{"version":"1.0","provider_name":"Technology &amp; Law","provider_url":"https:\/\/www.ecovis.com\/tech-law","author_name":"podcast","author_url":"https:\/\/www.ecovis.com\/tech-law\/author\/podcast\/","title":"Datensicherheit im Homeoffice - Tech Lawyer Berlin, Germany","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"cXv57SgDMu\"><a href=\"https:\/\/www.ecovis.com\/tech-law\/datensicherheit-im-homeoffice\/\">Datensicherheit im Homeoffice<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ecovis.com\/tech-law\/datensicherheit-im-homeoffice\/embed\/#?secret=cXv57SgDMu\" width=\"600\" height=\"338\" title=\"&#8222;Datensicherheit im Homeoffice&#8220; &#8211; Technology &amp; Law\" data-secret=\"cXv57SgDMu\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ecovis.com\/tech-law\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Was haben Google, der Bundestag und das Kammergericht gemeinsam? &#8211; All diese Institutionen wurden bereits Opfer von Cybercrime-Attacken. F\u00fcr sich genommen ist das Thema mithin nicht allzu neu. Angesichts der steigenden Anzahl von Arbeitnehmern im Homeoffice k\u00f6nnten solche Angriffe jedoch popul\u00e4rer denn je werden. Denn oftmals stellen gerade die privaten Computersysteme eklatante Sicherheitsl\u00fccken dar. Was [&hellip;]"}