{"id":3566,"date":"2020-11-26T14:38:53","date_gmt":"2020-11-26T13:38:53","guid":{"rendered":"https:\/\/webnew.gmz-it.de\/?page_id=3566"},"modified":"2025-09-09T10:37:50","modified_gmt":"2025-09-09T08:37:50","slug":"it-security","status":"publish","type":"page","link":"https:\/\/www.gmz-it.de\/index.php\/it-security\/","title":{"rendered":"IT-Security"},"content":{"rendered":"<div data-colibri-id=\"3566-c1\" class=\"style-3288 style-local-3566-c1 position-relative\">\n  <!---->\n  <div data-colibri-component=\"section\" data-colibri-id=\"3566-c2\" id=\"about\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-4432 style-local-3566-c2 position-relative\">\n    <!---->\n    <!---->\n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      <!---->\n      <div data-colibri-id=\"3566-c3\" class=\"h-row-container gutters-row-lg-0 gutters-row-md-0 gutters-row-2 gutters-row-v-lg-0 gutters-row-v-md-0 gutters-row-v-0 style-4433 style-local-3566-c3 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-0 gutters-col-md-0 gutters-col-2 gutters-col-v-lg-0 gutters-col-v-md-0 gutters-col-v-0\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-4434-outer style-local-3566-c4-outer\">\n            <div data-colibri-id=\"3566-c4\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-4434 style-local-3566-c4 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-center align-self-md-center align-self-center\">\n                <!---->\n                <div data-colibri-id=\"3566-c5\" class=\"h-global-transition-all h-heading style-4435 style-local-3566-c5 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-heading__outer style-4435 style-local-3566-c5\">\n                    <!---->\n                    <!---->\n                    <h2 class=\"\"><span style=\"font-family: &quot;Playfair Display&quot;;\">IT-SECURITY<\/span>&nbsp;<\/h2>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"3566-c6\" class=\"h-lead h-text h-text-component style-4436 style-local-3566-c6 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p>WISSENSWERTES<\/p>\n                  <\/div>\n                <\/div>\n                <div data-colibri-id=\"3566-c7\" class=\"h-text h-text-component style-4437 style-local-3566-c7 position-relative h-element\">\n                  <!---->\n                  <!---->\n                  <div class=\"\">\n                    <p>Unter IT-Sicherheit, die ein Bereich der Informationstechnik (eng. IT-Security) ist, versteht man Sicherheitsma\u00dfnahmen zum Schutz von EDV-Ger\u00e4ten (Computer, Smartphones usw.) und Computernetzen (private und \u00f6ffentliche Netze, einschlie\u00dflich\n                      Internet). Sie umfasst die technischen, rechtlichen und organisatorischen Ma\u00dfnahmen, die erforderlich sind, um den Zugang zu Daten nur autorisierten Personen zu erm\u00f6glichen. Das ist der Zustand des Informationssystems, in dem es\n                      am wenigsten anf\u00e4llig f\u00fcr Sch\u00e4den von au\u00dfen ist.<\/p>\n                    <p>Durch die Informationssicherheit soll das Manipulieren von Daten und Systemen durch unautorisierte Drittpersonen verhindert werden. Der Sinn dahinter ist, dass soziotechnische Systeme, also Mensch und Technologie, innerhalb von Unternehmen\n                      \/ Organisationen und deren Daten gegen Sch\u00e4den und Bedrohungen gesch\u00fctzt werden. Dabei ist nicht nur die Rede von Informationen und Daten, sondern auch physische Rechenzentren oder Cloud-Dienste.<\/p>\n                    <p>Die Vertraulichkeit der Informationssicherheit meint, dass die Informationen nur bestimmten Befugten zug\u00e4nglich sind. Die zum Beispiel darin enthaltenen Daten darf nur ein gewisser Personenkreis abrufen k\u00f6nnen. Es muss so zu sagen\n                      ein Zugriffsschutz definiert werden. Dies hat zur Folge, dass auch Zugriffsrechte vergeben werden m\u00fcssen.<\/p>\n                    <p>Ein weiterer zentraler Punkt in der Vertraulichkeit der Informationen ist der Transport der Daten. Dieser sollte immer verschl\u00fcsselt sein \u2013 symmetrisch oder asymmetrisch. Somit erhalten unautorisierte Personen keinen Zugriff auf die\n                      Inhalte.