{"id":626,"date":"2025-02-05T09:28:45","date_gmt":"2025-02-05T09:28:45","guid":{"rendered":"https:\/\/phishia.fr\/?page_id=626"},"modified":"2025-11-03T08:28:50","modified_gmt":"2025-11-03T08:28:50","slug":"phishing","status":"publish","type":"page","link":"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/sensibilisierung-ausbildung\/phishing\/","title":{"rendered":"Phishing"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"626\" class=\"elementor elementor-626\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0d55e6 e-flex e-con-boxed e-con e-parent\" data-id=\"d0d55e6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5d2f750 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"5d2f750\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-4dfe5be e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4dfe5be\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-47422dd e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"47422dd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46a7789 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"46a7789\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66c242c elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"66c242c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbc721f elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"dbc721f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing ist ein weit verbreiteter Cyberangriff, der darauf abzielt, Nutzer zu t\u00e4uschen, um \u00fcber betr\u00fcgerische E-Mails, Nachrichten oder Websites an vertrauliche Informationen zu gelangen.<\/p><p>Er ist zum Hauptvektor f\u00fcr das Eindringen in Unternehmen geworden (94% aller F\u00e4lle) und wurde immer raffinierter.<\/p><p>Die Sensibilisierung der Mitarbeiter durch Erfahrung ist ein wesentlicher Schutz gegen diese Bedrohung.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-beb1e60 e-con-full e-flex e-con e-child\" data-id=\"beb1e60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-281a009 elementor-align-right elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"281a009\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/de\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ich habe ein Projekt<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9152919 e-con-full e-flex e-con e-child\" data-id=\"9152919\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-52ab7b4 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"52ab7b4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b993d90 elementor-widget elementor-widget-text-editor\" data-id=\"b993d90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishia arbeitet mit <span style=\"text-decoration: underline;\"><a href=\"https:\/\/avantdecliquer.com\">Bevor Du klickst<\/a><\/span>\u00a0um die <strong>CIOs, CISOs, DSBs und F\u00fchrungskr\u00e4fte<\/strong> das Cyberrisiko drastisch senken.<\/p><p>Avant De Cliquer ist eine von der ANSSI und dem franz\u00f6sischen Cyber Malveillance Programm anerkannte und zertifizierte L\u00f6sung.<\/p><p>Avant De Click bietet eine <strong>Palette an Kampagnen zur Sensibilisierung f\u00fcr Phishing, die an das Kompetenzniveau der Mitarbeiter angepasst sind<\/strong> in Unternehmen mit de 1000 Templates. Diese Kampagnen reichen von Basisprogrammen f\u00fcr Anf\u00e4nger im Bereich Cybersicherheit bis hin zu fortgeschrittenen Kampagnen f\u00fcr die erfahrensten Mitarbeiter. Dieser personalisierte Ansatz stellt sicher, dass jedes Mitglied des Unternehmens eine angemessene Schulung erh\u00e4lt, um seine F\u00e4higkeit, Phishing-Angriffe zu erkennen und abzuwehren, zu st\u00e4rken.<\/p><p>Dar\u00fcber hinaus k\u00f6nnen wir entwerfen <strong>ma\u00dfgeschneiderte Kampagnen<\/strong> um den spezifischen Bed\u00fcrfnissen jedes Unternehmens gerecht zu werden.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-032d56a e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"032d56a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e27fb7e elementor-widget elementor-widget-image\" data-id=\"e27fb7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/avantdecliquer.com\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"592\" height=\"595\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-1.png\" class=\"attachment-medium_large size-medium_large wp-image-135\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-1.png 592w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-1-298x300.png 298w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Untitled-1-150x150.png 150w\" sizes=\"(max-width: 592px) 100vw, 592px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-169822f elementor-widget elementor-widget-image\" data-id=\"169822f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi-768x768.png\" class=\"attachment-medium_large size-medium_large wp-image-1897\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi-768x768.png 768w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi-300x300.