{"id":13910,"date":"2024-07-08T13:54:18","date_gmt":"2024-07-08T13:54:18","guid":{"rendered":"https:\/\/terrera.my-new.page\/?page_id=13910"},"modified":"2025-02-07T12:11:39","modified_gmt":"2025-02-07T12:11:39","slug":"ethical-hacking","status":"publish","type":"page","link":"https:\/\/terrera.my-new.page\/en\/consulting\/ethical-hacking\/","title":{"rendered":"Ethical Hacking"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"13910\" class=\"elementor elementor-13910\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5bbaee e-con-full e-flex e-con e-parent\" data-id=\"a5bbaee\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9877652 e-con-full e-flex e-con e-child\" data-id=\"9877652\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-469a90f e-flex e-con-boxed e-con e-child\" data-id=\"469a90f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fde18c4 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"fde18c4\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ethical Hacking<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2e2d2f2 e-con-full element e-flex e-con e-child\" data-id=\"2e2d2f2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ddc6e3 elementor-widget__width-initial elementor-absolute elementor-widget elementor-widget-spacer\" data-id=\"0ddc6e3\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37cddc0 elementor-widget__width-initial elementor-absolute elementor-widget elementor-widget-spacer\" data-id=\"37cddc0\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d10493 e-con-full e-flex e-con e-parent\" data-id=\"3d10493\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ee7d9c2 e-flex e-con-boxed e-con e-child\" data-id=\"ee7d9c2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c4bd502 e-con-full e-flex e-con e-child\" data-id=\"c4bd502\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff4773a gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"ff4773a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ethical Hacking \u2013 our consulting on use and process!\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce4047e elementor-widget elementor-widget-text-editor\" data-id=\"ce4047e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ethical hacking plays an important role in modern IT security strategies. Our consulting services at Terrera are aimed at companies that want to protect their systems and networks against possible attacks. Through targeted vulnerability analyses and penetration tests - carried out by our experienced ethical hackers - we identify potential security gaps before they can be exploited by malicious actors. The process is transparent and tailored to your specific needs: from the initial assessment of the IT infrastructure to the execution of the tests and the development of tailor-made security concepts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96e60b4 btnDark elementor-align-left elementor-widget elementor-widget-button\" data-id=\"96e60b4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get advice now!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cbfa8b2 e-con-full e-flex e-con e-child\" data-id=\"cbfa8b2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a48868 elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"1a48868\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"889\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Ethical-Hacking-\u2013-our-consulting-on-use-and-process-922x1024.webp\" class=\"attachment-large size-large wp-image-14390\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Ethical-Hacking-\u2013-our-consulting-on-use-and-process-922x1024.webp 922w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Ethical-Hacking-\u2013-our-consulting-on-use-and-process-270x300.webp 270w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Ethical-Hacking-\u2013-our-consulting-on-use-and-process-768x853.webp 768w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Ethical-Hacking-\u2013-our-consulting-on-use-and-process.webp 1136w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-591c523 e-con-full e-flex e-con e-parent\" data-id=\"591c523\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ffe8d70 bgoverlay e-flex e-con-boxed e-con e-child\" data-id=\"ffe8d70\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bbc3643 e-con-full e-flex e-con e-child\" data-id=\"bbc3643\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85c9038 gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"85c9038\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What exactly does ethical hacking mean for your business?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92a1df5 elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"92a1df5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"673\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/What-exactly-does-ethical-hacking-involve-for-your-business.webp\" class=\"attachment-large size-large wp-image-14392\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/What-exactly-does-ethical-hacking-involve-for-your-business.webp 872w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/What-exactly-does-ethical-hacking-involve-for-your-business-300x253.webp 300w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/What-exactly-does-ethical-hacking-involve-for-your-business-768x646.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aa86cb7 e-con-full e-flex e-con e-child\" data-id=\"aa86cb7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d0bec6 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"0d0bec6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With our ethical hacking here at Terrera, you can expect a series of targeted, authorized attacks on your IT system to uncover vulnerabilities before hackers can exploit them. Our specialists use the same techniques and tools that malicious hackers use, but with one crucial difference: everything is done with your knowledge and permission. The spectrum of these tests ranges from simple password cracking attempts to very complex social engineering attacks and penetration of physical security systems.<\/p><p>After conducting the penetration tests, you will receive a detailed report that not only shows the vulnerabilities identified, but also contains concrete recommendations for resolving these security risks. Our consultants will help you set priorities and implement the most effective measures to strengthen your IT security. In addition, we offer training for your teams to raise awareness of cybersecurity in the company.