 11:47:35<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:12:04<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-35470 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/mitre-attck-framework-and-evaluations\/' data-rel='slide-1' class='slide-image' title='MITRE ATT&#038;CK Framework and Evaluations'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework-260x185.png\" class=\"wp-image-35459 avia-img-lazy-loading-not-35459 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"MITRE ATT&amp;CK Framework\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework-600x430.png 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: MITRE ATT&amp;CK Framework and Evaluations\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/mitre-attck-framework-and-evaluations\/' title='MITRE ATT&#038;CK Framework and Evaluations'>MITRE ATT&#038;CK Framework and Evaluations<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-25T18:09:09+02:00\" >25. September 2024<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>600<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2024-09-25 18:09:09<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:19:36<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>MITRE ATT&#038;CK Framework and Evaluations<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-31301 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/harmony-mobile-new-in-the-ikarus-portfolio\/' data-rel='slide-1' class='slide-image' title='Harmony Mobile new in the IKARUS portfolio'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"87\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/11\/Harmony-Mobile-300-260x87.png\" class=\"wp-image-31268 avia-img-lazy-loading-not-31268 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Harmony Mobile by Check Point\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Harmony Mobile new in the IKARUS portfolio\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/harmony-mobile-new-in-the-ikarus-portfolio\/' title='Harmony Mobile new in the IKARUS portfolio'>Harmony Mobile new in the IKARUS portfolio<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-11-15T10:01:25+01:00\" >15. November 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/11\/Harmony-Mobile-300.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>87<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2023-11-15 10:01:25<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-27 12:03:25<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Harmony Mobile new in the IKARUS portfolio<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-29321 slide-entry-overview slide-loop-4 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/data-loss-prevention-protecting-data-from-loss-and-unauthorised-access\/' data-rel='slide-1' class='slide-image' title='Data Loss Prevention: Protecting data from loss and unauthorised access'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention-260x185.png\" class=\"wp-image-29316 avia-img-lazy-loading-not-29316 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Data Loss Prevention\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention-600x430.png 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Data Loss Prevention: Protecting data from loss and unauthorised access\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/data-loss-prevention-protecting-data-from-loss-and-unauthorised-access\/' title='Data Loss Prevention: Protecting data from loss and unauthorised access'>Data Loss Prevention: Protecting data from loss and unauthorised access<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-07-07T11:08:37+02:00\" >7. July 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>600<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2023-07-07 11:08:37<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-30 10:02:45<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Data Loss Prevention: Protecting data from loss and unauthorised access<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-27689 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/location-tracking-risks-from-location-data\/' data-rel='slide-1' class='slide-image' title='Location tracking: Risks from location data'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/04\/location-tracking-260x185.jpg\" class=\"wp-image-27686 avia-img-lazy-loading-not-27686 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"location tracking\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Location tracking: Risks from location data\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/location-tracking-risks-from-location-data\/' title='Location tracking: Risks from location data'>Location tracking: Risks from location data<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-04-24T14:57:46+02:00\" >24. April 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/04\/location-tracking.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2023-04-24 14:57:46<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-30 10:47:07<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Location tracking: Risks from location data<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-27170 slide-entry-overview slide-loop-6 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tiktok-ban-on-business-devices\/' data-rel='slide-1' class='slide-image' title='Tiktok ban on business devices?'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/03\/t-verbot-260x185.jpg\" class=\"wp-image-27167 avia-img-lazy-loading-not-27167 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Tiktok-Verbot auf Diensthandys\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Tiktok ban on business devices?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tiktok-ban-on-business-devices\/' title='Tiktok ban on business devices?'>Tiktok ban on business devices?<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-03-14T11:57:49+01:00\" >14. March 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/03\/t-verbot.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2023-03-14 11:57:49<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-30 10:49:27<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Tiktok ban on business devices?<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-25778 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/6-tips-how-companies-can-recognise-and-prevent-insider-threats\/' data-rel='slide-1' class='slide-image' title='6 tips how companies can recognise and prevent insider threats'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/12\/insider-threat-260x185.png\" class=\"wp-image-25611 avia-img-lazy-loading-not-25611 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"insider threat\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: 6 tips how companies can recognise and prevent insider threats\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/6-tips-how-companies-can-recognise-and-prevent-insider-threats\/' title='6 tips how companies can recognise and prevent insider threats'>6 tips how companies can recognise and prevent insider threats<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-12-19T18:51:41+01:00\" >19. December 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/12\/insider-threat.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>300<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-12-19 18:51:41<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-07-23 10:49:15<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>6 tips how companies can recognise and prevent insider threats<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-25256 slide-entry-overview slide-loop-8 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/it-security-en\/tips-for-secure-online-gaming\/' data-rel='slide-1' class='slide-image' title='Tips for secure online gaming'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/11\/gaming-260x185.jpg\" class=\"wp-image-25247 avia-img-lazy-loading-not-25247 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"secure online gaming\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Tips for secure online gaming\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/it-security-en\/tips-for-secure-online-gaming\/' title='Tips for secure online gaming'>Tips for secure online gaming<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-11-23T15:07:28+01:00\" >23. November 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/11\/gaming.