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi-150x150.png 150w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/Anssi.png 800w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcc4f7c elementor-widget elementor-widget-image\" data-id=\"dcc4f7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"767\" height=\"488\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/cybermailveillance.png\" class=\"attachment-medium_large size-medium_large wp-image-1898\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/cybermailveillance.png 767w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/cybermailveillance-300x191.png 300w\" sizes=\"(max-width: 767px) 100vw, 767px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f040a5 e-con-full e-grid e-con e-child\" data-id=\"9f040a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6b6780d e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"6b6780d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e16d162 elementor-widget elementor-widget-heading\" data-id=\"e16d162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ziel: Das Risiko eines Cyberangriffs um den Faktor 10 senken<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a77afe elementor-widget elementor-widget-text-editor\" data-id=\"7a77afe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishia organisiert schrittweise Kampagnen zur Sensibilisierung f\u00fcr Phishing und entlastet die IT-Abteilung von dieser Aufgabe. Dieser Service unterst\u00fctzt Unternehmen bei der Einhaltung der DSGVO durch geeignete organisatorische Ma\u00dfnahmen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bc60d4 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3bc60d4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd151b3 elementor-widget elementor-widget-heading\" data-id=\"dd151b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ein Anstieg \u00fcber 12 Monate<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2de72f9 elementor-widget elementor-widget-text-editor\" data-id=\"2de72f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nach diesen zw\u00f6lf Monaten zeugen die Ergebnisse von einer erheblichen Verbesserung. Durch die gestaffelten Phishing-Kampagnen haben die Mitarbeiter eine erh\u00f6hte Wachsamkeit gegen\u00fcber Online-Bedrohungen entwickelt, wodurch das Risiko erfolgreicher Angriffe deutlich gesunken ist.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-153ef61 e-con-full e-flex e-con e-child\" data-id=\"153ef61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9d7abb7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"9d7abb7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e048f4b elementor-widget elementor-widget-heading\" data-id=\"e048f4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Learning by doing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b80f206 elementor-widget elementor-widget-text-editor\" data-id=\"b80f206\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hier ist ein Beispiel f\u00fcr eine Phishing-Mail, die wir innerhalb der Kampagne an Sie schicken k\u00f6nnen :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a23b035 elementor-widget elementor-widget-image\" data-id=\"a23b035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_.png\" data-elementor-open-lightbox=\"yes\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTg5OSwidXJsIjoiaHR0cHM6XC9cL3BoaXNoaWEuZnJcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjVcLzAzXC9GaXJlU2hvdC1DYXB0dXJlLTAwOC1QaGlzaGlhLUNhbXBhZ25lLWRlLVBoaXNoaW5nLXd3dy5waGlzaGlhLmZyXy5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1351\" height=\"691\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_.png\" class=\"attachment-full size-full wp-image-1899\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_.png 1351w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_-300x153.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_-1024x524.png 1024w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/03\/FireShot-Capture-008-Phishia-Campagne-de-Phishing-www.phishia.fr_-768x393.png 768w\" sizes=\"(max-width: 1351px) 100vw, 1351px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d8e9dc elementor-widget elementor-widget-text-editor\" data-id=\"5d8e9dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wenn der Nutzer auf den Link klickt, wird er entweder auf eine Anmeldeseite oder eine Seite zur Sensibilisierung weitergeleitet. In jedem Fall wird der Fortschritt des Nutzers nachverfolgt, sodass Kampagnen entsprechend seiner genauen Stufe vorgeschlagen werden k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e9b542e e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"e9b542e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c35e0d6 e-con-full e-flex e-con e-child\" data-id=\"c35e0d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b127bb3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"b127bb3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd10ef7 elementor-widget elementor-widget-heading\" data-id=\"cd10ef7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Unser Blog<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e286e2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6e286e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6cbce2 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"b6cbce2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Informieren Sie sich \u00fcber die neuesten Nachrichten und Trends im Bereich Steuerung und Einhaltung von Vorschriften.