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a487040 btnLight elementor-align-left elementor-widget elementor-widget-button\" data-id=\"a487040\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-672feb1 e-con-full e-flex e-con e-parent\" data-id=\"672feb1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-28ee0c5 e-flex e-con-boxed e-con e-child\" data-id=\"28ee0c5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7e61946 e-con-full e-flex e-con e-child\" data-id=\"7e61946\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d591d9 gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"9d591d9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The best protection for your technical infrastructure\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9ef323 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"f9ef323\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our protection for your IT begins with the development of a comprehensive security strategy. This ensures both preventive measures and the ability to react quickly in the event of a new security incident. But security does not end with the identification of risks. It is equally important to implement a robust architecture that includes strong security mechanisms such as firewalls, intrusion detection systems and encryption technologies. With Terrera, we always take on this task for you conscientiously and offer security in ethical hacking.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c9f2ed btnLight elementor-align-left elementor-widget elementor-widget-button\" data-id=\"0c9f2ed\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request IT Consulting<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c85ed5 e-con-full e-flex e-con e-child\" data-id=\"5c85ed5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-132ddc9 elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"132ddc9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"889\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/The-best-protection-for-your-technical-infrastructure-922x1024.webp\" class=\"attachment-large size-large wp-image-14389\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/The-best-protection-for-your-technical-infrastructure-922x1024.webp 922w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/The-best-protection-for-your-technical-infrastructure-270x300.webp 270w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/The-best-protection-for-your-technical-infrastructure-768x853.webp 768w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/The-best-protection-for-your-technical-infrastructure.webp 1136w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5261bd8 e-con-full e-flex e-con e-parent\" data-id=\"5261bd8\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2abf998 e-con-full e-flex e-con e-child\" data-id=\"2abf998\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0e7c4ce e-flex e-con-boxed e-con e-child\" data-id=\"0e7c4ce\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4aba58d gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4aba58d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Benefits of Ethical Hacking in Business\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4134e60 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4134e60\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Very few companies have an IT department that actively deals with weaknesses in their network. This makes it difficult to work on proactive measures and identify vulnerabilities before an attack. Ethical hacking has proven to be one of the most effective and best measures for actively improving cyber security. With our consulting in the area of ethical hacking, we offer you a number of practical advantages that protect you from damage:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-207be85 e-grid e-con-full visContainerCard  e-con e-child\" data-id=\"207be85\" data-element_type=\"container\">\n\t\t<a class=\"elementor-element elementor-element-6223fc0 e-con-full spcontainer e-flex e-con e-child\" data-id=\"6223fc0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57ec2e6 elementor-widget__width-auto s-img elementor-widget elementor-widget-image\" data-id=\"57ec2e6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"467\" height=\"461\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/risk-detection.webp\" class=\"attachment-large size-large wp-image-14395\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/risk-detection.webp 467w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/risk-detection-300x296.webp 300w\" sizes=\"(max-width: 467px) 100vw, 467px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3d849c scontainer e-con-full e-flex e-con e-child\" data-id=\"d3d849c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7428a7e elementor-widget elementor-widget-heading\" data-id=\"7428a7e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proactive risk detection and mitigation\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a7f985 mytext innContainer elementor-widget elementor-widget-text-editor\" data-id=\"8a7f985\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ethical hacking allows companies to proactively identify vulnerabilities in their IT infrastructure before they can be exploited by cybercriminals. This approach helps uncover and close potential security gaps, significantly reducing the risk of data leaks and security breaches. More frequent testing makes all the difference.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-88a4032 e-con-full spcontainer e-flex e-con e-child\" data-id=\"88a4032\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce864d2 elementor-widget__width-auto s-img elementor-widget elementor-widget-image\" data-id=\"ce864d2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"467\" height=\"461\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/safety.webp\" class=\"attachment-large size-large wp-image-14393\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/safety.webp 467w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/safety-300x296.webp 300w\" sizes=\"(max-width: 467px) 100vw, 467px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cda9e71 scontainer e-con-full e-flex e-con e-child\" data-id=\"cda9e71\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a8e4cb elementor-widget elementor-widget-heading\" data-id=\"5a8e4cb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">improving your safety culture\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e771cce mytext innContainer elementor-widget elementor-widget-text-editor\" data-id=\"e771cce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ethical hacking goes a long way in raising awareness and training employees on cybersecurity. By demonstrating real-world attack scenarios, employees are made aware of the importance of secure practices and learn to identify security threats. This promotes a strong security culture in the company that everyone can contribute to.