{"id":23114,"date":"2022-07-29T11:13:23","date_gmt":"2022-07-29T09:13:23","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/uncategorized\/seamless-data-protection-even-with-mobile-working\/"},"modified":"2022-07-29T11:23:23","modified_gmt":"2022-07-29T09:23:23","slug":"seamless-data-protection-even-with-mobile-working","status":"publish","type":"post","link":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/","title":{"rendered":"Seamless data protection even with mobile working"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-10w0ne-83275210999af2721c3b7a850c3db44d entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-51e084b814d6b4cc15f972273d333894\">\n.flex_cell.av-jumkwvcm-51e084b814d6b4cc15f972273d333894{\nvertical-align:middle;\nheight:200px;\nmin-height:200px;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-51e084b814d6b4cc15f972273d333894{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-51e084b814d6b4cc15f972273d333894 av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-c03b457ab9760610044e5d1acd2550fb\">\n.flex_cell.av-jumkxgop-c03b457ab9760610044e5d1acd2550fb{\nvertical-align:top;\nheight:200px;\nmin-height:200px;\nbackground-color:#d4310f;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-c03b457ab9760610044e5d1acd2550fb{\npadding:80px 80px 80px 80px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-c03b457ab9760610044e5d1acd2550fb av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kf2bg6rb-5913515db6de72e4434608a890f9a142\">\n#top .av-special-heading.av-kf2bg6rb-5913515db6de72e4434608a890f9a142{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-kf2bg6rb-5913515db6de72e4434608a890f9a142 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-kf2bg6rb-5913515db6de72e4434608a890f9a142 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-kf2bg6rb-5913515db6de72e4434608a890f9a142 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-kf2bg6rb-5913515db6de72e4434608a890f9a142 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-kf2bg6rb-5913515db6de72e4434608a890f9a142 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kf2bg6rb-5913515db6de72e4434608a890f9a142 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kf2bg6rb-5913515db6de72e4434608a890f9a142 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-3  avia-builder-el-no-sibling  av-inherit-size'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Seamless data protection even with mobile working<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-10w0ne-946d652e60d0b6ad208db73a875431fa entry-content-wrapper main_color av-fixed-cells  avia-builder-el-4  el_after_av_layout_row  el_before_av_textblock  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec\">\n.flex_cell.av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec{\nvertical-align:top;\nbackground-color:#ac1502;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-fc18a87092e8af7528c955c2c816f0ec av-gridrow-cell av_one_half no_margin  avia-builder-el-5  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0\">\n.flex_cell.av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-6ecbab68d96b7185e8892d8f00fb18d0 av-gridrow-cell av_one_half no_margin  avia-builder-el-6  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div><div id='after_grid_row_2'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-23114'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-jy8jdxp7-91e998ac1550f5d5931067c3ea798043 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-7817\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small-205x300.jpg\" alt=\"Symbolbild Homeoffice\" width=\"205\" height=\"300\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small-205x300.jpg 205w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small.jpg 427w\" sizes=\"auto, (max-width: 205px) 100vw, 205px\" \/><\/a>For years now, our private life and our work have been increasingly moving into the digital sector: 90% of Austrian households were equipped with Internet access in 2019.<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> With 99. 6 per cent, domestic companies are online almost everywhere.<\/p>\n<p>Around 80 per cent of companies also access the Internet with portable devices.<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a><\/p>\n<p>Mobile working is a concern for many employers and workers \u2013 be it business trips or field workers, the desire for more flexibility or simply the additional use of smartphones and tablets.<\/p>\n<h3>EU-GDPR: Data protection on your own?<\/h3>\n<p>The digitisation of our communication channels does not only bring convenience and benefits. The risks of data collection have already become public awareness after numerous, sometimes successful, attacks. More and more users attach importance to knowing that their data is securely stored and well protected. The law proves them correct: The EU GDPR, which came into force in 2018, requires companies to handle sensitive data (of EU citizens) \u2013 for example:<\/p>\n<ul>\n<li>demonstrable protective measures and documentation,<\/li>\n<li>transparency and confidentiality,<\/li>\n<li>IT security and data protection impact assessment,<\/li>\n<li>State of the art and accountability.<\/li>\n<\/ul>\n<p>While workstations and server landscapes usually already have tried-and-tested security measures, the use of mobile devices presents IT with new, sometimes complex challenges \u2013 starting with mobile devices being more difficult to monitor and sometimes non-company devices accessing company data.<strong>\u00a0\u00a0\u00a0\u00a0<\/strong><\/p>\n<h3>Control over data, apps and permissions<\/h3>\n<p>The choice of suitable measures is up to the company itself, as is the self-testing of the efficiency and completeness of the safety measures. However, compliance with all state-of-the-art regulations is hardly possible without MDM software. Sensitive information such as contact details or e-mails must also be protected from unauthorised access and loss on laptops, smartphones or tablets. The devices must be password-protected and have an antivirus protection. Data must be encrypted, private and professional information must be strictly separated. It is also essential to ensure that the security of sensitive data is not compromised via app permissions, for example, by messenger services or social media apps gaining access to contact details.<\/p>\n<p>Companies must therefore retain control over all end devices in the company network and demonstrably ensure that all security requirements are met here, that no unauthorised apps are installed and that, in case of doubt, all company data can be deleted via remote access.