{"id":11416,"date":"2021-06-04T10:50:17","date_gmt":"2021-06-04T08:50:17","guid":{"rendered":"https:\/\/www.accessmanager.net\/?p=11416"},"modified":"2021-06-04T13:30:49","modified_gmt":"2021-06-04T11:30:49","slug":"sabotage-protection-or-how-to-double-secure-internal-company-secrets","status":"publish","type":"post","link":"https:\/\/www.accessmanager.net\/en\/2021\/06\/04\/sabotage-protection-or-how-to-double-secure-internal-company-secrets\/","title":{"rendered":"Sabotage protection &#8211; or how to double-secure internal company secrets"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-79yuoub-51b5b8e0727876d63932091d37588745\">\n.avia-section.av-79yuoub-51b5b8e0727876d63932091d37588745{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_566877226-scaled.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-79yuoub-51b5b8e0727876d63932091d37588745 .av-section-color-overlay{\nopacity:0.5;\nbackground-color:#000000;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-79yuoub-51b5b8e0727876d63932091d37588745 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11416'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6vmjl1f-71398cc7d361f475cdde72debc205400\">\n.flex_column.av-6vmjl1f-71398cc7d361f475cdde72debc205400{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6vmjl1f-71398cc7d361f475cdde72debc205400 av_one_full  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6d6848z-1dc398dcf602df4fc1b4fd73a5c20f25\">\n#top .hr.hr-invisible.av-6d6848z-1dc398dcf602df4fc1b4fd73a5c20f25{\nheight:500px;\n}\n<\/style>\n<div  class='hr av-6d6848z-1dc398dcf602df4fc1b4fd73a5c20f25 hr-invisible  avia-builder-el-2  avia-builder-el-no-sibling '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/div>\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div><div id='av_section_2'  class='avia-section av-5tavswz-ad1e33c51d0137a53d7b45cac56da990 main_color avia-section-default avia-no-border-styling  avia-builder-el-3  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11416'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6d6848z-2556911ce3a2e266f60ae52331abaf5e\">\n#top .hr.hr-invisible.av-6d6848z-2556911ce3a2e266f60ae52331abaf5e{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-6d6848z-2556911ce3a2e266f60ae52331abaf5e hr-invisible  avia-builder-el-4  el_before_av_one_full  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-53tnecj-a91e58a67c02c845f913ddeb554c4377\">\n.flex_column.av-53tnecj-a91e58a67c02c845f913ddeb554c4377{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-53tnecj-a91e58a67c02c845f913ddeb554c4377 av_one_full  avia-builder-el-5  el_after_av_hr  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kpi2yd1t-3bab6b8464f0d4655d4c1c38d118be54\">\n#top .av-special-heading.av-kpi2yd1t-3bab6b8464f0d4655d4c1c38d118be54{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-kpi2yd1t-3bab6b8464f0d4655d4c1c38d118be54 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-kpi2yd1t-3bab6b8464f0d4655d4c1c38d118be54 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-kpi2yd1t-3bab6b8464f0d4655d4c1c38d118be54 av-special-heading-h1 blockquote modern-quote modern-centered  avia-builder-el-6  el_before_av_hr  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Sabotage protection &#8211; or how to double-secure internal company secrets<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6d6848z-2556911ce3a2e266f60ae52331abaf5e\">\n#top .hr.hr-invisible.av-6d6848z-2556911ce3a2e266f60ae52331abaf5e{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-6d6848z-2556911ce3a2e266f60ae52331abaf5e hr-invisible  avia-builder-el-7  el_after_av_heading  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-knu96z5e-28cbf981d3105d4946086b49425dce33 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center\">How do you protect secret information from sabotage? There are two possible scenarios you should consider when answering this question: sabotagers can cause damage from the outside as well as from the inside. This is because, in principle, a potential threat can also come from people within your own company.<\/p>\n<p style=\"text-align: center\">An essential step is therefore to make sensitive documents and directories accessible only to employees who really need them for their work: Following the need-to-know principle.<\/p>\n<p style=\"text-align: center\">In the case of facilities that are vital to life or defence, training in sabotage protection for these employees is also required.