{"id":563,"date":"2025-11-05T07:32:32","date_gmt":"2025-11-05T07:32:32","guid":{"rendered":"https:\/\/micron.ds.mt\/?page_id=563"},"modified":"2026-04-08T07:12:50","modified_gmt":"2026-04-08T07:12:50","slug":"it-systemhaus-it-betreuung-2","status":"publish","type":"page","link":"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/","title":{"rendered":"IT-Sicherheit &amp; Datenschutz"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"563\" class=\"elementor elementor-563\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-494d532 e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"494d532\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5ccff91 e-flex e-con-boxed magic-button-disabled-no e-con e-child\" data-id=\"5ccff91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcb6f8f elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"dcb6f8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">IT-Sicherheit &amp; Datenschutz<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27a1d68 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"27a1d68\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Ganzheitliche Cybersecurity statt Insell\u00f6sungen \u2014 pr\u00e4ventiv, zuverl\u00e4ssig und verst\u00e4ndlich.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73e3902 e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"73e3902\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-615c4aa e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"615c4aa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4b57487 e-flex e-con-boxed magic-button-disabled-no e-con e-child\" data-id=\"4b57487\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-660fb3e elementor-widget elementor-widget-text-editor\" data-id=\"660fb3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"212\" data-end=\"395\">Moderne Unternehmen brauchen mehr als Virenschutz.<br data-start=\"262\" data-end=\"265\" \/>Cyberangriffe, Datenverlust und gesetzliche Anforderungen machen IT-Sicherheit und Datenschutz zu zentralen Erfolgsfaktoren. Wir sch\u00fctzen Ihre Systeme, Daten und Mitarbeitenden \u2014 mit klaren Sicherheitskonzepten, zuverl\u00e4ssigen Backups und praxisnahen Awareness-Ma\u00dfnahmen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc6552f e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"dc6552f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2444749 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2444749\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Herausforderungen<\/h3>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee15b95 e-grid e-con-full magic-button-disabled-no e-con e-child\" data-id=\"ee15b95\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0e0121e e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"0e0121e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8828ec elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"c8828ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-skull-crossbones\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M439.15 453.06L297.17 384l141.99-69.06c7.9-3.95 11.11-13.56 7.15-21.46L432 264.85c-3.95-7.9-13.56-11.11-21.47-7.16L224 348.41 37.47 257.69c-7.9-3.95-17.51-.75-21.47 7.16L1.69 293.48c-3.95 7.9-.75 17.51 7.15 21.46L150.83 384 8.85 453.06c-7.9 3.95-11.11 13.56-7.15 21.47l14.31 28.63c3.95 7.9 13.56 11.11 21.47 7.15L224 419.59l186.53 90.72c7.9 3.95 17.51.75 21.47-7.15l14.31-28.63c3.95-7.91.74-17.52-7.16-21.47zM150 237.28l-5.48 25.87c-2.67 12.62 5.42 24.85 16.45 24.85h126.08c11.03 0 19.12-12.23 16.45-24.85l-5.5-25.87c41.78-22.41 70-62.75 70-109.28C368 57.31 303.53 0 224 0S80 57.31 80 128c0 46.53 28.22 86.87 70 109.28zM280 112c17.65 0 32 14.35 32 32s-14.35 32-32 32-32-14.35-32-32 14.35-32 32-32zm-112 0c17.65 0 32 14.35 32 32s-14.35 32-32 32-32-14.35-32-32 14.35-32 32-32z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tWachsende Bedrohungen durch Cyberangriffe\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f251b12 elementor-widget elementor-widget-text-editor\" data-id=\"f251b12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"189\" data-end=\"240\">Cyberangriffe &amp; Ransomware werden immer gezielter<\/p><p data-start=\"243\" data-end=\"304\">Mitarbeiter fallen auf Phishing &amp; Social Engineering herein<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b8aa51 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"6b8aa51\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65cf886 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"65cf886\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M466.5 