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-0735d36 e-con-full spcontainer e-flex e-con e-child\" data-id=\"0735d36\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-adfd99a elementor-widget__width-auto s-img elementor-widget elementor-widget-image\" data-id=\"adfd99a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"467\" height=\"461\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Compliance.webp\" class=\"attachment-large size-large wp-image-14394\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Compliance.webp 467w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/Compliance-300x296.webp 300w\" sizes=\"(max-width: 467px) 100vw, 467px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b17c76b scontainer e-con-full e-flex e-con e-child\" data-id=\"b17c76b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c7d8ce elementor-widget elementor-widget-heading\" data-id=\"2c7d8ce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">compliance with legal IT requirements\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c89df6a mytext innContainer elementor-widget elementor-widget-text-editor\" data-id=\"c89df6a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Many industries are subject to strict regulatory requirements regarding data protection and IT security. Ethical hacking helps companies meet compliance standards such as GDPR, HIPAA or PCI DSS by ensuring that their security systems are up to date. In addition, through ethical hacking we minimize the risk of high reputational damage.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b570857 e-con-full e-flex e-con e-parent\" data-id=\"b570857\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-10a6b36 bgoverlay e-flex e-con-boxed e-con e-child\" data-id=\"10a6b36\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-31ce432 e-con-full e-flex e-con e-child\" data-id=\"31ce432\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9ad891 gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"a9ad891\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">This is how we simulate serious attacks on your IT systems\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-406b31b elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"406b31b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"734\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/How-we-simulate-serious-attacks-on-your-IT-systems.webp\" class=\"attachment-large size-large wp-image-14391\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/How-we-simulate-serious-attacks-on-your-IT-systems.webp 660w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/How-we-simulate-serious-attacks-on-your-IT-systems-270x300.webp 270w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb89e0a e-con-full e-flex e-con e-child\" data-id=\"bb89e0a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-416ef97 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"416ef97\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To test the resilience of your IT systems to complex cyberattacks, our team at Terrera uses a methodical approach that covers the broad spectrum of potential threats. The first step is to conduct a thorough assessment of your current security landscape to develop a customized attack scenario tailored to your organization&#039;s specific vulnerabilities and threat vectors.<\/p><p>In the practical implementation phase, our ethical hackers carry out targeted attacks using advanced penetration testing tools and techniques to test the security of your networks, applications and endpoints. Throughout the process, a special focus is placed on minimizing operational disruptions so as not to affect normal business operations. Once the tests are completed, you will receive a detailed report that includes the vulnerabilities identified and then enables concrete improvements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd4eae4 btnLight elementor-align-left elementor-widget elementor-widget-button\" data-id=\"dd4eae4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3573470 e-con-full e-flex e-con e-parent\" data-id=\"3573470\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ee52afb bgoverlay e-flex e-con-boxed e-con e-child\" data-id=\"ee52afb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6b4ecf6 e-con-full e-flex e-con e-child\" data-id=\"6b4ecf6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58d757b gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"58d757b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">With our follow-up services for maximum IT security\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f2c141 elementor-widget-tablet__width-initial elementor-widget elementor-widget-image\" data-id=\"3f2c141\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"673\" src=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/With-our-follow-up-services-for-maximum-IT-security.webp\" class=\"attachment-large size-large wp-image-14414\" alt=\"\" srcset=\"https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/With-our-follow-up-services-for-maximum-IT-security.webp 872w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/With-our-follow-up-services-for-maximum-IT-security-300x253.webp 300w, https:\/\/terrera.my-new.page\/wp-content\/uploads\/2024\/07\/With-our-follow-up-services-for-maximum-IT-security-768x646.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-687b061 e-con-full e-flex e-con e-child\" data-id=\"687b061\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbc457d elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"bbc457d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>After gaining in-depth insights into the security posture of your IT systems through ethical hacking, we at Terrera offer a range of follow-up services to comprehensively optimize the security of your technology infrastructure. These services are designed not only to fix the identified vulnerabilities, but also to ensure long-term improvement of your security architecture. Our consulting will inform you about all the options.