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knu99408-0d6537f17f389189e34aa8c3684ad32b\">\n.avia-section.av-knu99408-0d6537f17f389189e34aa8c3684ad32b{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/09\/shutterstock_403186234-1030x687.jpg);\nbackground-position:0% 50%;\nbackground-attachment:fixed;\n}\n.avia-section.av-knu99408-0d6537f17f389189e34aa8c3684ad32b .av-section-color-overlay{\nopacity:0.7;\nbackground-color:#000000;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-knu99408-0d6537f17f389189e34aa8c3684ad32b alternate_color avia-section-default avia-no-border-styling  avia-builder-el-9  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-fixed av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11416'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-497fm4j-3cdff2d06cac2303b66d8a63255c171d\">\n.flex_column.av-497fm4j-3cdff2d06cac2303b66d8a63255c171d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-497fm4j-3cdff2d06cac2303b66d8a63255c171d av_four_fifth  avia-builder-el-10  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><article  class='iconbox iconbox_left av-ko32p5tt-62c801c0cc9ab468a4ef4dfd25eb30c1  avia-builder-el-11  avia-builder-el-no-sibling '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: How does the need-to-know principle work?\"><div class=\"iconbox_icon heading-color\" aria-hidden='true' data-av_icon='\ue81f' data-av_iconfont='entypo-fontello'><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >How does the need-to-know principle work?<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>In principle, you should check for all data which employees need access to it. Is the knowledge that can be gained from the data really important for certain employees? For highly sensitive data, you should also check whether there is a protection instruction.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div><div id='av_section_4'  class='avia-section av-10gmlpf-5fbeb6018b123deddde27d8bda3f10fc main_color avia-section-default avia-no-border-styling  avia-builder-el-12  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11416'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-497fm4j-3cdff2d06cac2303b66d8a63255c171d\">\n.flex_column.av-497fm4j-3cdff2d06cac2303b66d8a63255c171d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-497fm4j-3cdff2d06cac2303b66d8a63255c171d av_three_fourth  avia-builder-el-13  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-ko32t92c-cc21f55ad46f3e4fe16bd5396501bd8f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Consistent checks to ensure that protective instructions have been carried out are thus part of the administrator&#8217;s tasks, which in turn requires additional time and organisational capacities. A fully automated software solution can be used to reduce these efforts.<\/p>\n<p>Automated authorisation management relieves the burden on IT administration by including the persons responsible for data in the authorisation process. At the same time, you avoid sources of error that can arise from last-minute requests.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knu99408-239c14f4ef90656e45fea77c7cbc00cb\">\n.avia-section.av-knu99408-239c14f4ef90656e45fea77c7cbc00cb{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/09\/shutterstock_403186234.jpg);\nbackground-position:0% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-knu99408-239c14f4ef90656e45fea77c7cbc00cb .av-section-color-overlay{\nopacity:0.7;\nbackground-color:#000000;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-knu99408-239c14f4ef90656e45fea77c7cbc00cb alternate_color avia-section-default avia-no-border-styling  avia-builder-el-15  el_after_av_section  el_before_av_section  avia-full-stretch avia-bg-style-scroll av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11416'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-497fm4j-3cdff2d06cac2303b66d8a63255c171d\">\n.flex_column.av-497fm4j-3cdff2d06cac2303b66d8a63255c171d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-497fm4j-3cdff2d06cac2303b66d8a63255c171d av_three_fourth  avia-builder-el-16  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-ko32t92c-cc21f55ad46f3e4fe16bd5396501bd8f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>With sustainable authorisation management, the allocation of access rights becomes traceable &#8211; even years later. The BAYOOSOFT Access Manager enables you to have a permanently traceable authorisation situation. In addition to creating data protection classes, you can also mark resources accordingly.