83.7l-192-80a48.15 48.15 0 0 0-36.9 0l-192 80C27.7 91.1 16 108.6 16 128c0 198.5 114.5 335.7 221.5 380.3 11.8 4.9 25.1 4.9 36.9 0C360.1 472.6 496 349.3 496 128c0-19.4-11.7-36.9-29.5-44.3zM256.1 446.3l-.1-381 175.9 73.3c-3.3 151.4-82.1 261.1-175.8 307.7z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tTechnische &amp; organisatorische Sicherheitsl\u00fccken\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b76f92 elementor-widget elementor-widget-text-editor\" data-id=\"4b76f92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"372\" data-end=\"427\">Veraltete oder fehlende Firewalls &amp; Schutzmechanismen<\/p><p data-start=\"430\" data-end=\"483\">Datenverlust durch Hardwarefehler oder Bedienfehler<\/p><p data-start=\"486\" data-end=\"533\">Sicherheitsaufgaben bleiben \u201enebenbei\u201c liegen<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47715c1 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"47715c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-80c1e0d elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"80c1e0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-clipboard-check\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M336 64h-80c0-35.3-28.7-64-64-64s-64 28.7-64 64H48C21.5 64 0 85.5 0 112v352c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V112c0-26.5-21.5-48-48-48zM192 40c13.3 0 24 10.7 24 24s-10.7 24-24 24-24-10.7-24-24 10.7-24 24-24zm121.2 231.8l-143 141.8c-4.7 4.7-12.3 4.6-17-.1l-82.6-83.3c-4.7-4.7-4.6-12.3.1-17L99.1 285c4.7-4.7 12.3-4.6 17 .1l46 46.4 106-105.2c4.7-4.7 12.3-4.6 17 .1l28.2 28.4c4.7 4.8 4.6 12.3-.1 17z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSteigende Anforderungen an Datenschutz &amp; Compliance\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8775a11 elementor-widget elementor-widget-text-editor\" data-id=\"8775a11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"622\" data-end=\"683\">Wachsende Anforderungen durch DSGVO &amp; Datenschutz<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e8df1e e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"7e8df1e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-459aaf3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"459aaf3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Unsere L\u00f6sung<\/h3>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6dc462a e-grid e-con-full magic-button-disabled-no e-con e-child\" data-id=\"6dc462a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fb675f8 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"fb675f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-651c228 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"651c228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-database\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M448 73.143v45.714C448 159.143 347.667 192 224 192S0 159.143 0 118.857V73.143C0 32.857 100.333 0 224 0s224 32.857 224 73.143zM448 176v102.857C448 319.143 347.667 352 224 352S0 319.143 0 278.857V176c48.125 33.143 136.208 48.572 224 48.572S399.874 209.143 448 176zm0 160v102.857C448 479.143 347.667 512 224 512S0 479.143 0 438.857V336c48.125 33.143 136.208 48.572 224 48.572S399.874 369.143 448 336z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDatensicherung &amp; Backup-L\u00f6sungen\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac25ede elementor-widget elementor-widget-text-editor\" data-id=\"ac25ede\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Automatisierte Backups &amp; Recovery-Strategien<\/p><p>Offsite- und Cloud-Backup-Konzepte<\/p><p>Regelm\u00e4\u00dfige Wiederherstellungstests<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff94f9d e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"ff94f9d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4329ac0 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"4329ac0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-viruses\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M624,352H611.88c-28.51,0-42.79-34.47-22.63-54.63l8.58-8.57a16,16,0,1,0-22.63-22.63l-8.57,8.58C546.47,294.91,512,280.63,512,252.12V240a16,16,0,0,0-32,0v12.12c0,28.51-34.47,42.79-54.63,22.63l-8.57-8.58a16,16,0,0,0-22.63,22.63l8.58,8.57c20.16,20.16,5.88,54.63-22.63,54.63H368a16,16,0,0,0,0,32h12.12c28.51,0,42.79,34.47,22.63,54.63l-8.58,8.57a16,16,0,1,0,22.63,22.63l8.57-8.58c20.16-20.16,54.63-5.88,54.63,22.63V496a16,16,0,0,0,32,0V483.88c0-28.51,34.47-42.79,54.63-22.63l8.57,8.58a16,16,0,1,0,22.63-22.63l-8.58-8.57C569.09,418.47,583.37,384,611.88,384H624a16,16,0,0,0,0-32ZM480,384a32,32,0,1,1,32-32A32,32,0,0,1,480,384ZM346.51,213