{"id":3503,"date":"2024-03-07T11:48:09","date_gmt":"2024-03-07T10:48:09","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=3503"},"modified":"2024-11-29T12:14:20","modified_gmt":"2024-11-29T11:14:20","slug":"assume-breach","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/service\/assume-breach\/","title":{"rendered":"Assume Breach"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:45%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-6e38dce4913a87c64c11b9d874bc047f\"><strong>Assume Breach<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color wp-elements-e700e3ec73c1be2c51966f12d6e498dc\" style=\"font-style:normal;font-weight:600\">Assume that you are being hacked!<\/h1>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Configure Assume Breach<\/a><\/div>\n\n\n\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link has-contrast-color has-text-color has-background has-link-color has-border-color has-primary-border-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/contact\/\" style=\"border-width:2px;background-color:#ffffff00\">Get advice<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-spezialisten-trainings.svg\" alt=\"Assume Breach\" class=\"wp-image-548\" style=\"width:520px\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-e5780d3d wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:150px;padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group contentbox-main-container wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-a687b86e wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<h2 class=\"wp-block-heading\">Do you recognise the spread in your network?<\/h2>\n<\/div>\n\n\n\n<p>Assume Breach is a security strategy that assumes that an attack on a system or organisation is inevitable and that it is therefore important to minimise the impact of such an attack as much as possible. The idea behind Assume Breach is that it is better to prepare for the defence of attacks rather than assuming that a system is completely secure.<\/p>\n\n\n\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<h2 class=\"wp-block-heading\">What measures does Assume Breach include?<\/h2>\n\n\n\n<p id=\"hOonOBxU2JVVwGwU\">When carrying out an Assume Breach Assessment, hackers proceed in a similar way to a Red Teaming Assessment.<\/p>\n\n\n\n<p id=\"rLIFoGQrbwIfaAQm\">In contrast to red teaming, however, the attackers already have initial access to the internal network, for example via a compromised VPN access or malware that is executed on a computer.<\/p>\n\n\n\n<p id=\"SxE2cCLq4InfAt3K\">The basic idea is this: Just because a network appears secure at the current time, there is still a high probability that attackers will be able to gain initial access in one way or another.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the aim of Assume Breach?<\/h2>\n\n\n\n<p>The aim of an Assume Breach Assessment is to analyse in a targeted manner whether an attacker attempting to spread within the internal network is detected and effective measures are taken to prevent further spread and the outflow of data.<\/p>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Typical sequence of events in a real attack on a company<\/h2>\n\n\n\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-c5fbdba4 wp-block-group-is-layout-flex\" style=\"margin-top:60px\">\n<div class=\"wp-block-group line-holder wp-container-content-b3829bdc is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<div class=\"timline-line\"><\/div>\n\n\n\n<div class=\"timline-line-base\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group wp-container-content-68ac353a is-layout-flex wp-container-core-group-is-layout-4255f73a wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">An attacker gains initial access to the company<\/h6>\n\n\n\n<p>An employee uses the same password in several places. A social network to which the employee has logged in with the company email address suffers a data leak, as a result of which the employee's password becomes known. A hacker group exploits this and gains access to the internal network via the company's VPN.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">No alarms!<\/h6>\n\n\n\n<p>As the employee regularly dials in himself via the VPN, the behaviour of the attackers has not yet been conspicuous. They gain access to a host on which the employee has user rights and can access different network shares.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">Escalation of privileges!<\/h6>\n\n\n\n<p>The hackers can escalate their rights on the host and become the local administrator. This enables the attackers to download additional malware undetected and obtain further passwords and authorisation tokens.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">Spreading in the network<\/h6>\n\n\n\n<p>The additional user information and authorisation tokens allow the attackers to spread further and further across the network undetected. They use not only hacker tools, but also programs available on the systems that are not recognised as malicious by any anti-virus programs.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">Access to the heart of the company<\/h6>\n\n\n\n<p>By chaining rights escalations, the attackers gain access to the domain controller and thus control over all roles and rights assignments. Access to the backup server can now also take place undisturbed. The attackers have taken over the company and are starting to extract data.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group timebox fade-up is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-3536e24b wp-block-group-is-layout-flex\">\n<h6 class=\"wp-block-heading\">ENCRYPTION!