<\/p>\n<p>There is no additional effort for the IT administration in tracking. The documentation of authorisation changes is fully automated. Through continuous monitoring of the existing authorisation structure in the Active Directory and file system, all unexpected deviations are logged and reversed.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div><div id='av_section_6'  class='avia-section av-knu99408-b47c06df6115d961c14987b2ddca08d9 main_color avia-section-default avia-no-border-styling  avia-builder-el-18  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11416'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-497fm4j-3cdff2d06cac2303b66d8a63255c171d\">\n.flex_column.av-497fm4j-3cdff2d06cac2303b66d8a63255c171d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-497fm4j-3cdff2d06cac2303b66d8a63255c171d av_three_fourth  avia-builder-el-19  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><article  class='iconbox iconbox_left av-ko32p5tt-c2a0c6388f5917f8102e81ad3bd4bfdb  avia-builder-el-20  avia-builder-el-no-sibling '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: A view into the near future\"><div class=\"iconbox_icon heading-color\" aria-hidden='true' data-av_icon='\ue841' data-av_iconfont='entypo-fontello'><\/div><h3 class='iconbox_content_title '  itemprop=\"headline\" >A view into the near future<\/h3><\/header><div class='iconbox_content_container '  itemprop=\"text\" ><p>In particular, the new feature for defining groups of pre-authorised users in version 2021.1 ensures that only employees who have undergone the sabotage protection training in advance are authorised. This is because version 2021.1 of the BAYOOSOFT Access Manager includes the option to define a pre-authorised group of people per data protection classification.<\/p>\n<p>In addition: If the employee to be authorised subsequently undergoes protection training, the past authorisation allocation is not invalidated: The rights are conveniently implemented in the target system when this criterion is met.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knu99408-0d6537f17f389189e34aa8c3684ad32b\">\n.avia-section.av-knu99408-0d6537f17f389189e34aa8c3684ad32b{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.accessmanager.net\/wp-content\/uploads\/sites\/2\/2020\/09\/shutterstock_403186234-1030x687.jpg);\nbackground-position:0% 50%;\nbackground-attachment:fixed;\n}\n.avia-section.av-knu99408-0d6537f17f389189e34aa8c3684ad32b .av-section-color-overlay{\nopacity:0.7;\nbackground-color:#000000;\n}\n<\/style>\n<div id='av_section_7'  class='avia-section av-knu99408-0d6537f17f389189e34aa8c3684ad32b alternate_color avia-section-default avia-no-border-styling  avia-builder-el-21  el_after_av_section  el_before_av_three_fourth  avia-full-stretch avia-bg-style-fixed av-section-color-overlay-active container_wrap fullsize'  data-section-bg-repeat='stretch'><div class=\"av-section-color-overlay-wrap\"><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11416'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-497fm4j-3cdff2d06cac2303b66d8a63255c171d\">\n.flex_column.av-497fm4j-3cdff2d06cac2303b66d8a63255c171d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-497fm4j-3cdff2d06cac2303b66d8a63255c171d av_three_fourth  avia-builder-el-22  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-ko32t92c-cc21f55ad46f3e4fe16bd5396501bd8f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Are you interested in authorisation management for a certain group of people &#8211; completely independent of sabotage protection? The new feature can also be used for this purpose.<\/p>\n<\/div><\/section><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><\/div><div id='after_section_7'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-11416'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-497fm4j-3cdff2d06cac2303b66d8a63255c171d\">\n.flex_column.av-497fm4j-3cdff2d06cac2303b66d8a63255c171d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-497fm4j-3cdff2d06cac2303b66d8a63255c171d av_three_fourth  avia-builder-el-24  el_after_av_section  el_before_av_hr  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><div  class='av_promobox av-ko4ci332-55946d20b204768e3f6dc900feeec339 avia-button-yes  avia-builder-el-25  avia-builder-el-no-sibling '><div class='avia-promocontent'><p>\nLearn more about the BAYOOSOFT Access Manager. Register now for a <a href=\"https:\/\/www.accessmanager.net\/en\/services\/product-presentation-inquiry\/\">product presentation<\/a> and get to know the software tool.