.33h16.16a21.33,21.33,0,0,0,0-42.66H346.51c-38,0-57.05-46-30.17-72.84l11.43-11.44A21.33,21.33,0,0,0,297.6,56.23L286.17,67.66c-26.88,26.88-72.84,7.85-72.84-30.17V21.33a21.33,21.33,0,0,0-42.66,0V37.49c0,38-46,57.05-72.84,30.17L86.4,56.23A21.33,21.33,0,0,0,56.23,86.39L67.66,97.83c26.88,26.88,7.85,72.84-30.17,72.84H21.33a21.33,21.33,0,0,0,0,42.66H37.49c38,0,57.05,46,30.17,72.84L56.23,297.6A21.33,21.33,0,1,0,86.4,327.77l11.43-11.43c26.88-26.88,72.84-7.85,72.84,30.17v16.16a21.33,21.33,0,0,0,42.66,0V346.51c0-38,46-57.05,72.84-30.17l11.43,11.43a21.33,21.33,0,0,0,30.17-30.17l-11.43-11.43C289.46,259.29,308.49,213.33,346.51,213.33ZM160,192a32,32,0,1,1,32-32A32,32,0,0,1,160,192Zm80,32a16,16,0,1,1,16-16A16,16,0,0,1,240,224Z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tVirenschutz &amp; Firewall\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9bc0d24 elementor-widget elementor-widget-text-editor\" data-id=\"9bc0d24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Next-Gen-Antivirus &amp; Endpoint-Security<\/p><p>Firewall- &amp; Netzwerkschutz<\/p><p>Patch- und Update-Strategie<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-849c53a e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"849c53a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-556b5af elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"556b5af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-graduation-cap\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M622.34 153.2L343.4 67.5c-15.2-4.67-31.6-4.67-46.79 0L17.66 153.2c-23.54 7.23-23.54 38.36 0 45.59l48.63 14.94c-10.67 13.19-17.23 29.28-17.88 46.9C38.78 266.15 32 276.11 32 288c0 10.78 5.68 19.85 13.86 25.65L20.33 428.53C18.11 438.52 25.71 448 35.94 448h56.11c10.24 0 17.84-9.48 15.62-19.47L82.14 313.65C90.32 307.85 96 298.78 96 288c0-11.57-6.47-21.25-15.66-26.87.76-15.02 8.44-28.3 20.69-36.72L296.6 284.5c9.06 2.78 26.44 6.25 46.79 0l278.95-85.7c23.55-7.24 23.55-38.36 0-45.6zM352.79 315.09c-28.53 8.76-52.84 3.92-65.59 0l-145.02-44.55L128 384c0 35.35 85.96 64 192 64s192-28.65 192-64l-14.18-113.47-145.03 44.56z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSchulungen &amp; Awareness\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c8b10b elementor-widget elementor-widget-text-editor\" data-id=\"9c8b10b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Phishing-Simulationen &amp; Security-Trainings<\/p><p>Sensibilisieren f\u00fcr Datenschutz &amp; sichere Nutzung<\/p><p>Klare Anweisungen statt komplizierter Richtlinien<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-105a2e4 e-con-full e-flex magic-button-disabled-no e-con e-parent\" data-id=\"105a2e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-440ac8c elementor-widget elementor-widget-template\" data-id=\"440ac8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"866\" class=\"elementor elementor-866\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea69b87 e-con-full e-flex magic-button-disabled-no e-con e-parent\" data-id=\"5ea69b87\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-76b1bdd4 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"76b1bdd4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a47a942 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"a47a942\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fe695b0 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2fe695b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Warum micron Computersysteme?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a435f2 elementor-widget elementor-widget-text-editor\" data-id=\"6a435f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Bei uns haben Sie immer einen festen Ansprechpartner, der Ihre Systeme kennt. Unser Team ist bei Notf\u00e4llen rund um die Uhr erreichbar, arbeitet mit klar dokumentierten Prozessen und transparenten Kosten. Durch unsere regionale N\u00e4he erhalten Sie pers\u00f6nliche Betreuung erl\u00e4sslich, direkt und auf Augenh\u00f6he.