<\/p><p>Our follow-up services include the development and implementation of improved security policies, the installation of advanced firewall and intrusion detection systems, and the implementation of end-to-end encryption for sensitive data transfers. We would be happy to work with you to create a comprehensive plan to improve your cyber security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c4fa73 btnLight elementor-align-left elementor-widget elementor-widget-button\" data-id=\"4c4fa73\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af0e87d e-con-full e-flex e-con e-parent\" data-id=\"af0e87d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d1273bd bgoverlay e-flex e-con-boxed e-con e-child\" data-id=\"d1273bd\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-eb6de52 e-con-full e-flex e-con e-child\" data-id=\"eb6de52\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82e4f57 gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"82e4f57\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ethical Hacking \u2013 with Terrera at the highest level!\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d548057 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"d548057\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ethical hacking is more than just a service - it is an essential part of a comprehensive security strategy that protects your company from increasingly complex cyber threats. With Terrera at your side, you benefit from a team of proven experts who are equipped with the latest techniques and tools to test and secure your IT systems at the highest level. We are happy to support you with Terrera in this goal.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-200836e btnLight elementor-align-left elementor-widget elementor-widget-button\" data-id=\"200836e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/terrera.my-new.page\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get advice now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b809cc9 e-con-full e-flex e-con e-child\" data-id=\"b809cc9\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7743041 e-con-full e-flex e-con e-parent\" data-id=\"7743041\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-29f72d5 e-flex e-con-boxed e-con e-child\" data-id=\"29f72d5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-553dde1 e-con-full e-flex e-con e-child\" data-id=\"553dde1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ff8d7e gradient-text  elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8ff8d7e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ on Ethical Hacking \u2013 our overview\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fff1a84 elementor-widget elementor-widget-accordion\" data-id=\"fff1a84\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2681\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2681\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is Ethical Hacking?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2681\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2681\"><p>Ethical hacking refers to authorized and deliberate attacks on computer systems, networks or applications with the aim of uncovering exploitable vulnerabilities. Ethical hackers use the same techniques as criminal hackers, but act with permission and for the benefit of the company to improve IT security.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2682\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2682\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Why is ethical hacking important for companies?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2682\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2682\"><p>Ethical hacking helps organizations proactively identify and close potential security gaps and vulnerabilities in their IT infrastructure before they can be exploited by cybercriminals. It is a crucial step in protecting data integrity, customer data, and company resources from breaches.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2683\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2683\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How often should ethical hacking be performed?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2683\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2683\"><p>Ethical hacking should be carried out regularly, ideally once a year or every time significant changes are made to the IT infrastructure. Regular testing ensures that new vulnerabilities can be identified and fixed in a timely manner.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2684\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2684\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Is ethical hacking legal?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2684\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2684\"><p>Yes, ethical hacking is perfectly legal as long as it is done with the express permission of the company. Ethical hackers work under strict ethical guidelines and contracts that clearly define and authorize the scope of their work.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2685\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2685\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What distinguishes an ethical hacker from a criminal hacker?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2685\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2685\"><p>Ethical hackers have permission to break into systems and work for the benefit of the company by uncovering vulnerabilities and making recommendations to improve security. Criminal hackers act without permission with the intent to cause harm or gain unauthorized access to data.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2686\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2686\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What qualifications should an ethical hacker have?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2686\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2686\"><p>A qualified ethical hacker should have a solid background in IT security, including specific certifications such as the Certified Ethical Hacker (CEH). Practical experience in the areas of network security, system administration and knowledge of current cyber threats are also essential and are mastered by our team.