{"id":70299,"date":"2024-06-27T17:37:23","date_gmt":"2024-06-27T16:37:23","guid":{"rendered":"https:\/\/www.n-able.com\/?p=70299"},"modified":"2025-08-28T10:35:40","modified_gmt":"2025-08-28T09:35:40","slug":"evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern","title":{"rendered":"Evolving Ransomware Tactics Make Data Exfiltration a Top Security Concern"},"content":{"rendered":"<p class=\"ai-optimize-7 ai-optimize-introduction\"><span data-contrast=\"auto\">Safeguarding your data is a critical aspect of your cyber risk management strategy and requires a high level of preparedness for events like data breaches. Breaches may still occur despite employing top-tier cybersecurity measures, as cybercriminals are financially motivated to find a way in, leading to cybercriminals attempting to steal your organization\u2019s sensitive data and holding it for ransom. This can result in stolen information being exposed publicly or sold on the dark web for malicious purposes, known as data exfiltration.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-8\"><span data-contrast=\"auto\">Data exfiltration has been emerging as a commonly used tactic; as an example\u00a0<\/span><span><strong><a href=\"https:\/\/www.ctera.com\/company\/blog\/ransom-protect-data-exfiltration-prevention\/#:~:text=Data%20exfiltration%2C%20on%20the%20other,represent%2077%25%20of%20ransomware%20attacks.\" target=\"_blank\" rel=\"noopener\">77%<\/a><\/strong><\/span><span data-contrast=\"auto\">\u00a0of ransomware attacks involve data exfiltration. While stopping cybercriminals from infiltrating your network is important, preventing them from exfiltrating any valuable data once they\u2019ve gained access is even more crucial<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-9\"><b><span data-contrast=\"auto\">In this blog, we will explore data exfiltration, the techniques cybercriminals use to execute it, and effective methods to minimize the damage it can cause.<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-10\"><span>What is Data Exfiltration?\u00a0<\/span><\/h2>\n<p class=\"ai-optimize-11\"><span data-contrast=\"auto\">Data exfiltration represents a particularly disruptive form of data theft where digital information is illegally transferred, duplicated, or removed from an organization\u2019s environment. Ransomware attackers behind these acts either distribute the stolen information publicly to extort money or sell it on underground markets like the dark web.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-12\"><span data-contrast=\"auto\">This emerging trend goes hand-in-hand with extortion and double extortion tactics, where cybercriminals demand a ransom for decrypting data and threaten to leak sensitive information if their demands are unmet.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-13\"><span data-contrast=\"auto\">Contrary to the common use of encryption to lock data and demand a ransom for the decryption key, cybercriminals are now bypassing encryption altogether. Instead, they focus on outright data theft, threatening to release or publicize the stolen information unless a ransom is paid. This shift in strategy shows how the mere acquisition of sensitive data can be as damaging\u2014if not more so\u2014as encryption-based ransomware attacks.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-14\"><span data-contrast=\"auto\">The ramifications of data exfiltration extend far beyond immediate financial losses. Compromised data can disrupt the operations of an organization, jeopardizing everything from day-to-day activities to long-term strategic goals. The potential reputational damage can be devastating, as a breached organization may struggle to regain the trust of customers, partners, and stakeholders.\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-15\"><span>How Do Cybercriminals Exfiltrate Data?\u00a0<\/span><\/h2>\n<p class=\"ai-optimize-16\"><span data-contrast=\"auto\">One of the primary reasons cybercriminals successfully access and exfiltrate data is social engineering. Cybercriminals can gain initial entry by deceiving users into disclosing confidential information or unknowingly installing malicious software. Once the malware infects the target system, it establishes a shell connection with the compromised computer. This connection acts as a covert communication channel, enabling the cybercriminal to interact directly with the system\u2019s operating environment.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-17\"><span data-contrast=\"auto\">After successfully establishing a foothold, cybercriminals can command the infected computer to begin transferring its data to the cybercriminal\u2019s server. The data transfer is called \u201cdata exfiltration\u201d and is executed to avoid detection. Cybercriminals demonstrate caution by imposing size constraints on the data packets being exfiltrated, minimizing the risk of triggering security alarms.