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4db4b1cb e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"4db4b1cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-714a2074 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"714a2074\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ihre Spezialisten f\u00fcr IT<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53b71b87 elementor-widget elementor-widget-icon-box\" data-id=\"53b71b87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t+49 3693 88160\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tMontag bis Freitag von 8 bis 17 Uhr\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a2afefe elementor-align-left elementor-mobile-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"3a2afefe\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.microsoft.com\/de-de\/microsoft-365\/business\/scheduling-and-booking-app\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt Beratung anfragen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a5a1719 e-con-full e-flex magic-button-disabled-no e-con e-child\" data-id=\"2a5a1719\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58b8b6f3 elementor-widget elementor-widget-spacer\" data-id=\"58b8b6f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d10493 e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"3d10493\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8e481ba e-flex e-con-boxed magic-button-disabled-no e-con e-child\" data-id=\"8e481ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d7633d elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-toggle\" data-id=\"6d7633d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h4 id=\"elementor-tab-title-1141\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1141\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Reicht ein Antivirus-Programm f\u00fcr die Unternehmenssicherheit aus?<\/a>\n\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1141\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1141\"><p><span class=\"TextRun SCXW212198857 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212198857 BCX4\">Nein. Antivirus ist nur ein Baustein.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW212198857 BCX4\"><span class=\"SCXW212198857 BCX4\"> \u00a0<\/span><\/span><span class=\"TextRun SCXW212198857 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212198857 BCX4\">Sichere IT besteht aus Firewall-Schutz, Backup-Strategie, Monitoring, Zugriffsrechten, <\/span><span class=\"NormalTextRun SCXW212198857 BCX4\">Updates &amp; Schulung.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW212198857 BCX4\"><span class=\"SCXW212198857 BCX4\"> \u00a0<\/span><\/span><span class=\"TextRun SCXW212198857 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212198857 BCX4\">Wir kombinieren diese Bausteine in ein ganzheitliches Sicherheitskonzept.<\/span><\/span><span class=\"EOP SCXW212198857 BCX4\" data-ccp-props=\"{}\">\u00a0<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h4 id=\"elementor-tab-title-1142\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1142\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Wie stellen Sie sicher, dass Backups wirklich funktionieren?<\/a>\n\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1142\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1142\"><p><span class=\"TextRun SCXW212261837 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212261837 BCX4\">Wir testen Backups regelm\u00e4\u00dfig, pr\u00fcfen Wiederherstellungszeiten und dokumentieren Ergebnisse.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW212261837 BCX4\"><span class=\"SCXW212261837 BCX4\"> \u00a0<\/span><\/span><span class=\"TextRun SCXW212261837 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212261837 BCX4\">Backup-Strategien ohne Tests sind im Ernstfall wertlos.<\/span><\/span><span class=\"EOP SCXW212261837 BCX4\" data-ccp-props=\"{}\">\u00a0<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h4 id=\"elementor-tab-title-1143\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1143\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Was passiert, wenn wir einen Sicherheitsvorfall haben?<\/a>\n\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1143\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1143\"><p><span class=\"TextRun SCXW42993040 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW42993040 BCX4\">Wir reagieren sofort \u2013 ob <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW42993040 BCX4\">Remote<\/span><span class=\"NormalTextRun SCXW42993040 BCX4\"> oder vor Ort.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW42993040 BCX4\"><span class=\"SCXW42993040 BCX4\"> \u00a0<\/span><\/span><span class=\"TextRun SCXW42993040 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW42993040 BCX4\">Mit klaren Eskalationspfaden, forensischer Analyse und Wiederherstellungspl\u00e4nen.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW42993040 BCX4\"><span class=\"SCXW42993040 BCX4\">\u00a0<\/span><br class=\"SCXW42993040 BCX4\" \/><\/span><span class=\"TextRun SCXW42993040 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW42993040 BCX4\">Ziel: Schaden minimieren, Betrieb schnell sichern.