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-11-23 15:07:28<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-24 10:40:34<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Tips for secure online gaming<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-24309 slide-entry-overview slide-loop-9 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/wiper-malware\/' data-rel='slide-1' class='slide-image' title='Wiper-Malware'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/09\/destroy-260x185.jpg\" class=\"wp-image-24306 avia-img-lazy-loading-not-24306 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"destroy\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Wiper-Malware\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/wiper-malware\/' title='Wiper-Malware'>Wiper-Malware<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-09-22T14:17:17+02:00\" >22. September 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/09\/destroy.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>200<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-09-22 14:17:17<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-09-22 14:31:58<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Wiper-Malware<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-23694 slide-entry-overview slide-loop-10 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-ikarus-portal-for-ikarus-cloud-security-services\/' data-rel='slide-1' class='slide-image' title='New IKARUS Portal for IKARUS Cloud Security Services'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/Screen_mail-security_Light-600-260x185.jpg\" class=\"wp-image-22337 avia-img-lazy-loading-not-22337 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Screen IKARUS mail.security light mode\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New IKARUS Portal for IKARUS Cloud Security Services\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-ikarus-portal-for-ikarus-cloud-security-services\/' title='New IKARUS Portal for IKARUS Cloud Security Services'>New IKARUS Portal for IKARUS Cloud Security Services<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-08-31T16:37:40+02:00\" >31. August 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/Screen_mail-security_Light-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>313<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-08-31 16:37:40<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2023-02-13 16:21:59<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New IKARUS Portal for IKARUS Cloud Security Services<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-23293 slide-entry-overview slide-loop-11 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/protect-smartphones-from-malware-and-misuse\/' data-rel='slide-1' class='slide-image' title='Protect smartphones from malware and misuse'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/08\/smartphone-malware-260x185.jpg\" class=\"wp-image-23287 avia-img-lazy-loading-not-23287 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"smartphone malware\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Protect smartphones from malware and misuse\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/protect-smartphones-from-malware-and-misuse\/' title='Protect smartphones from malware and misuse'>Protect smartphones from malware and misuse<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-08-03T16:25:18+02:00\" >3. August 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/08\/smartphone-malware.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>200<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-08-03 16:25:18<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-08 15:23:16<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Protect smartphones from malware and misuse<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-22581 slide-entry-overview slide-loop-12 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/exchange-basic-authentication-to-end\/' data-rel='slide-1' class='slide-image' title='Exchange: Basic Authentication to end'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/07\/exchange-260x185.png\" class=\"wp-image-22566 avia-img-lazy-loading-not-22566 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Exchange: Basic Authentication to end\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/exchange-basic-authentication-to-end\/' title='Exchange: Basic Authentication to end'>Exchange: Basic Authentication to end<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-07-05T10:45:10+02:00\" >5. July 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/07\/exchange.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>214<\/span>\n\t\t\t\t\t\t<span itemprop='width'>370<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-07-05 10:45:10<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-07-05 10:45:11<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Exchange: Basic Authentication to end<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-22357 slide-entry-overview slide-loop-13 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sneak-preview-new-ikarus-portal-for-cloud-security-services\/' data-rel='slide-1' class='slide-image' title='Sneak preview: New IKARUS Portal for Cloud Security Services'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-portal-web-260x185.jpg\" class=\"wp-image-22341 avia-img-lazy-loading-not-22341 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS portal\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Sneak preview: New IKARUS Portal for Cloud Security Services\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sneak-preview-new-ikarus-portal-for-cloud-security-services\/' title='Sneak preview: New IKARUS Portal for Cloud Security Services'>Sneak preview: New IKARUS Portal for Cloud Security Services<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-06-23T10:46:33+02:00\" >23. June 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-portal-web.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>675<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1200<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-06-23 10:46:33<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-06-23 10:48:06<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Sneak preview: New IKARUS Portal for Cloud Security Services<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-21405 slide-entry-overview slide-loop-14 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-tricks-on-phishing-websites\/' data-rel='slide-1' class='slide-image' title='New tricks on phishing websites'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/05\/phishing-260x185.png\" class=\"wp-image-21394 avia-img-lazy-loading-not-21394 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"phishing\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New tricks on phishing websites\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-tricks-on-phishing-websites\/' title='New tricks on phishing websites'>New tricks on phishing websites<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-05-18T10:02:32+02:00\" >18. May 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/05\/phishing.