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-18\"><span data-contrast=\"auto\">Additionally, cybercriminals exploit commonly used network protocols such as HTTP, HTTPS, and DNS for exfiltration. These protocols are standard practices for legitimate web traffic and domain name resolution, making them less likely to be blocked or flagged. Using everyday protocols helps cybercriminals maintain a low profile while siphoning off sensitive information from their victims\u2019 networks.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-19\"><span>Detecting and Preventing Data Exfiltration\u00a0<\/span><\/h2>\n<p class=\"ai-optimize-20\"><span data-contrast=\"auto\">Ransomware can strike without warning, leaving organizations to mitigate the fallout. However, taking a proactive approach can significantly reduce the damage and increase your chances of a quick recovery. Here are solutions on how to minimize the impact of a ransomware attack:<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-21\"><strong><span>Security Awareness Training<\/span><\/strong>:<span data-contrast=\"auto\">\u00a0Educate users on recognizing phishing scams, remote work best practices, password hygiene, personal device use, and proper handling of company data to reduce risk.Trainings should be conducted beyond the traditional once-a-year approach to ensure continuous learning and adaptation to evolving threats. It\u2019s also crucial to identify higher-risk users who may require additional, targeted training to address their specific vulnerabilities and enhance their security awareness.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-22\"><strong><span>Threat Detection and Response<\/span><\/strong><span><a href=\"https:\/\/adlumin.com\/platform\/threat-intelligence\/\">:<\/a><\/span><span data-contrast=\"auto\">\u00a0Use technologies that continuously monitor and analyze network traffic and user activity and ingest telemetry across your environment to detect potential threats. By applying behavior analytics and automated response actions, these systems enable security teams to quickly identify and respond to threats in real-time with minimal manual intervention.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-23\"><span><strong>Ransomware and Exfiltration Prevention<\/strong>:\u00a0<strong>This Adlumin capability<\/strong><\/span><span data-contrast=\"auto\">\u00a0focuses on detecting and halting data exfiltration activities to prevent ransomware attacks early, offering:<\/span>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-24\"><b><span data-contrast=\"auto\">Early Threat Detection:<\/span><\/b><span data-contrast=\"auto\">\u00a0Provides early ransomware warnings to enable prompt action before significant damage.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-25\"><b><span data-contrast=\"auto\">Process Chain Disruption:\u00a0<\/span><\/b><span data-contrast=\"auto\">Stops exfiltration activities, preventing both data theft and ransomware deployment.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-26\"><b><span data-contrast=\"auto\">Comprehensive Coverage:<\/span><\/b><span data-contrast=\"auto\">\u00a0Protects against a wide range of exfiltration methods.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\" class=\"ai-optimize-27\"><b><span data-contrast=\"auto\">Ease of Integration:<\/span><\/b><span data-contrast=\"auto\">\u00a0Enhances existing security infrastructure without disrupting operations.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p class=\"ai-optimize-28\"><span data-contrast=\"auto\">Most ransomware and exfiltration prevention solutions stop at isolating the compromised host, alerting you that a cybercriminal is exfiltrating or encrypting your data. While this is helpful, it\u2019s not always enough. The key question remains: How much data have you already lost?\u00a0<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p class=\"ai-optimize-29\"><strong><span>The Ransomware and Exfiltration Prevention <\/span><\/strong><span data-contrast=\"auto\">addresses this concern head-on by terminating the exfiltration and encryption processes as soon as they are detected. This immediate action drastically reduces the amount of data a cybercriminal can access. By the time the host is isolated, the damage has been minimized, if not entirely prevented, taking exfiltration and encryption prevention to the next level.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-30\"><span>Strengthening Ransomware Resilience\u00a0<\/span><\/h2>\n<p class=\"ai-optimize-31\"><span data-contrast=\"auto\">In any type of ransomware attack, embracing a proactive, multi-layered defense strategy will go a long way in limiting damage. With early detection systems, decoy files, and rapid response protocols, you can minimize ransomware damage. This approach disrupts the attacker\u2019s efforts and ensures your data remains as secure as possible. Remember, the key is to detect and isolate, minimize data loss, and recover quickly. By integrating these proactive measures, you\u2019re setting your organization up for resilience against ransomware threats.