<\/span><\/span><span class=\"EOP SCXW42993040 BCX4\" data-ccp-props=\"{}\">\u00a0<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c75b987 elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-toggle\" data-id=\"c75b987\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h4 id=\"elementor-tab-title-2091\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2091\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Wie helfen Sie uns im Bereich DSGVO & Compliance?<\/a>\n\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2091\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2091\"><p><span class=\"TextRun SCXW53758192 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW53758192 BCX4\">Wir erstellen sichere Identit\u00e4ts- und Rechtekonzepte, pr\u00fcfen Protokolle, dokumentieren Systeme und unterst\u00fctzen bei technischen Datenschutzma\u00dfnahmen.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW53758192 BCX4\"><span class=\"SCXW53758192 BCX4\">\u00a0<\/span><br class=\"SCXW53758192 BCX4\" \/><\/span><span class=\"TextRun SCXW53758192 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW53758192 BCX4\">Damit<\/span><span class=\"NormalTextRun SCXW53758192 BCX4\"> Datenschutz nicht zur Belastung, sondern zur Routine wird.<\/span><\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h4 id=\"elementor-tab-title-2092\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2092\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Bieten Sie Security-Awareness-Schulungen f\u00fcr Mitarbeiter an?<\/a>\n\t\t\t\t\t<\/h4>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2092\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2092\"><p><span class=\"TextRun SCXW224175292 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW224175292 BCX4\">Ja. <\/span><\/span><span class=\"TextRun SCXW224175292 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW224175292 BCX4\">Wir schulen Teams pragmatisch und verst\u00e4ndlich \u2013 nicht mit Angst, sondern mit Klarheit.<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW224175292 BCX4\"><span class=\"SCXW224175292 BCX4\"> \u00a0<\/span><\/span><span class=\"TextRun SCXW224175292 BCX4\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW224175292 BCX4\">Weil Technik sch\u00fctzt, aber Menschen entscheiden.<\/span><\/span><span class=\"EOP SCXW224175292 BCX4\" data-ccp-props=\"{}\">\u00a0<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c7effc e-flex e-con-boxed magic-button-disabled-no e-con e-parent\" data-id=\"5c7effc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-476aca6 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"476aca6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">IT, die mitw\u00e4chst.<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ee90bf elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"6ee90bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Wir bauen Systeme, die nicht nur heute funktionieren, sondern morgen noch tragen.\nVom stabilen Fundament bis zur sicheren Zukunft.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ba3cd3 elementor-widget elementor-widget-template\" data-id=\"7ba3cd3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"527\" class=\"elementor elementor-527\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7987860d e-grid e-con-full magic-button-disabled-no e-con e-child\" data-id=\"7987860d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3087c49 elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3087c49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-4\/\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1438\" src=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-infrastruktur-netzwerktechnik.webp\" class=\"elementor-animation-grow attachment-full size-full wp-image-1042\" alt=\"\" srcset=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-infrastruktur-netzwerktechnik.webp 2560w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-infrastruktur-netzwerktechnik-300x169.webp 300w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-infrastruktur-netzwerktechnik-1024x575.webp 1024w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-infrastruktur-netzwerktechnik-768x431.webp 768w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-infrastruktur-netzwerktechnik-1536x863.webp 1536w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-infrastruktur-netzwerktechnik-2048x1150.webp 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-4\/\">IT-Infrastruktur &amp; Netzwerktechnik<\/a><\/h4><p class=\"elementor-image-box-description\">Planung und Betreuung von Netzwerken, Hardware und WLAN-Systemen.