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bb07bc elementor-grid-tablet-1 elementor-widget-tablet__width-initial elementor-grid-3 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"3bb07bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:208,&quot;masonry&quot;:&quot;yes&quot;,&quot;columns_tablet&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4300 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4300 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2026\/02\/SECTEUR-PUBLIC-COLLECTIVITES.png\");}<\/style><style id=\"loop-208\">.elementor-208 .elementor-element.elementor-element-5df6e6f{--display:flex;--min-height:0px;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;}.elementor-widget-post-info .elementor-icon-list-item:not(:last-child):after{border-color:var( --e-global-color-text );}.elementor-widget-post-info .elementor-icon-list-icon i{color:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-icon svg{fill:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-text, .elementor-widget-post-info .elementor-icon-list-text a{color:var( --e-global-color-secondary );}.elementor-widget-post-info .elementor-icon-list-item{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon{width:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon i{font-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon svg{--e-icon-list-icon-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text, .elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text a{color:var( --e-global-color-ae5c0d5 );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-item{font-family:\"Space Grotesk\", Sans-serif;font-size:14px;font-weight:600;text-transform:uppercase;letter-spacing:2.2px;}.elementor-208 .elementor-element.elementor-element-5a4044e > .elementor-widget-container{margin:0px 0px 0px 0px;padding:7px 10px 4px 10px;background-color:#1446A066;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-ae5c0d5 );border-radius:8px 8px 8px 8px;}.elementor-208 .elementor-element.elementor-element-5a4044e.elementor-element{--align-self:flex-start;}body:not(.rtl) .elementor-208 .elementor-element.elementor-element-5a4044e{left:10px;}body.rtl .elementor-208 .elementor-element.elementor-element-5a4044e{right:10px;}.elementor-208 .elementor-element.elementor-element-5a4044e{top:10px;}.elementor-208 .elementor-element.elementor-element-cafbeac{--display:flex;--min-height:300px;--border-radius:5px 5px 5px 5px;box-shadow:0px 8px 24px 0px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.2);}.elementor-208 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .elementor-208 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-secondary );background-repeat:no-repeat;background-size:cover;}.elementor-208 .elementor-element.elementor-element-cafbeac:hover{box-shadow:0px 8px 24px 8px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.3);}.elementor-208 .elementor-element.elementor-element-466dfd9{--display:flex;--flex-direction:row;--container-widget-width:calc( ( 1 - var( --container-widget-flex-grow ) ) * 100% );--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--justify-content:flex-start;--align-items:flex-start;--gap:25px 25px;--row-gap:25px;--column-gap:25px;}.elementor-widget-image .widget-image-caption{color:var( --e-global-color-text );font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-c50e89f img{width:30px;filter:brightness( 100% ) contrast( 100% ) saturate( 0% ) blur( 0px ) hue-rotate( 0deg );}.elementor-208 .elementor-element.elementor-element-c50e89f > .elementor-widget-container{margin:-5px 15px 0px 0px;padding:0px 0px 0px 0px;}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );color:var( --e-global-color-primary );}.elementor-208 .elementor-element.elementor-element-0dd511b{text-align:start;}.elementor-208 .elementor-element.elementor-element-0dd511b .elementor-heading-title{font-family:\"Montserrat\", Sans-serif;font-size:16px;font-weight:500;color:var( --e-global-color-text );}@media(max-width:767px){.elementor-208 .elementor-element.elementor-element-466dfd9{--flex-direction:row;--container-widget-width:initial;--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--flex-wrap:nowrap;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4300 post-4300 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/aipd-warum-die-dimpact-analyse-das-rechtliche-schild-der-gemeinden-im-jahr-2026-ist\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/aipd-warum-die-dimpact-analyse-das-rechtliche-schild-der-gemeinden-im-jahr-2026-ist\/\">AIPD: Warum die Folgenabsch\u00e4tzung 2026 der rechtliche Schutzschild f\u00fcr Gemeinden ist<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4123 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4123 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4123 post-4123 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite category-surveillance tag-aeronautique\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/de\/blog\/tag\/luftfahrt\/\" class=\"elementor-post-info__terms-list-item\">Luft- und Raumfahrt<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/der-dominoeffekt-von-cyber-warum-leasa-und-part-is-sie-zwingen-ihre-lieferanten-zu-uberwachen\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/der-dominoeffekt-von-cyber-warum-leasa-und-part-is-sie-zwingen-ihre-lieferanten-zu-uberwachen\/\">Der Dominoeffekt von Cyber. Warum EASA und Part IS Sie verpflichten, Ihre Lieferanten zu \u00fcberwachen.