<\/p>\n<h3>Mobility is the future<\/h3>\n<p>A suitable MDM system not only enables compliance with the GDPR requirements. At the same time, the considerable administrative burden of IT is reduced to a minimum. The MDM provides a detailed overview of all mobile devices with access to enterprise resources at a glance. Devices such as applications can be centrally managed and inventoried. Software distribution, including the rollout of updates and licenses, is also centrally initiated and done at the push of a button. In addition, the system provides powerful malware protection and enables automated actions during security breaches.<\/p>\n<p>To protect sensitive data from unauthorised disclosure, third-party access or loss, private data and apps must be reliably separated from corporate data, for example, by containerisation. This technical measure also supports the implementation of data protection impact assessment and accountability obligations such as transparency, temporary storage and encryption. Companies and employers also benefit from the freedom to use private devices in the company environment or work equipment for private purposes. This increases employee satisfaction and productivity as well as employer attractiveness.<\/p>\n<p>Mobile solutions will continue to play a significant role in our private and professional lives. Therefore, investing in a future-proof solution is advisable: Professional concepts, simple handling and reliable methods are worthwhile.<\/p>\n<p><strong>Also worth reading<\/strong><strong>: <\/strong><\/p>\n<p><a href=\"https:\/\/www.ikarussecurity.com\/security-news\/viele-sicherheitsluecken-bei-klein-und-mittelbetrieben\/\">IKT-Studie 2019: Kleine und mittlere Unternehmen hinken bei IT-Sicherheit hinterher<\/a><br \/>\n<a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/\">IKARUS mobile.management: Cost-effective mobility solution also for SMEs<\/a><\/p>\n<p><small>Sources:<\/p>\n<p>[1] <a href=\"https:\/\/www.statistik.at\/web_de\/statistiken\/energie_umwelt_innovation_mobilitaet\/informationsgesellschaft\/ikt-einsatz_in_haushalten\/index.html\">https:\/\/www.statistik.at\/web_de\/statistiken\/energie_umwelt_innovation_mobilitaet\/informationsgesellschaft\/ikt-einsatz_in_haushalten\/index.html<\/a><br \/>\n[2] <a href=\"https:\/\/www.statistik.at\/web_de\/statistiken\/energie_umwelt_innovation_mobilitaet\/informationsgesellschaft\/ikt-einsatz_in_unternehmen\/105100.html\">https:\/\/www.statistik.at\/web_de\/statistiken\/energie_umwelt_innovation_mobilitaet\/informationsgesellschaft\/ikt-einsatz_in_unternehmen\/105100.html<\/a><br \/>\n<\/small><\/p>\n<\/div><\/section>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-8  el_after_av_textblock  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-39223 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/hacktivism-ethical-hacking-and-grey-hats-between-protection-protest-and-crime\/' data-rel='slide-1' class='slide-image' title='Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking-260x185.png\" class=\"wp-image-39212 avia-img-lazy-loading-not-39212 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Ethical Hacking\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking-600x430.png 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/hacktivism-ethical-hacking-and-grey-hats-between-protection-protest-and-crime\/' title='Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime'>Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-04T11:47:35+01:00\" >4. February 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>600<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2025-02-04 11:47:35<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:12:04<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-35470 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/mitre-attck-framework-and-evaluations\/' data-rel='slide-1' class='slide-image' title='MITRE ATT&#038;CK Framework and Evaluations'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework-260x185.png\" class=\"wp-image-35459 avia-img-lazy-loading-not-35459 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"MITRE ATT&amp;CK Framework\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework-600x430.png 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: MITRE ATT&amp;CK Framework and Evaluations\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/mitre-attck-framework-and-evaluations\/' title='MITRE ATT&#038;CK Framework and Evaluations'>MITRE ATT&#038;CK Framework and Evaluations<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-25T18:09:09+02:00\" >25. September 2024<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>600<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2024-09-25 18:09:09<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:19:36<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>MITRE ATT&#038;CK Framework and Evaluations<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-31301 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/harmony-mobile-new-in-the-ikarus-portfolio\/' data-rel='slide-1' class='slide-image' title='Harmony Mobile new in the IKARUS portfolio'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"87\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/11\/Harmony-Mobile-300-260x87.png\" class=\"wp-image-31268 avia-img-lazy-loading-not-31268 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Harmony Mobile by Check Point\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Harmony Mobile new in the IKARUS portfolio\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/harmony-mobile-new-in-the-ikarus-portfolio\/' title='Harmony Mobile new in the IKARUS portfolio'>Harmony Mobile new in the IKARUS portfolio<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-11-15T10:01:25+01:00\" >15. November 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/11\/Harmony-Mobile-300.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>87<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2023-11-15 10:01:25<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-27 12:03:25<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Harmony Mobile new in the IKARUS portfolio<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-29321 slide-entry-overview slide-loop-4 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/data-loss-prevention-protecting-data-from-loss-and-unauthorised-access\/' data-rel='slide-1' class='slide-image' title='Data Loss Prevention: Protecting data from loss and unauthorised access'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention-260x185.png\" class=\"wp-image-29316 avia-img-lazy-loading-not-29316 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Data Loss Prevention\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention-600x430.png 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Data Loss Prevention: Protecting data from loss and unauthorised access\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/data-loss-prevention-protecting-data-from-loss-and-unauthorised-access\/' title='Data