<\/p>\n                    <p>\n                      <br>\n                    <\/p>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-4438-outer style-local-3566-c8-outer\">\n            <div data-colibri-id=\"3566-c8\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-0 h-px-md-0 h-px-2 v-inner-lg-0 v-inner-md-0 v-inner-2 style-4438 style-local-3566-c8 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-center align-self-md-center align-self-center\">\n                <!---->\n                <div data-colibri-id=\"3566-c9\" class=\"style-4439 style-local-3566-c9 position-relative h-element\">\n                  <!---->\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n  <div data-colibri-component=\"section\" data-colibri-id=\"3566-c10\" id=\"reusable-sections\" class=\"h-section h-section-global-spacing d-flex align-items-lg-center align-items-md-center align-items-center style-3289 style-local-3566-c10 position-relative\">\n    <!---->\n    <!---->\n    <div class=\"h-section-grid-container h-section-boxed-container\">\n      <!---->\n      <div data-colibri-id=\"3566-c11\" class=\"h-row-container gutters-row-lg-2 gutters-row-md-2 gutters-row-0 gutters-row-v-lg-2 gutters-row-v-md-2 gutters-row-v-2 style-3290 style-local-3566-c11 position-relative\">\n        <!---->\n        <div class=\"h-row justify-content-lg-center justify-content-md-center justify-content-center align-items-lg-stretch align-items-md-stretch align-items-stretch gutters-col-lg-2 gutters-col-md-2 gutters-col-0 gutters-col-v-lg-2 gutters-col-v-md-2 gutters-col-v-2\">\n          <!---->\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-3291-outer style-local-3566-c12-outer\">\n            <div data-colibri-id=\"3566-c12\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-3291 style-local-3566-c12 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-center align-self-md-center align-self-center\">\n                <!---->\n                <div data-colibri-id=\"3566-c13\" class=\"h-x-container style-3292 style-local-3566-c13 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-x-container-inner style-dynamic-3566-c13-group style-3292-spacing style-local-3566-c13-spacing\"><span class=\"h-link__outer style-3293-outer style-local-3566-c14-outer d-inline-flex h-element\"><a h-use-smooth-scroll=\"true\" href=\"\"  data-colibri-id=\"3566-c14\" class=\"d-flex w-100 align-items-center h-link style-3293 style-local-3566-c14 position-relative\"><!----><!----> <span>Datenschutzerkl\u00e4rung<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-3294-outer style-local-3566-c15-outer\">\n            <div data-colibri-id=\"3566-c15\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-3294 style-local-3566-c15 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-center align-self-md-center align-self-center\">\n                <!---->\n                <div data-colibri-id=\"3566-c16\" class=\"h-x-container style-3295 style-local-3566-c16 position-relative h-element\">\n                  <!---->\n                  <div class=\"h-x-container-inner style-dynamic-3566-c16-group style-3295-spacing style-local-3566-c16-spacing\"><span class=\"h-link__outer style-3296-outer style-local-3566-c17-outer d-inline-flex h-element\"><a h-use-smooth-scroll=\"true\" href=\"\"  data-colibri-id=\"3566-c17\" class=\"d-flex w-100 align-items-center h-link style-3296 style-local-3566-c17 position-relative\"><!----><!----> <span>Impressum<\/span><\/a>\n                    <\/span>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n          <div class=\"h-column h-column-container d-flex h-col-lg-auto h-col-md-auto h-col-auto style-3297-outer style-local-3566-c18-outer\">\n            <div data-colibri-id=\"3566-c18\" class=\"d-flex h-flex-basis h-column__inner h-px-lg-2 h-px-md-2 h-px-2 v-inner-lg-2 v-inner-md-2 v-inner-2 style-3297 style-local-3566-c18 position-relative\">\n              <!---->\n              <!---->\n              <div class=\"w-100 h-y-container h-column__content h-column__v-align flex-basis-100 align-self-lg-start align-self-md-start align-self-start\">\n                <!---->\n                <div data-colibri-id=\"3566-c19\" class=\"style-3298 style-local-3566-c19 position-relative h-element\">\n                  <!