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>231<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-05-18 10:02:32<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-18 10:11:41<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New tricks on phishing websites<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-21288 slide-entry-overview slide-loop-15 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tips-to-better-secure-smart-home-devices\/' data-rel='slide-1' class='slide-image' title='Tips to better secure Smart Home devices'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/05\/smart-home-260x185.jpg\" class=\"wp-image-21281 avia-img-lazy-loading-not-21281 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"smart home\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Tips to better secure Smart Home devices\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tips-to-better-secure-smart-home-devices\/' title='Tips to better secure Smart Home devices'>Tips to better secure Smart Home devices<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-05-10T13:40:11+02:00\" >10. May 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/05\/smart-home.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>297<\/span>\n\t\t\t\t\t\t<span itemprop='width'>800<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-05-10 13:40:11<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-10 13:44:13<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Tips to better secure Smart Home devices<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-19138 slide-entry-overview slide-loop-16 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/identities-in-the-focus-of-cybercriminals\/' data-rel='slide-1' class='slide-image' title='Identities in the focus of cybercriminals'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/02\/identidy-theft-600-260x185.jpg\" class=\"wp-image-19097 avia-img-lazy-loading-not-19097 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"identidy theft\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Identities in the focus of cybercriminals\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/identities-in-the-focus-of-cybercriminals\/' title='Identities in the focus of cybercriminals'>Identities in the focus of cybercriminals<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-02-11T11:12:15+01:00\" >11. February 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/02\/identidy-theft-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>357<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:01:21+02:00\" >2022-02-11 11:12:15<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-02-17 12:38:25<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Identities in the focus of cybercriminals<\/span><\/span><\/span><\/article><\/div><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-17' aria-describedby='av-svg-desc-17' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-17'>Previous<\/title>\n<desc id='av-svg-desc-17'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-18' aria-describedby='av-svg-desc-18' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-18'>Next<\/title>\n<desc id='av-svg-desc-18'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":20579,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[132],"tags":[],"class_list":["post-23107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-device-management-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enterprise Mobility Management has become an indispensable part of everyday IT life - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enterprise Mobility Management has become an indispensable part of everyday IT life - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-29T09:01:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-29T10:01:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IKARUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IKARUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/\"},\"author\":{\"name\":\"IKARUS\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57\"},\"headline\":\"Enterprise Mobility Management has become an indispensable part of everyday IT life\",\"datePublished\":\"2022-07-29T09:01:21+00:00\",\"dateModified\":\"2022-07-29T10:01:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/\"},\"wordCount\":1229,\"publisher\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg\",\"articleSection\":[\"Mobile Device Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/\",\"name\":\"Enterprise Mobility Management has become an indispensable part of everyday IT life - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg\",\"datePublished\":\"2022-07-29T09:01:21+00:00\",\"dateModified\":\"2022-07-29T10:01:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#primaryimage\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg\",\"width\":800,\"height\":600,\"caption\":\"MDM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enterprise Mobility Management has become an indispensable part of everyday IT life\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ikarusantivirussoftware\",\"https:\/\/x.com\/ikarusantivirus\",\"https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh\",\"https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh\",\"https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57\",\"name\":\"IKARUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"caption\":\"IKARUS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enterprise Mobility Management has become an indispensable part of everyday IT life - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/","og_locale":"en_US","og_type":"article","og_title":"Enterprise Mobility Management has become an indispensable part of everyday IT life - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_published_time":"2022-07-29T09:01:21+00:00","article_modified_time":"2022-07-29T10:01:07+00:00","og_image":[{"width":800,"height":600,"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg","type":"image\/jpeg"}],"author":"IKARUS","twitter_card":"summary_large_image","twitter_creator":"@ikarusantivirus","twitter_site":"@ikarusantivirus","twitter_misc":{"Written by":"IKARUS","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#article","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/"},"author":{"name":"IKARUS","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57"},"headline":"Enterprise Mobility Management has become an indispensable part of everyday IT life","datePublished":"2022-07-29T09:01:21+00:00","dateModified":"2022-07-29T10:01:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/"},"wordCount":1229,"publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg","articleSection":["Mobile Device Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/","url":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/","name":"Enterprise Mobility Management has become an indispensable part of everyday IT life - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg","datePublished":"2022-07-29T09:01:21+00:00","dateModified":"2022-07-29T10:01:07+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm.jpg","width":800,"height":600,"caption":"MDM"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"Enterprise Mobility Management has become an indispensable part of everyday IT life"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]},{"@type":"Person","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57","name":"IKARUS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","caption":"IKARUS"}}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/23107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=23107"}],"version-history":[{"count":6,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/23107\/revisions"}],"predecessor-version":[{"id":23131,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/23107\/revisions\/23131"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media\/20579"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=23107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/categories?post=23107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=23107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}