Loss Prevention: Protecting data from loss and unauthorised access'>Data Loss Prevention: Protecting data from loss and unauthorised access<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-07-07T11:08:37+02:00\" >7. July 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>600<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2023-07-07 11:08:37<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-30 10:02:45<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Data Loss Prevention: Protecting data from loss and unauthorised access<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-27689 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/location-tracking-risks-from-location-data\/' data-rel='slide-1' class='slide-image' title='Location tracking: Risks from location data'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/04\/location-tracking-260x185.jpg\" class=\"wp-image-27686 avia-img-lazy-loading-not-27686 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"location tracking\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Location tracking: Risks from location data\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/location-tracking-risks-from-location-data\/' title='Location tracking: Risks from location data'>Location tracking: Risks from location data<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-04-24T14:57:46+02:00\" >24. April 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/04\/location-tracking.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2023-04-24 14:57:46<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-30 10:47:07<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Location tracking: Risks from location data<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-27170 slide-entry-overview slide-loop-6 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tiktok-ban-on-business-devices\/' data-rel='slide-1' class='slide-image' title='Tiktok ban on business devices?'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/03\/t-verbot-260x185.jpg\" class=\"wp-image-27167 avia-img-lazy-loading-not-27167 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Tiktok-Verbot auf Diensthandys\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Tiktok ban on business devices?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tiktok-ban-on-business-devices\/' title='Tiktok ban on business devices?'>Tiktok ban on business devices?<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-03-14T11:57:49+01:00\" >14. March 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/03\/t-verbot.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2023-03-14 11:57:49<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-30 10:49:27<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Tiktok ban on business devices?<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-25778 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/6-tips-how-companies-can-recognise-and-prevent-insider-threats\/' data-rel='slide-1' class='slide-image' title='6 tips how companies can recognise and prevent insider threats'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/12\/insider-threat-260x185.png\" class=\"wp-image-25611 avia-img-lazy-loading-not-25611 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"insider threat\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: 6 tips how companies can recognise and prevent insider threats\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/6-tips-how-companies-can-recognise-and-prevent-insider-threats\/' title='6 tips how companies can recognise and prevent insider threats'>6 tips how companies can recognise and prevent insider threats<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-12-19T18:51:41+01:00\" >19. December 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/12\/insider-threat.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>300<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-12-19 18:51:41<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-07-23 10:49:15<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>6 tips how companies can recognise and prevent insider threats<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-25256 slide-entry-overview slide-loop-8 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/it-security-en\/tips-for-secure-online-gaming\/' data-rel='slide-1' class='slide-image' title='Tips for secure online gaming'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/11\/gaming-260x185.jpg\" class=\"wp-image-25247 avia-img-lazy-loading-not-25247 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"secure online gaming\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Tips for secure online gaming\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/it-security-en\/tips-for-secure-online-gaming\/' title='Tips for secure online gaming'>Tips for secure online gaming<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-11-23T15:07:28+01:00\" >23. November 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/11\/gaming.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-11-23 15:07:28<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-24 10:40:34<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Tips for secure online gaming<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-24309 slide-entry-overview slide-loop-9 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/wiper-malware\/' data-rel='slide-1' class='slide-image' title='Wiper-Malware'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/09\/destroy-260x185.jpg\" class=\"wp-image-24306 avia-img-lazy-loading-not-24306 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"destroy\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Wiper-Malware\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/wiper-malware\/' title='Wiper-Malware'>Wiper-Malware<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-09-22T14:17:17+02:00\" >22. September 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/09\/destroy.