---->\n                  <div class=\"d-flex flex-wrap h-social-icons justify-content-lg-center justify-content-md-center justify-content-center\">\n                    <div class=\"social-icon-container d-inline-flex\">\n                      <div class=\"icon-container h-social-icon h-global-transition\">\n                        <div class=\"h-icon-svg\" style=\"width: 100%; height: 100%;\">\n                          <!--Icon by Socicon (http:\/\/www.socicon.com)-->\n                          <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1500 1500\">\n\n                            <path d=\"M750 134.766c202.148 0 222.656 2.93 301.758 5.859 76.172 2.93 114.258 14.648 140.625 23.438 35.156 14.648 61.523 32.227 84.961 55.664 26.367 26.367 43.945 52.734 55.664 84.961 11.719 29.297 23.438 67.383 26.367 140.625 2.93 82.031 5.859 102.539 5.859 304.688s-2.93 222.656-5.859 301.758c-2.93 76.172-14.648 114.258-23.438 140.625-14.648 35.156-32.227 61.523-55.664 84.961-26.367 26.367-52.734 43.945-84.961 55.664-29.297 11.719-67.383 23.438-140.625 26.367-82.031 2.93-102.539 5.859-304.688 5.859s-222.656-2.93-301.758-5.859c-76.172-2.93-114.258-14.648-140.625-23.438-35.156-14.648-61.523-32.227-84.961-55.664-26.367-26.367-43.945-52.734-55.664-84.961-11.719-29.297-23.438-67.383-26.367-140.625-2.93-82.031-5.859-102.539-5.859-304.688s2.93-222.656 5.859-301.758c2.93-76.172 14.648-114.258 23.438-140.625 14.648-35.156 32.227-61.523 55.664-84.961 26.367-26.367 52.734-43.945 84.961-55.664 29.297-11.719 67.383-23.438 140.625-26.367 82.031-2.93 102.539-5.859 304.688-5.859M750 0c-205.078 0-228.516 2.93-307.617 5.859-82.031 2.93-137.695 14.648-181.641 32.227-49.805 20.508-93.75 46.875-134.766 87.891s-67.383 84.961-87.891 134.766c-17.578 46.875-29.297 99.609-32.227 181.641-2.93 79.102-5.859 102.539-5.859 307.617s2.93 228.516 5.859 307.617c2.93 82.031 14.648 137.695 32.227 181.641 20.508 49.805 46.875 93.75 87.891 134.766s84.961 67.383 134.766 87.891c46.875 17.578 99.609 29.297 181.641 32.227 79.102 2.93 102.539 5.859 307.617 5.859s228.516-2.93 307.617-5.859c82.031-2.93 137.695-14.648 181.641-32.227 49.805-20.508 93.75-46.875 134.766-87.891s67.383-84.961 87.891-134.766c17.578-46.875 29.297-99.609 32.227-181.641 2.93-79.102 5.859-102.539 5.859-307.617s-2.93-228.516-5.859-307.617c-2.93-82.031-14.648-137.695-32.227-181.641-20.508-49.805-46.875-93.75-87.891-134.766s-84.961-67.383-134.766-87.891c-46.875-17.578-99.609-29.297-181.641-32.227-79.102-2.93-102.539-5.859-307.617-5.859zM750 363.281c-213.867 0-386.719 172.852-386.719 386.719s172.852 386.719 386.719 386.719c213.867 0 386.719-172.852 386.719-386.719s-172.852-386.719-386.719-386.719zM750 1001.953c-137.695 0-251.953-114.258-251.953-251.953s114.258-251.953 251.953-251.953c137.695 0 251.953 114.258 251.953 251.953s-114.258 251.953-251.953 251.953zM1239.258 348.633c0 49.805-38.086 90.82-87.891 90.82s-90.82-41.016-90.82-90.82c0-49.805 41.016-87.891 90.82-87.891s87.891 38.086 87.891 87.891z\"><\/path>\n                          <\/svg>\n                        <\/div>\n                      <\/div>\n                    <\/div>\n                    <div class=\"social-icon-container d-inline-flex\">\n                      <div class=\"icon-container h-social-icon h-global-transition\">\n                        <div class=\"h-icon-svg\" style=\"width: 100%; height: 100%;\">\n                          <!--Icon by Socicon (http:\/\/www.socicon.com)-->\n                          <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1500 1500\">\n\n                            <path d=\"M360.352 1051.758h-216.797c-11.719 0-20.508-5.859-26.367-14.648s-5.859-23.438 0-35.156l228.516-404.297c0 0 0 0 0-2.93l-146.484-251.953c-5.859-11.719-5.859-23.438 0-32.227s14.648-14.648 29.297-14.648h216.797c32.227 0 49.805 20.508 58.594 41.016 0 0 149.414 257.813 149.414 257.813-8.789 17.578-234.375 413.086-234.375 413.086-11.719 20.508-26.367 43.945-58.594 43.945zM1382.813 46.875l-477.539 846.68c0 0 0 2.93 0 2.93l304.688 556.641c5.859 11.719 5.859 23.438 0 32.227s-14.648 14.648-29.297 14.648h-216.797c-32.227 0-46.875-23.438-58.594-41.016 0 0-307.617-562.5-307.617-565.43 14.648-26.367 480.469-852.539 480.469-852.539 11.719-20.508 26.367-41.016 58.594-41.016h219.727c11.719 0 23.438 5.859 26.367 14.648 5.859 8.789 5.859 20.508 0 32.227z\"><\/path>\n                          <\/svg>\n                        <\/div>\n                      <\/div>\n                    <\/div>\n                    <div class=\"social-icon-container d-inline-flex\">\n                      <div class=\"icon-container h-social-icon h-global-transition\">\n                        <div class=\"h-icon-svg\" style=\"width: 100%; height: 100%;\">\n                          <!