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2687\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-2687\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">How are the results of an ethical hacking test presented?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2687\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-2687\"><p>After completing an ethical hacking test, we create a detailed report that includes the vulnerabilities identified, the extent of potential threats, and tailored recommendations to fix the vulnerabilities. This report serves as a basis for improving the IT security strategy.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2688\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-2688\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Can ethical hacking tests cause operational disruptions?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2688\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-2688\"><p>Ethical hacking is carefully planned and executed to minimize disruption to operations. Testers work closely with the business to conduct tests during off-peak hours or use simulations in controlled environments to avoid the risk of outages.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"Was ist Ethical Hacking?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Ethical Hacking bezeichnet autorisierte und beabsichtigte Angriffe auf Computersysteme, Netzwerke oder Anwendungen mit dem Ziel, ausnutzbare Schwachstellen aufzudecken. Ethical Hacker nutzen dieselben Techniken wie kriminelle Hacker, handeln jedoch mit Erlaubnis und zum Nutzen des Unternehmens, um die IT-Sicherheit zu verbessern.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Warum ist Ethical Hacking wichtig f\\u00fcr Unternehmen?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Ethical Hacking hilft Unternehmen, potenzielle Sicherheitsl\\u00fccken und Schwachstellen in ihrer IT-Infrastruktur proaktiv zu identifizieren und zu schlie\\u00dfen, bevor sie von Cyberkriminellen ausgenutzt werden k\\u00f6nnen. Es ist ein entscheidender Schritt, um die Datenintegrit\\u00e4t, Kundendaten und Unternehmensressourcen vor Verletzungen zu sch\\u00fctzen.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Wie oft sollte Ethical Hacking durchgef\\u00fchrt werden?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Ethical Hacking sollte regelm\\u00e4\\u00dfig durchgef\\u00fchrt werden, idealerweise einmal j\\u00e4hrlich oder jedes Mal, wenn signifikante \\u00c4nderungen an der IT-Infrastruktur vorgenommen werden. Regelm\\u00e4\\u00dfige Tests gew\\u00e4hrleisten, dass neue Schwachstellen zeitnah erkannt und behoben werden k\\u00f6nnen.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Ist Ethical Hacking legal?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Ja, Ethical Hacking ist vollkommen legal, sofern es mit ausdr\\u00fccklicher Erlaubnis des Unternehmens durchgef\\u00fchrt wird. Ethical Hacker arbeiten unter strengen ethischen Richtlinien und Vertr\\u00e4gen, die den Umfang ihrer Arbeit klar definieren und autorisieren.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Was unterscheidet einen Ethical Hacker von einem kriminellen Hacker?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Ethical Hacker haben die Erlaubnis, in Systeme einzudringen und arbeiten zum Vorteil des Unternehmens, indem sie Schwachstellen aufdecken und Empfehlungen zur Verbesserung der Sicherheit geben. Kriminelle Hacker handeln ohne Erlaubnis, mit der Absicht, Schaden anzurichten oder sich unberechtigt Zugang zu Daten zu verschaffen.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Welche Qualifikationen sollte ein Ethical Hacker haben?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Ein qualifizierter Ethical Hacker sollte \\u00fcber eine fundierte Ausbildung in IT-Sicherheit verf\\u00fcgen, einschlie\\u00dflich spezifischer Zertifizierungen wie dem Certified Ethical Hacker (CEH). Praktische Erfahrung rund um die Bereiche der Netzwerksicherheit, Systemadministration und Kenntnisse aktueller Cyberbedrohungen sind ebenfalls essentiell und werden von unserem Team beherrscht.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Wie werden die Ergebnisse eines Ethical Hacking Tests pr\\u00e4sentiert?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Nach Abschluss eines Ethical Hacking Tests erstellen wir einen detaillierten Bericht, der die identifizierten Schwachstellen, das Ausma\\u00df potenzieller Bedrohungen und ma\\u00dfgeschneiderte Empfehlungen zur Behebung der Sicherheitsl\\u00fccken umfasst. Dieser Bericht dient als Grundlage f\\u00fcr die Verbesserung der IT-Sicherheitsstrategie.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"K\\u00f6nnen Ethical Hacking Tests Betriebsst\\u00f6rungen verursachen?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p>Ethical Hacking wird sorgf\\u00e4ltig geplant und durchgef\\u00fchrt, um Betriebsst\\u00f6rungen zu minimieren. Tester arbeiten eng mit dem Unternehmen zusammen, um Tests au\\u00dferhalb der Spitzenzeiten durchzuf\\u00fchren oder Simulationen in kontrollierten Umgebungen zu nutzen, um das Risiko von Ausf\\u00e4llen zu vermeiden.<\\\/p>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32f18b4 e-con-full e-flex e-con e-child\" data-id=\"32f18b4\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Ethical Hacking \u2013 unser Consulting zu Einsatz und Ablauf! Ethical Hacking spielt in der modernen IT-Sicherheitsstrategie eine wichtige Rolle. Unser Consulting-Angebot bei Terrera richtet sich an Unternehmen, die ihre Systeme und Netzwerke gegen m\u00f6gliche Angriffe absichern m\u00f6chten. Durch gezielte Schwachstellenanalysen und Penetrationstests \u2013 ausgef\u00fchrt von unseren erfahrenen Ethical Hackern \u2013 identifizieren wir potenzielle Sicherheitsl\u00fccken, bevor [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":12821,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13910","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages\/13910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/comments?post=13910"}],"version-history":[{"count":50,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages\/13910\/revisions"}],"predecessor-version":[{"id":19233,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages\/13910\/revisions\/19233"}],"up":[{"embeddable":true,"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/pages\/12821"}],"wp:attachment":[{"href":"https:\/\/terrera.my-new.page\/en\/wp-json\/wp\/v2\/media?parent=13910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}