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>200<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-09-22 14:17:17<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-09-22 14:31:58<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Wiper-Malware<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-23694 slide-entry-overview slide-loop-10 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-ikarus-portal-for-ikarus-cloud-security-services\/' data-rel='slide-1' class='slide-image' title='New IKARUS Portal for IKARUS Cloud Security Services'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/Screen_mail-security_Light-600-260x185.jpg\" class=\"wp-image-22337 avia-img-lazy-loading-not-22337 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Screen IKARUS mail.security light mode\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New IKARUS Portal for IKARUS Cloud Security Services\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-ikarus-portal-for-ikarus-cloud-security-services\/' title='New IKARUS Portal for IKARUS Cloud Security Services'>New IKARUS Portal for IKARUS Cloud Security Services<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-08-31T16:37:40+02:00\" >31. August 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/Screen_mail-security_Light-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>313<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-08-31 16:37:40<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2023-02-13 16:21:59<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New IKARUS Portal for IKARUS Cloud Security Services<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-23293 slide-entry-overview slide-loop-11 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/protect-smartphones-from-malware-and-misuse\/' data-rel='slide-1' class='slide-image' title='Protect smartphones from malware and misuse'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/08\/smartphone-malware-260x185.jpg\" class=\"wp-image-23287 avia-img-lazy-loading-not-23287 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"smartphone malware\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Protect smartphones from malware and misuse\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/protect-smartphones-from-malware-and-misuse\/' title='Protect smartphones from malware and misuse'>Protect smartphones from malware and misuse<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-08-03T16:25:18+02:00\" >3. August 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/08\/smartphone-malware.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>200<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-08-03 16:25:18<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-08-08 15:23:16<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Protect smartphones from malware and misuse<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-22581 slide-entry-overview slide-loop-12 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/exchange-basic-authentication-to-end\/' data-rel='slide-1' class='slide-image' title='Exchange: Basic Authentication to end'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/07\/exchange-260x185.png\" class=\"wp-image-22566 avia-img-lazy-loading-not-22566 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Exchange: Basic Authentication to end\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/exchange-basic-authentication-to-end\/' title='Exchange: Basic Authentication to end'>Exchange: Basic Authentication to end<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-07-05T10:45:10+02:00\" >5. July 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/07\/exchange.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>214<\/span>\n\t\t\t\t\t\t<span itemprop='width'>370<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-07-05 10:45:10<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-07-05 10:45:11<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Exchange: Basic Authentication to end<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-22357 slide-entry-overview slide-loop-13 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sneak-preview-new-ikarus-portal-for-cloud-security-services\/' data-rel='slide-1' class='slide-image' title='Sneak preview: New IKARUS Portal for Cloud Security Services'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-portal-web-260x185.jpg\" class=\"wp-image-22341 avia-img-lazy-loading-not-22341 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS portal\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Sneak preview: New IKARUS Portal for Cloud Security Services\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sneak-preview-new-ikarus-portal-for-cloud-security-services\/' title='Sneak preview: New IKARUS Portal for Cloud Security Services'>Sneak preview: New IKARUS Portal for Cloud Security Services<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-06-23T10:46:33+02:00\" >23. June 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-portal-web.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>675<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1200<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-06-23 10:46:33<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-06-23 10:48:06<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Sneak preview: New IKARUS Portal for Cloud Security Services<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-21405 slide-entry-overview slide-loop-14 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-tricks-on-phishing-websites\/' data-rel='slide-1' class='slide-image' title='New tricks on phishing websites'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/05\/phishing-260x185.png\" class=\"wp-image-21394 avia-img-lazy-loading-not-21394 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"phishing\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New tricks on phishing websites\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-tricks-on-phishing-websites\/' title='New tricks on phishing websites'>New tricks on phishing websites<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-05-18T10:02:32+02:00\" >18. May 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/05\/phishing.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>231<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-05-18 10:02:32<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-18 10:11:41<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New tricks on phishing websites<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-21288 slide-entry-overview slide-loop-15 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tips-to-better-secure-smart-home-devices\/' data-rel='slide-1' class='slide-image' title='Tips to better secure Smart Home devices'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/05\/smart-home-260x185.jpg\" class=\"wp-image-21281 avia-img-lazy-loading-not-21281 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"smart home\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Tips to better secure Smart Home devices\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tips-to-better-secure-smart-home-devices\/' title='Tips to better secure Smart Home devices'>Tips to better secure Smart Home devices<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-05-10T13:40:11+02:00\" >10. May 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/05\/smart-home.