{"version":"1.0","provider_name":"Industrial Services von Phoenix Contact","provider_url":"https:\/\/blog.phoenixcontact.com\/services","author_name":"Torsten Gast","title":"Bodyguards der Datenstr\u00f6me | Industrial Services von Phoenix Contact","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"l1v8ZvLaBL\"><a href=\"https:\/\/blog.phoenixcontact.com\/services\/bodyguards-der-datenstroeme\">Bodyguards der Datenstr\u00f6me<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.phoenixcontact.com\/services\/bodyguards-der-datenstroeme\/embed#?secret=l1v8ZvLaBL\" width=\"600\" height=\"338\" title=\"&#8222;Bodyguards der Datenstr\u00f6me&#8220; &#8211; Industrial Services von Phoenix Contact\" data-secret=\"l1v8ZvLaBL\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.phoenixcontact.com\/services\/wp-content\/uploads\/sites\/23\/2020\/11\/Security_B9-624x416-1.png","thumbnail_width":624,"thumbnail_height":416,"description":"Sie werden angegriffen. Jetzt, wo Sie diese Zeilen lesen. Fortw\u00e4hrend. Denn auch Ihre Server, Ihre Daten sind vernetzt. Was in Zeiten von Digitalisierung und Industrie 4.0 an sich ein Segen ist, kann sich auch als fatales Tor f\u00fcr Datendiebe erweisen. Im Rahmen der Cyber-Sicherheits-Umfrage 2017 des Bundesamts f\u00fcr Sicherheit in der Informationstechnik (BSI) gaben rund [&hellip;]"}