<\/h6>\n\n\n\n<p>After large amounts of data containing sensitive internal company information have leaked out of the company, the hackers strike and encrypt all the files on the company's computers. They demand a large sum in cryptocurrencies before the decryption key is revealed.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-9e8dd2e9 wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px;padding-right:0px;padding-left:0px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-56944019 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-755c8a6b1ee30e855c23091deb190eea\">We thought we were in an excellent position with our endpoint protection and our managed SOC provider. Laokoon Security showed us where our blind spots were - and offered us targeted suggestions on how to eliminate them.<\/p>\n\n\n\n<p class=\"has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-1adb16cf7c643862bc46f33eda2bdc27\"><em>CISO of a medium-sized company<br><\/em><a href=\"#cta\" data-type=\"page\" data-id=\"30\"><span style=\"text-decoration: underline;\"><strong>Assume Breach<\/strong><\/span><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-7e91b5de wp-block-group-is-layout-flex wp-container-1 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:35px;padding-right:35px;padding-bottom:35px;padding-left:35px\">\n<h6 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-178019bc9120c60b0115dbd4fe6b3ec4\">When does an Assume Breach Assessment make sense for my company?<\/h6>\n\n\n\n<ul class=\"wp-block-list checklist has-base-color has-text-color has-link-color wp-elements-48ce74f6568d1f0f5b782684905a5512\">\n<li>You want to know whether you can reliably recognise ongoing attacks.<\/li>\n\n\n\n<li>They don't just want to rely on theories and promises from manufacturers.<\/li>\n\n\n\n<li>At best, you have already carried out penetration tests and have an overview of your assets.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:25px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Start Assume Breach<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-94d378b02289daa3b1444a4f5402d6a8 wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Broad experience in the team<\/li>\n\n\n\n<li class=\"fade-up\">Highly secure solutions that do not open new doors for attackers<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1444 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1444\" data-uid=\"69debf2e2b74f\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1444\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1444 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1444\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69debf2e2b74f\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1444--page-0\"\n\t\t\t\tclass=\"forminator-pagination forminator-pagination-start\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1444--page-0-label\"\n\t\t\t\tdata-step=\"0\"\n\t\t\t\tdata-label=\"Finish\"\n\t\t\t\tdata-actual-label=\"Page 1\"\n\t\t\t\tdata-name=\"page-break-1\"\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"html-1\" class=\"forminator-field-html forminator-col forminator-col-12\"><div class=\"forminator-field forminator-merge-tags\" data-field=\"html-1\"><label class=\"forminator-label\">Attack is the best defence!<\/label><h4 class=\"has-base-color\">Hire Assume Breach now!<\/h4><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12\"><div role=\"group\" class=\"forminator-field required\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69debf2e2b74f-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69debf2e2b74f-label\" class=\"forminator-label\">What types of attack simulations should be carried out? <span class=\"forminator-required\">*<\/span><\/span><label id=\"forminator-field-checkbox-1-1-69debf2e2b74f-label\" for=\"forminator-field-checkbox-1-1-69debf2e2b74f\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Red Teaming\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"redteaming\" id=\"forminator-field-checkbox-1-1-69debf2e2b74f\" aria-labelledby=\"forminator-field-checkbox-1-1-69debf2e2b74f-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Red Teaming<\/span><\/label><label id=\"forminator-field-checkbox-1-2-69debf2e2b74f-label\" for=\"forminator-field-checkbox-1-2-69debf2e2b74f\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Assume Breach\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"assumebreach\" id=\"forminator-field-checkbox-1-2-69debf2e2b74f\" aria-labelledby=\"forminator-field-checkbox-1-2-69debf2e2b74f-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Assume Breach<\/span><\/label><label id=\"forminator-field-checkbox-1-3-69debf2e2b74f-label\" for=\"forminator-field-checkbox-1-3-69debf2e2b74f\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Sensory test\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"sensoriktest\" id=\"forminator-field-checkbox-1-3-69debf2e2b74f\" aria-labelledby=\"forminator-field-checkbox-1-3-69debf2e2b74f-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Sensory test<\/span><\/label><label id=\"forminator-field-checkbox-1-4-69debf2e2b74f-label\" for=\"forminator-field-checkbox-1-4-69debf2e2b74f\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"CASMART\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"CASMART\" id=\"forminator-field-checkbox-1-4-69debf2e2b74f\" aria-labelledby=\"forminator-field-checkbox-1-4-69debf2e2b74f-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">CASMART<\/span><\/label><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1444--page-1\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1444--page-1-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"1\"\n\t\t\t\tdata-label=\"Page  1\"\n\t\t\t\tdata-actual-label=\"Page 2\"\n\t\t\t\tdata-name=\"page-break-3\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-1\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1444__field--select-1_69debf2e2b74f\" id=\"forminator-form-1444__field--select-1_69debf2e2b74f-label\" class=\"forminator-label\">Have penetration tests and other types of attack simulations already been carried out in the past?