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>297<\/span>\n\t\t\t\t\t\t<span itemprop='width'>800<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-05-10 13:40:11<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-05-10 13:44:13<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Tips to better secure Smart Home devices<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-19138 slide-entry-overview slide-loop-16 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/identities-in-the-focus-of-cybercriminals\/' data-rel='slide-1' class='slide-image' title='Identities in the focus of cybercriminals'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/02\/identidy-theft-600-260x185.jpg\" class=\"wp-image-19097 avia-img-lazy-loading-not-19097 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"identidy theft\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Identities in the focus of cybercriminals\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/identities-in-the-focus-of-cybercriminals\/' title='Identities in the focus of cybercriminals'>Identities in the focus of cybercriminals<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-02-11T11:12:15+01:00\" >11. February 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/02\/identidy-theft-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>357<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-07-29T11:13:23+02:00\" >2022-02-11 11:12:15<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2022-02-17 12:38:25<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Identities in the focus of cybercriminals<\/span><\/span><\/span><\/article><\/div><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-17' aria-describedby='av-svg-desc-17' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-17'>Previous<\/title>\n<desc id='av-svg-desc-17'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-18' aria-describedby='av-svg-desc-18' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-18'>Next<\/title>\n<desc id='av-svg-desc-18'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":7817,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[132],"tags":[],"class_list":["post-23114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-device-management-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seamless data protection even with mobile working - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seamless data protection even with mobile working - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-29T09:13:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-29T09:23:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"427\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"IKARUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IKARUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/\"},\"author\":{\"name\":\"IKARUS\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/person\\\/19cc5cb758c73750a975662a88135e57\"},\"headline\":\"Seamless data protection even with mobile working\",\"datePublished\":\"2022-07-29T09:13:23+00:00\",\"dateModified\":\"2022-07-29T09:23:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/\"},\"wordCount\":1065,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/homeoffice_pixabay_small.jpg\",\"articleSection\":[\"Mobile Device Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/\",\"name\":\"Seamless data protection even with mobile working - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/homeoffice_pixabay_small.jpg\",\"datePublished\":\"2022-07-29T09:13:23+00:00\",\"dateModified\":\"2022-07-29T09:23:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/homeoffice_pixabay_small.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/homeoffice_pixabay_small.jpg\",\"width\":427,\"height\":625,\"caption\":\"Symbol photo homeoffice\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/mobile-device-management-en\\\/seamless-data-protection-even-with-mobile-working\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seamless data protection even with mobile working\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/person\\\/19cc5cb758c73750a975662a88135e57\",\"name\":\"IKARUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g\",\"caption\":\"IKARUS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seamless data protection even with mobile working - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/","og_locale":"en_US","og_type":"article","og_title":"Seamless data protection even with mobile working - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_published_time":"2022-07-29T09:13:23+00:00","article_modified_time":"2022-07-29T09:23:23+00:00","og_image":[{"width":427,"height":625,"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small.jpg","type":"image\/jpeg"}],"author":"IKARUS","twitter_card":"summary_large_image","twitter_creator":"@ikarusantivirus","twitter_site":"@ikarusantivirus","twitter_misc":{"Written by":"IKARUS","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/#article","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/"},"author":{"name":"IKARUS","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57"},"headline":"Seamless data protection even with mobile working","datePublished":"2022-07-29T09:13:23+00:00","dateModified":"2022-07-29T09:23:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/"},"wordCount":1065,"publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small.jpg","articleSection":["Mobile Device Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/","url":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/","name":"Seamless data protection even with mobile working - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small.jpg","datePublished":"2022-07-29T09:13:23+00:00","dateModified":"2022-07-29T09:23:23+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small.jpg","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small.jpg","width":427,"height":625,"caption":"Symbol photo homeoffice"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"Seamless data protection even with mobile working"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]},{"@type":"Person","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/19cc5cb758c73750a975662a88135e57","name":"IKARUS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46cf9dc27e41ec0f1b95682ae7f7770564edea3907510e025b63f4392c4aa7c2?s=96&d=mm&r=g","caption":"IKARUS"}}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/23114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=23114"}],"version-history":[{"count":8,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/23114\/revisions"}],"predecessor-version":[{"id":23123,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/23114\/revisions\/23123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media\/7817"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=23114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/categories?post=23114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=23114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}