{"id":785,"date":"2014-08-16T23:08:54","date_gmt":"2014-08-16T23:08:54","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=785"},"modified":"2016-09-11T00:57:42","modified_gmt":"2016-09-11T00:57:42","slug":"what-we-do","status":"publish","type":"page","link":"https:\/\/evosec.eu\/de\/what-we-do\/","title":{"rendered":"Was Wir Tun"},"content":{"rendered":"<h2><a href=\"\/security\"><i class=\"fa fa-shield fa-fw\"><\/i>IT-SICHERHEIT<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i><a href=\"http:\/\/evosec.eu\/smbs-fast-cyber-security-checklist\/\">Schnellen SMB-Check<\/a><\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>WebSite Security Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Netzwerk-Security-Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Server-Security-Audit<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Embedded Device Security Audit<\/li>\n<\/ul>\n<h2><a href=\"\/operations\"><i class=\"fa fa-heartbeat fa-fw\"><\/i>IT-BETRIEB<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Vernetzung<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Linux-Server<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Sicherungen \/ Ransomware-Nachweis Sicherungen<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>\u00dcberwachung von Webseiten, IPs\/IP reicht, Ger\u00e4ten etc.<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>3rd Party\/veraltete Protokolle Update\/Integrationen<\/li>\n<\/ul>\n<h2><a href=\"\/automation\"><i class=\"fa fa-cogs fa-fw\"><\/i>IT-AUTOMATISIERUNG<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Daten kriechen\/Parsen<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Automatisierte E-Mails<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Ma\u00dfgeschneiderte Anwendungen, Skripts oder L\u00f6sungen auf allgemein verf\u00fcgbaren embedded Boards &#8211; Raspberry PI, Arduino etc. ausgef\u00fchrt werden<\/li>\n<\/ul>\n<h2><a href=\"\/web-support\"><i class=\"fa fa-user fa-fw\"><\/i>WEB-SUPPORT<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Update, Monitor &#038; Patch: WordPress-basierte Websites &#038; Plugins<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Update, Monitor &#038; Patch: Joomla-basierte Websites, Plugins und Komponenten<\/li>\n<\/ul>\n<h2><a href=\"\/iot-devices-security-assessment\"><i class=\"fa fa-wifi fa-fw\"><\/i>IoT-Ger\u00e4te Sicherheit<\/a><\/h2>\n<ul class=\"fa-ul\" style=\"list-style-type: none\">\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Konfiguration zu pr\u00fcfen\/beheben<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Ungesicherte Protokolle\/Klartext-Passw\u00f6rter<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Reverse Engineering-Protokolle<\/li>\n<li><i class=\"fa-li fa fa-angle-right fa-fw\"><\/i>Festen Passw\u00f6rter, Backdoors, Standardeinstellungen<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>IT-SICHERHEIT Schnellen SMB-Check WebSite Security Audit Netzwerk-Security-Audit Server-Security-Audit Embedded Device Security Audit IT-BETRIEB Vernetzung Linux-Server Sicherungen \/ Ransomware-Nachweis Sicherungen \u00dcberwachung von Webseiten, IPs\/IP reicht, Ger\u00e4ten etc. 3rd Party\/veraltete Protokolle Update\/Integrationen IT-AUTOMATISIERUNG Daten kriechen\/Parsen Automatisierte E-Mails Ma\u00dfgeschneiderte Anwendungen, Skripts oder L\u00f6sungen auf allgemein verf\u00fcgbaren embedded Boards &#8211; Raspberry PI, Arduino etc. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-785","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"de","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":true,"content":true,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/de\/wp-json\/wp\/v2\/pages\/785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/de\/wp-json\/wp\/v2\/comments?post=785"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/de\/wp-json\/wp\/v2\/pages\/785\/revisions"}],"predecessor-version":[{"id":2132,"href":"https:\/\/evosec.eu\/de\/wp-json\/wp\/v2\/pages\/785\/revisions\/2132"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/de\/wp-json\/wp\/v2\/media?parent=785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}