<\/label><select  id=\"forminator-form-1444__field--select-1_69debf2e2b74f\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-1\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1444__field--select-1_69debf2e2b74f-label\"><option value=\"yes\"  data-calculation=\"0\">Yes<\/option><option value=\"no\"  data-calculation=\"0\">No<\/option><\/select><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"date-1\" class=\"forminator-field-date forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-date-1-picker_69debf2e2b74f\" id=\"forminator-field-date-1-picker_69debf2e2b74f-label\" class=\"forminator-label\">What is the best time to start implementation?<\/label><div class=\"forminator-input-with-icon\"><span class=\"forminator-icon-calendar\" aria-hidden=\"true\"><\/span><input autocomplete=\"off\" type=\"text\" size=\"1\" name=\"date-1\" value=\"\" placeholder=\"Select date\" id=\"forminator-field-date-1-picker_69debf2e2b74f\" class=\"forminator-input forminator-datepicker\" data-required=\"\" data-format=\"mm\/dd\/yy\" data-restrict-type=\"\" data-restrict=\"\" data-start-year=\"1926\" data-end-year=\"2126\" data-past-dates=\"enable\" data-start-of-week=\"1\" data-start-date=\"\" data-end-date=\"\" data-start-field=\"\" data-end-field=\"\" data-start-offset=\"\" data-end-offset=\"\" data-disable-date=\"\" data-disable-range=\"\" \/><\/div><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1444--page-2\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1444--page-2-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"2\"\n\t\t\t\tdata-label=\"Page  2\"\n\t\t\t\tdata-actual-label=\"Page 3\"\n\t\t\t\tdata-name=\"\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69debf2e2b74f\" id=\"forminator-field-name-1_69debf2e2b74f-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69debf2e2b74f\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69debf2e2b74f\" id=\"forminator-field-email-1_69debf2e2b74f-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69debf2e2b74f\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69debf2e2b74f\" id=\"forminator-field-phone-1_69debf2e2b74f-label\" class=\"forminator-label\">Telephone <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69debf2e2b74f\" class=\"forminator-input forminator-field--phone\" data-required=\"1\" aria-required=\"true\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69debf2e2b74f\" id=\"forminator-field-textarea-1_69debf2e2b74f-label\" class=\"forminator-label\">Do you have further information that we should know?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69debf2e2b74f\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69debf2e2b74f\" id=\"forminator-field-consent-1_69debf2e2b74f-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69debf2e2b74f__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69debf2e2b74f\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69debf2e2b74f-label\" aria-describedby=\"forminator-field-consent-1_69debf2e2b74f__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69debf2e2b74f__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><button class=\"forminator-button forminator-pagination-submit\" style=\"display: none;\" disabled>Send message<\/button><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"33491488ac\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/3503\" \/><input type=\"hidden\" name=\"form_id\" value=\"1444\"><input type=\"hidden\" name=\"page_id\" value=\"3503\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/service\/assume-breach\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_9\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_9\" type=\"text\" name=\"input_9\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-4f7ca424 wp-block-group-is-layout-flex\" style=\"margin-top:80px;margin-bottom:0px;padding-right:15px;padding-left:15px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b34fc131 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1327.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n\n<\/style>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Assume Breach Gehen Sie davon aus, dass Sie gehackt werden! Erkennen Sie die Ausbreitung in Ihrem Netzwerk? Assume Breach ist eine Sicherheitsstrategie, die davon ausgeht, dass ein Angriff auf ein System oder eine Organisation unvermeidlich ist und dass es daher wichtig ist, die Auswirkungen eines solchen Angriffs so weit wie m\u00f6glich zu minimieren. Die Idee [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":548,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-3503","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/3503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=3503"}],"version-history":[{"count":7,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/3503\/revisions"}],"predecessor-version":[{"id":3882,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/3503\/revisions\/3882"}],"up":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/18"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/548"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=3503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}