--Icon by Socicon (http:\/\/www.socicon.com)-->\n                          <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1500 1500\">\n\n                            <path d=\"M1122.070 767.578c-20.508-23.438-55.664-35.156-105.469-35.156-64.453 0-108.398 20.508-134.766 55.664-26.367 38.086-38.086 90.82-38.086 158.203v512.695c0 8.789-2.93 17.578-11.719 26.367-5.859 5.859-17.578 11.719-26.367 11.719h-269.531c-8.789 0-17.578-5.859-26.367-11.719-5.859-8.789-11.719-17.578-11.719-26.367v-946.289c0-8.789 5.859-17.578 11.719-26.367 8.789-5.859 17.578-11.719 26.367-11.719h260.742c8.789 0 17.578 2.93 23.438 5.859s8.789 11.719 11.719 20.508c0 8.789 2.93 17.578 2.93 20.508s0 11.719 0 23.438c67.383-64.453 158.203-93.75 266.602-93.75 125.977 0 222.656 29.297 292.969 90.82 70.313 64.453 105.469 155.273 105.469 278.32v638.672c0 8.789-2.93 17.578-11.719 26.367-5.859 5.859-17.578 11.719-26.367 11.719h-275.391c-8.789 0-17.578-5.859-26.367-11.719-5.859-8.789-11.719-17.578-11.719-26.367v-577.148c0-49.805-8.789-87.891-26.367-114.258zM310.547 313.477c-35.156 35.156-79.102 52.734-128.906 52.734s-93.75-17.578-128.906-52.734c-35.156-35.156-52.734-76.172-52.734-128.906 0-49.805 17.578-90.82 52.734-125.977s79.102-55.664 128.906-55.664c49.805 0 93.75 20.508 128.906 55.664s52.734 76.172 52.734 125.977c0 52.734-17.578 93.75-52.734 128.906zM354.492 512.695v946.289c0 8.789-5.859 17.578-11.719 26.367-8.789 5.859-17.578 11.719-26.367 11.719h-269.531c-8.789 0-17.578-5.859-26.367-11.719-5.859-8.789-11.719-17.578-11.719-26.367v-946.289c0-8.789 5.859-17.578 11.719-26.367 8.789-5.859 17.578-11.719 26.367-11.719h269.531c8.789 0 17.578 5.859 26.367 11.719 5.859 8.789 11.719 17.578 11.719 26.367z\"><\/path>\n                          <\/svg>\n                        <\/div>\n                      <\/div>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>IT-SECURITY&nbsp; WISSENSWERTES Unter IT-Sicherheit, die ein Bereich der Informationstechnik (eng. IT-Security) ist, versteht man Sicherheitsma\u00dfnahmen zum Schutz von EDV-Ger\u00e4ten (Computer, Smartphones usw.) und Computernetzen (private und \u00f6ffentliche Netze, einschlie\u00dflich Internet). Sie umfasst die technischen, rechtlichen und organisatorischen Ma\u00dfnahmen, die erforderlich sind, um den Zugang zu Daten nur autorisierten Personen zu erm\u00f6glichen. Das ist der Zustand [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width-page.php","meta":{"footnotes":""},"class_list":["post-3566","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Security - GMZ Informationstechnik GmbH<\/title>\n<meta name=\"description\" content=\"IT-Security - Sie wollen mehr \u00fcber die Fachbegriffe in der IT erfahren? Dann schauen Sie auf unserer Wissensseite vorbei! \u2713 Hier klicken!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gmz-it.de\/index.php\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Security - GMZ Informationstechnik GmbH\" \/>\n<meta property=\"og:description\" content=\"IT-Security - Sie wollen mehr \u00fcber die Fachbegriffe in der IT erfahren? Dann schauen Sie auf unserer Wissensseite vorbei! \u2713 Hier klicken!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gmz-it.de\/index.php\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"GMZ Informationstechnik GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T08:37:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.gmz-it.de\\\/index.php\\\/it-security\\\/\",\"url\":\"https:\\\/\\\/www.gmz-it.de\\\/index.php\\\/it-security\\\/\",\"name\":\"IT-Security - GMZ Informationstechnik GmbH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.gmz-it.de\\\/#website\"},\"datePublished\":\"2020-11-26T13:38:53+00:00\",\"dateModified\":\"2025-09-09T08:37:50+00:00\",\"description\":\"IT-Security - Sie wollen mehr \u00fcber die Fachbegriffe in der IT erfahren? Dann schauen Sie auf unserer Wissensseite vorbei! \u2713 Hier klicken!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.gmz-it.de\\\/index.php\\\/it-security\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.gmz-it.de\\\/index.php\\\/it-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.gmz-it.de\\\/index.php\\\/it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.gmz-it.