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41503dc7 elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"41503dc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"2560\" height=\"1438\" src=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-sicherheit-datenschutz.webp\" class=\"elementor-animation-grow attachment-full size-full wp-image-1043\" alt=\"\" srcset=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-sicherheit-datenschutz.webp 2560w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-sicherheit-datenschutz-300x169.webp 300w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-sicherheit-datenschutz-1024x575.webp 1024w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-sicherheit-datenschutz-768x431.webp 768w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-sicherheit-datenschutz-1536x863.webp 1536w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-it-sicherheit-datenschutz-2048x1150.webp 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/\">IT-Sicherheit &amp; Datenschutz<\/a><\/h4><p class=\"elementor-image-box-description\">Schutz vor Angriffen und Datenverlust durch Firewalls, Backups und Schulungen.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65b31937 elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"65b31937\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-3\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"2560\" height=\"1441\" src=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-cloud-serverloesungen.webp\" class=\"elementor-animation-grow attachment-full size-full wp-image-1040\" alt=\"\" srcset=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-cloud-serverloesungen.webp 2560w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-cloud-serverloesungen-300x169.webp 300w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-cloud-serverloesungen-1024x576.webp 1024w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-cloud-serverloesungen-768x432.webp 768w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-cloud-serverloesungen-1536x865.webp 1536w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-cloud-serverloesungen-2048x1153.webp 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-3\/\">Cloud &amp; Serverl\u00f6sungen<\/a><\/h4><p class=\"elementor-image-box-description\">Planung, Hosting und Migration von Servern und Cloud-Systemen.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-675159c5 elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"675159c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-3-2\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1081\" src=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-digitalisierung-automatisierung.webp\" class=\"elementor-animation-grow attachment-full size-full wp-image-1041\" alt=\"\" srcset=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-digitalisierung-automatisierung.webp 1920w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-digitalisierung-automatisierung-300x169.webp 300w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-digitalisierung-automatisierung-1024x577.webp 1024w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-digitalisierung-automatisierung-768x432.webp 768w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-digitalisierung-automatisierung-1536x865.webp 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-3-2\/\">Digitalisierung &amp; Automatisierung<\/a><\/h4><p class=\"elementor-image-box-description\">Analyse und Optimierung von Abl\u00e4ufen durch digitale Prozesse.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28f1f6df elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"28f1f6df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/monitoring\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1438\" src=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-monitoring.webp\" class=\"elementor-animation-grow attachment-full size-full wp-image-1045\" alt=\"\" srcset=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-monitoring.webp 2560w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-monitoring-300x169.webp 300w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-monitoring-1024x575.webp 1024w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-monitoring-768x431.webp 768w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-monitoring-1536x863.webp 1536w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-monitoring-2048x1150.webp 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/monitoring\/\">Monitoring<\/a><\/h4><p class=\"elementor-image-box-description\">Wir \u00fcberwachen Ihre gesamte IT-Landschaft \u2013 zentral und in Echtzeit.