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h2 class=\"ai-optimize-32\"><span>Stop Encryption and Secure Your Files\u00a0<\/span><\/h2>\n<p class=\"ai-optimize-33\"><span data-contrast=\"auto\">Protect your organization with the <\/span><strong><span>Ransomware and Exfiltration Prevention<\/span><\/strong><span data-contrast=\"auto\"> capabilities available in the Adlumin Security Operations Platform. Act now to secure your files and safeguard your financial and business integrity. <\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Boost ransomware resilience with Adlumin&#8217;s early threat detection and prevention. Minimize data loss, secure files, and protect your business from cyberattacks.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-70299","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Evolving Ransomware Tactics Make Data Exfiltration a Top Security Concern - N-able<\/title>\n<meta name=\"description\" content=\"Protect your business with Adlumin\u2019s ransomware prevention\u2014detect threats early, minimize data loss, and keep your files and integrity secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evolving Ransomware Tactics Make Data Exfiltration a Top Security Concern - N-able\" \/>\n<meta property=\"og:description\" content=\"Protect your business with Adlumin\u2019s ransomware prevention\u2014detect threats early, minimize data loss, and keep your files and integrity secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-27T16:37:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-28T09:35:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_EvolvingRansomwareTacticsMakeDataExfiltrationaTopSecurityConcern.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Evolving Ransomware Tactics Make Data Exfiltration a Top Security Concern\",\"datePublished\":\"2024-06-27T17:37:23+01:00\",\"dateModified\":\"2025-08-28T09:35:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern\"},\"wordCount\":1002,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern\",\"name\":\"Evolving Ransomware Tactics Make Data Exfiltration a Top Security Concern - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2024-06-27T17:37:23+01:00\",\"dateModified\":\"2025-08-28T09:35:40+00:00\",\"description\":\"Protect your business with Adlumin\u2019s ransomware prevention\u2014detect threats early, minimize data loss, and keep your files and integrity secure.\",\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Evolving Ransomware Tactics Make Data Exfiltration a Top Security Concern - N-able","description":"Protect your business with Adlumin\u2019s ransomware prevention\u2014detect threats early, minimize data loss, and keep your files and integrity secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern","og_locale":"de_DE","og_type":"article","og_title":"Evolving Ransomware Tactics Make Data Exfiltration a Top Security Concern - N-able","og_description":"Protect your business with Adlumin\u2019s ransomware prevention\u2014detect threats early, minimize data loss, and keep your files and integrity secure.","og_url":"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-06-27T16:37:23+00:00","article_modified_time":"2025-08-28T09:35:40+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_EvolvingRansomwareTacticsMakeDataExfiltrationaTopSecurityConcern.png","type":"image\/png"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Evolving Ransomware Tactics Make Data Exfiltration a Top Security Concern","datePublished":"2024-06-27T17:37:23+01:00","dateModified":"2025-08-28T09:35:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern"},"wordCount":1002,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern","url":"https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern","name":"Evolving Ransomware Tactics Make Data Exfiltration a Top Security Concern - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2024-06-27T17:37:23+01:00","dateModified":"2025-08-28T09:35:40+00:00","description":"Protect your business with Adlumin\u2019s ransomware prevention\u2014detect threats early, minimize data loss, and keep your files and integrity secure.","inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/evolving-ransomware-tactics-make-data-exfiltration-a-top-security-concern"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/70299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=70299"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/70299\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=70299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}