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.gmz-it.de\\\/#website\",\"url\":\"https:\\\/\\\/www.gmz-it.de\\\/\",\"name\":\"GMZ Informationstechnik GmbH\",\"description\":\"Your IT is... where you need it\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.gmz-it.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.gmz-it.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.gmz-it.de\\\/#organization\",\"name\":\"GMZ Informationstechnik GmbH\",\"url\":\"https:\\\/\\\/www.gmz-it.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.gmz-it.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.gmz-it.de\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cropped-GMZ_Logo-Kopf-Office-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.gmz-it.de\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/cropped-GMZ_Logo-Kopf-Office-2.jpg\",\"width\":1018,\"height\":438,\"caption\":\"GMZ Informationstechnik GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.gmz-it.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT-Security - GMZ Informationstechnik GmbH","description":"IT-Security - Sie wollen mehr \u00fcber die Fachbegriffe in der IT erfahren? Dann schauen Sie auf unserer Wissensseite vorbei! \u2713 Hier klicken!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gmz-it.de\/index.php\/it-security\/","og_locale":"de_DE","og_type":"article","og_title":"IT-Security - GMZ Informationstechnik GmbH","og_description":"IT-Security - Sie wollen mehr \u00fcber die Fachbegriffe in der IT erfahren? Dann schauen Sie auf unserer Wissensseite vorbei! \u2713 Hier klicken!","og_url":"https:\/\/www.gmz-it.de\/index.php\/it-security\/","og_site_name":"GMZ Informationstechnik GmbH","article_modified_time":"2025-09-09T08:37:50+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gmz-it.de\/index.php\/it-security\/","url":"https:\/\/www.gmz-it.de\/index.php\/it-security\/","name":"IT-Security - GMZ Informationstechnik GmbH","isPartOf":{"@id":"https:\/\/www.gmz-it.de\/#website"},"datePublished":"2020-11-26T13:38:53+00:00","dateModified":"2025-09-09T08:37:50+00:00","description":"IT-Security - Sie wollen mehr \u00fcber die Fachbegriffe in der IT erfahren? Dann schauen Sie auf unserer Wissensseite vorbei! \u2713 Hier klicken!","breadcrumb":{"@id":"https:\/\/www.gmz-it.de\/index.php\/it-security\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gmz-it.de\/index.php\/it-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.gmz-it.de\/index.php\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.gmz-it.de\/"},{"@type":"ListItem","position":2,"name":"IT-Security"}]},{"@type":"WebSite","@id":"https:\/\/www.gmz-it.de\/#website","url":"https:\/\/www.gmz-it.de\/","name":"GMZ Informationstechnik GmbH","description":"Your IT is... where you need it","publisher":{"@id":"https:\/\/www.gmz-it.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gmz-it.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.gmz-it.de\/#organization","name":"GMZ Informationstechnik GmbH","url":"https:\/\/www.gmz-it.de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.gmz-it.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.gmz-it.de\/wp-content\/uploads\/2020\/07\/cropped-GMZ_Logo-Kopf-Office-2.jpg","contentUrl":"https:\/\/www.gmz-it.de\/wp-content\/uploads\/2020\/07\/cropped-GMZ_Logo-Kopf-Office-2.jpg","width":1018,"height":438,"caption":"GMZ Informationstechnik GmbH"},"image":{"@id":"https:\/\/www.gmz-it.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.gmz-it.de\/index.php\/wp-json\/wp\/v2\/pages\/3566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gmz-it.de\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gmz-it.de\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gmz-it.de\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gmz-it.de\/index.php\/wp-json\/wp\/v2\/comments?post=3566"}],"version-history":[{"count":4,"href":"https:\/\/www.gmz-it.de\/index.php\/wp-json\/wp\/v2\/pages\/3566\/revisions"}],"predecessor-version":[{"id":11186,"href":"https:\/\/www.gmz-it.de\/index.php\/wp-json\/wp\/v2\/pages\/3566\/revisions\/11186"}],"wp:attachment":[{"href":"https:\/\/www.gmz-it.de\/index.php\/wp-json\/wp\/v2\/media?parent=3566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}