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ebf7a5 elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget__width-initial elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0ebf7a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-3-2-2\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1078\" src=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-managed-services.webp\" class=\"elementor-animation-grow attachment-full size-full wp-image-1044\" alt=\"\" srcset=\"https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-managed-services.webp 1920w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-managed-services-300x168.webp 300w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-managed-services-1024x575.webp 1024w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-managed-services-768x431.webp 768w, https:\/\/micron.ds.mt\/wp-content\/uploads\/2026\/04\/micron-managed-services-1536x862.webp 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\"><a href=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-3-2-2\/\">Managed Services<\/a><\/h4><p class=\"elementor-image-box-description\">Monitoring, Wartung und Updates f\u00fcr dauerhaft sichere IT.\n<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT-Sicherheit &amp; Datenschutz Ganzheitliche Cybersecurity statt Insell\u00f6sungen \u2014 pr\u00e4ventiv, zuverl\u00e4ssig und verst\u00e4ndlich. Moderne Unternehmen brauchen mehr als Virenschutz.Cyberangriffe, Datenverlust und gesetzliche Anforderungen machen IT-Sicherheit und Datenschutz zu zentralen Erfolgsfaktoren. Wir sch\u00fctzen Ihre Systeme, Daten und Mitarbeitenden \u2014 mit klaren Sicherheitskonzepten, zuverl\u00e4ssigen Backups und praxisnahen Awareness-Ma\u00dfnahmen. Herausforderungen Wachsende Bedrohungen durch Cyberangriffe Cyberangriffe &amp; Ransomware werden immer [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":307,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-563","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Sicherheit &amp; Datenschutz - Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren<\/title>\n<meta name=\"description\" content=\"Ihr IT-Dienstleister f\u00fcr sichere, effiziente und skalierbare Unternehmens-IT. Micron bietet professionelle IT-Betreuung, Support und moderne L\u00f6sungen aus einer Hand.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Sicherheit &amp; Datenschutz - Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren\" \/>\n<meta property=\"og:description\" content=\"Ihr IT-Dienstleister f\u00fcr sichere, effiziente und skalierbare Unternehmens-IT. Micron bietet professionelle IT-Betreuung, Support und moderne L\u00f6sungen aus einer Hand.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T07:12:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/micron.ds.mt\\\/index.php\\\/our-services\\\/it-systemhaus-it-betreuung-2\\\/\",\"url\":\"https:\\\/\\\/micron.ds.mt\\\/index.php\\\/our-services\\\/it-systemhaus-it-betreuung-2\\\/\",\"name\":\"IT-Sicherheit &amp; Datenschutz - Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/micron.ds.mt\\\/#website\"},\"datePublished\":\"2025-11-05T07:32:32+00:00\",\"dateModified\":\"2026-04-08T07:12:50+00:00\",\"description\":\"Ihr IT-Dienstleister f\u00fcr sichere, effiziente und skalierbare Unternehmens-IT. Micron bietet professionelle IT-Betreuung, Support und moderne L\u00f6sungen aus einer Hand.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/micron.ds.mt\\\/index.php\\\/our-services\\\/it-systemhaus-it-betreuung-2\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/micron.ds.mt\\\/index.php\\\/our-services\\\/it-systemhaus-it-betreuung-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/micron.ds.mt\\\/index.php\\\/our-services\\\/it-systemhaus-it-betreuung-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/micron.ds.mt\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leistungen\",\"item\":\"https:\\\/\\\/micron.ds.mt\\\/index.php\\\/our-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT-Sicherheit &amp; Datenschutz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/micron.ds.mt\\\/#website\",\"url\":\"https:\\\/\\\/micron.ds.mt\\\/\",\"name\":\"Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren\",\"description\":\"Micron ist Ihr regionaler IT-Partner in S\u00fcdth\u00fcringen: Infrastruktur, Sicherheit, Microsoft 365 und Support \u2013 verl\u00e4sslich, dokumentiert, jederzeit erreichbar.