<\/p>\n<p>Do you have specific questions? Feel free to use our <a href=\"https:\/\/www.accessmanager.net\/en\/#start_services\">contact<\/a> form.<\/p>\n<\/div><div  class='avia-button-wrap av-ko4ci332-120914df61cd8c5b554463a42cb22c75-wrap avia-button-right '><a href='https:\/\/www.accessmanager.net\/en\/#start_services'  class='avia-button av-ko4ci332-120914df61cd8c5b554463a42cb22c75 av-link-btn avia-icon_select-no avia-size-large avia-position-right avia-color-theme-color'   aria-label=\"Inquiry\"><span class='avia_iconbox_title' >Inquiry<\/span><\/a><\/div><\/div><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6d6848z-c2511feefd10823d238ed92992263439\">\n#top .hr.hr-invisible.av-6d6848z-c2511feefd10823d238ed92992263439{\nheight:70px;\n}\n<\/style>\n<div  class='hr av-6d6848z-c2511feefd10823d238ed92992263439 hr-invisible  avia-builder-el-26  el_after_av_three_fourth  el_before_av_two_fifth '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-497fm4j-14c2b4b88089b2bcd3e0b602406aba3d\">\n.flex_column.av-497fm4j-14c2b4b88089b2bcd3e0b602406aba3d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-497fm4j-14c2b4b88089b2bcd3e0b602406aba3d av_two_fifth  avia-builder-el-27  el_after_av_hr  avia-builder-el-last  first flex_column_div av-zero-column-padding  '     ><div  class='av-social-sharing-box av-ko2is278-7f9f89fd710b1f6a7c9a47259b090832 av-social-sharing-box-minimal  avia-builder-el-28  avia-builder-el-no-sibling  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Share now<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.accessmanager.net\/en\/2021\/06\/04\/sabotage-protection-or-how-to-double-secure-internal-company-secrets\/&#038;t=Sabotage%20protection%20%E2%80%93%20or%20how%20to%20double-secure%20internal%20company%20secrets' aria-hidden='false' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-whatsapp' ><a target=\"_blank\" aria-label=\"Share on WhatsApp\" href='https:\/\/api.whatsapp.com\/send?text=https:\/\/www.accessmanager.net\/en\/2021\/06\/04\/sabotage-protection-or-how-to-double-secure-internal-company-secrets\/' aria-hidden='false' data-av_icon='\uf232' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on WhatsApp'><span class='avia_hidden_link_text'>Share on WhatsApp<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Sabotage%20protection%20%E2%80%93%20or%20how%20to%20double-secure%20internal%20company%20secrets&#038;url=https:\/\/www.accessmanager.net\/en\/2021\/06\/04\/sabotage-protection-or-how-to-double-secure-internal-company-secrets\/' aria-hidden='false' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Sabotage%20protection%20%E2%80%93%20or%20how%20to%20double-secure%20internal%20company%20secrets&#038;body=https:\/\/www.accessmanager.net\/en\/2021\/06\/04\/sabotage-protection-or-how-to-double-secure-internal-company-secrets\/' aria-hidden='false' data-av_icon='\ue805' data-av_iconfont='entypo-fontello' title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":42,"featured_media":11404,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,57],"tags":[76,80],"class_list":["post-11416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-news-en","tag-eu-dsgvo-en","tag-need-to-know-en"],"_links":{"self":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/11416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/comments?post=11416"}],"version-history":[{"count":4,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/11416\/revisions"}],"predecessor-version":[{"id":12624,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/posts\/11416\/revisions\/12624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media\/11404"}],"wp:attachment":[{"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/media?parent=11416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/categories?post=11416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accessmanager.net\/en\/wp-json\/wp\/v2\/tags?post=11416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}