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-3854 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-3854 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Capture-decran-2024-10-03-a-17.32.55.png\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-3854 post-3854 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite tag-sante\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/de\/blog\/tag\/gesundheit\/\" class=\"elementor-post-info__terms-list-item\">Gesundheit<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/programme-care-domaine-2-eine-finanzierung-fur-ihre-sozialmedizinische-einrichtung\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/programme-care-domaine-2-eine-finanzierung-fur-ihre-sozialmedizinische-einrichtung\/\">CaRE-Programm - Bereich 2: Eine Finanzierung f\u00fcr Ihr Pflegeheim.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e54602d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e54602d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/de\/blog\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Entdecken Sie alle unsere Artikel<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Phishing Le phishing est une attaque cybern\u00e9tique courante visant \u00e0 tromper les utilisateurs pour obtenir des informations confidentielles via des courriels, messages ou sites frauduleux. Devenu le principal vecteur d&rsquo;intrusion dans les entreprises (94% des cas), il s&rsquo;est sophistiqu\u00e9. Sensibiliser le personnel par l&rsquo;exp\u00e9rience est une protection essentielle contre cette menace. J&rsquo;ai un projet Phishia [&hellip;]<\/p>","protected":false},"author":2,"featured_media":414,"parent":624,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-626","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing - Phishia<\/title>\n<meta name=\"description\" content=\"Les attaques de phishing sont devenues de plus en plus sophistiqu\u00e9es et surtout, le premier vecteur d&#039;entr\u00e9e dans les SI des entreprises.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/sensibilisierung-ausbildung\/phishing\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing - Phishia\" \/>\n<meta property=\"og:description\" content=\"Les attaques de phishing sont devenues de plus en plus sophistiqu\u00e9es et surtout, le premier vecteur d&#039;entr\u00e9e dans les SI des entreprises.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/sensibilisierung-ausbildung\/phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-03T08:28:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/\",\"url\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/\",\"name\":\"Phishing - Phishia\",\"isPartOf\":{\"@id\":\"https:\/\/phishia.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg\",\"datePublished\":\"2025-02-05T09:28:45+00:00\",\"dateModified\":\"2025-11-03T08:28:50+00:00\",\"description\":\"Les attaques de phishing sont devenues de plus en plus sophistiqu\u00e9es et surtout, le premier vecteur d'entr\u00e9e dans les SI des entreprises.\",\"breadcrumb\":{\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/phishia.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sensibilisation et formation\",\"item\":\"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/phishia.fr\/#website\",\"url\":\"https:\/\/phishia.fr\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\/\/phishia.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/phishia.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/phishia.fr\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\/\/phishia.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/phishia\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing - Phishia","description":"Phishing-Angriffe sind immer raffinierter geworden und vor allem der wichtigste Vektor f\u00fcr das Eindringen in die IS von Unternehmen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/sensibilisierung-ausbildung\/phishing\/","og_locale":"de_DE","og_type":"article","og_title":"Phishing - Phishia","og_description":"Les attaques de phishing sont devenues de plus en plus sophistiqu\u00e9es et surtout, le premier vecteur d'entr\u00e9e dans les SI des entreprises.","og_url":"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/sensibilisierung-ausbildung\/phishing\/","og_site_name":"Phishia","article_modified_time":"2025-11-03T08:28:50+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/","url":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/","name":"Phishing - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg","datePublished":"2025-02-05T09:28:45+00:00","dateModified":"2025-11-03T08:28:50+00:00","description":"Phishing-Angriffe sind immer raffinierter geworden und vor allem der wichtigste Vektor f\u00fcr das Eindringen in die IS von Unternehmen.","breadcrumb":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/1666275580877.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/pilotage-et-conformite\/"},{"@type":"ListItem","position":3,"name":"Sensibilisation et formation","item":"https:\/\/phishia.fr\/pilotage-et-conformite\/sensibilisation-formation\/"},{"@type":"ListItem","position":4,"name":"Phishing"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT-Beratung, Cybersicherheit, Nachhaltigkeit","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages\/626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/comments?post=626"}],"version-history":[{"count":16,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages\/626\/revisions"}],"predecessor-version":[{"id":3626,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages\/626\/revisions\/3626"}],"up":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages\/624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/media?parent=626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}