\",\"publisher\":{\"@id\":\"https:\\\/\\\/micron.ds.mt\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/micron.ds.mt\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/micron.ds.mt\\\/#organization\",\"name\":\"Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren\",\"url\":\"https:\\\/\\\/micron.ds.mt\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/micron.ds.mt\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/micron.ds.mt\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/micron_4c_sw.webp\",\"contentUrl\":\"https:\\\/\\\/micron.ds.mt\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/micron_4c_sw.webp\",\"width\":1096,\"height\":276,\"caption\":\"Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren\"},\"image\":{\"@id\":\"https:\\\/\\\/micron.ds.mt\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT-Sicherheit &amp; Datenschutz - Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren","description":"Ihr IT-Dienstleister f\u00fcr sichere, effiziente und skalierbare Unternehmens-IT. Micron bietet professionelle IT-Betreuung, Support und moderne L\u00f6sungen aus einer Hand.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"IT-Sicherheit &amp; Datenschutz - Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren","og_description":"Ihr IT-Dienstleister f\u00fcr sichere, effiziente und skalierbare Unternehmens-IT. Micron bietet professionelle IT-Betreuung, Support und moderne L\u00f6sungen aus einer Hand.","og_url":"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/","og_site_name":"Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren","article_modified_time":"2026-04-08T07:12:50+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/","url":"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/","name":"IT-Sicherheit &amp; Datenschutz - Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren","isPartOf":{"@id":"https:\/\/micron.ds.mt\/#website"},"datePublished":"2025-11-05T07:32:32+00:00","dateModified":"2026-04-08T07:12:50+00:00","description":"Ihr IT-Dienstleister f\u00fcr sichere, effiziente und skalierbare Unternehmens-IT. Micron bietet professionelle IT-Betreuung, Support und moderne L\u00f6sungen aus einer Hand.","breadcrumb":{"@id":"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/micron.ds.mt\/index.php\/our-services\/it-systemhaus-it-betreuung-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/micron.ds.mt\/"},{"@type":"ListItem","position":2,"name":"Leistungen","item":"https:\/\/micron.ds.mt\/index.php\/our-services\/"},{"@type":"ListItem","position":3,"name":"IT-Sicherheit &amp; Datenschutz"}]},{"@type":"WebSite","@id":"https:\/\/micron.ds.mt\/#website","url":"https:\/\/micron.ds.mt\/","name":"Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren","description":"Micron ist Ihr regionaler IT-Partner in S\u00fcdth\u00fcringen: Infrastruktur, Sicherheit, Microsoft 365 und Support \u2013 verl\u00e4sslich, dokumentiert, jederzeit erreichbar.","publisher":{"@id":"https:\/\/micron.ds.mt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/micron.ds.mt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/micron.ds.mt\/#organization","name":"Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren","url":"https:\/\/micron.ds.mt\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/micron.ds.mt\/#\/schema\/logo\/image\/","url":"https:\/\/micron.ds.mt\/wp-content\/uploads\/2025\/10\/micron_4c_sw.webp","contentUrl":"https:\/\/micron.ds.mt\/wp-content\/uploads\/2025\/10\/micron_4c_sw.webp","width":1096,"height":276,"caption":"Micron IT-Systemhaus S\u00fcdth\u00fcringen | Verl\u00e4ssliche IT seit 30 Jahren"},"image":{"@id":"https:\/\/micron.ds.mt\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/micron.ds.mt\/index.php\/wp-json\/wp\/v2\/pages\/563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/micron.ds.mt\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/micron.ds.mt\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/micron.ds.mt\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/micron.ds.mt\/index.php\/wp-json\/wp\/v2\/comments?post=563"}],"version-history":[{"count":19,"href":"https:\/\/micron.ds.mt\/index.php\/wp-json\/wp\/v2\/pages\/563\/revisions"}],"predecessor-version":[{"id":1109,"href":"https:\/\/micron.ds.mt\/index.php\/wp-json\/wp\/v2\/pages\/563\/revisions\/1109"}],"up":[{"embeddable":true,"href":"https:\/\/micron.ds.mt\/index.php\/wp-json\/wp\/v2\/pages\/307"}],"wp:attachment":[{"href":"https:\/\/micron.ds.mt\/index.php\/wp-json\/wp\/v2\/media?parent=563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}