{"id":3071,"date":"2019-04-10T08:39:56","date_gmt":"2019-04-10T06:39:56","guid":{"rendered":"https:\/\/qwertz.robin-data.io\/?p=3071"},"modified":"2025-03-24T13:34:24","modified_gmt":"2025-03-24T12:34:24","slug":"collection-1-hack-data-protection-for-companies","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/collection-1-hack-data-protection-for-companies","title":{"rendered":"Collection #1 Hack - What you have to do now"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4kk29b-5dbb6990c06837dcff589f81d4365528\">\n.flex_column.av-4kk29b-5dbb6990c06837dcff589f81d4365528{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-4kk29b-5dbb6990c06837dcff589f81d4365528 av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-krfl0fsg-cab7e0521b7ba7765fede403a3ba1696'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\">Data Protection News<\/a> \u00bb <strong>Collection #1 Hack - What you have to do now<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdzqc68e-28ce7ece75c20a7507c1b34a0f58530a\">\n.avia-image-container.av-kdzqc68e-28ce7ece75c20a7507c1b34a0f58530a img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kdzqc68e-28ce7ece75c20a7507c1b34a0f58530a .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kdzqc68e-28ce7ece75c20a7507c1b34a0f58530a av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  avia-builder-el-last'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14069 avia-img-lazy-loading-not-14069 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150331\/Anonymisierungsverfahren.jpg\" alt='Collection #1 Hack - What You Need To Do Now' title=''  height=\"343\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150331\/Anonymisierungsverfahren.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150331\/Anonymisierungsverfahren-300x150.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150331\/Anonymisierungsverfahren-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-b6str-6c6d84158c0ee615aaeb81f205839a21\">\n.flex_column.av-b6str-6c6d84158c0ee615aaeb81f205839a21{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-b6str-6c6d84158c0ee615aaeb81f205839a21 av_one_full  avia-builder-el-3  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-24xhfz-efb25df9d2a359bca40e8011105f4620\">\n#top .av-special-heading.av-24xhfz-efb25df9d2a359bca40e8011105f4620{\npadding-bottom:10px;\ncolor:#303440;\n}\nbody .av-special-heading.av-24xhfz-efb25df9d2a359bca40e8011105f4620 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-24xhfz-efb25df9d2a359bca40e8011105f4620 .special-heading-inner-border{\nborder-color:#303440;\n}\n.av-special-heading.av-24xhfz-efb25df9d2a359bca40e8011105f4620 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-24xhfz-efb25df9d2a359bca40e8011105f4620 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-4  el_before_av_textblock  avia-builder-el-first'><h1 class='av-special-heading-tag'  itemprop=\"headline\"  >Collection #1 Hack - What you have to do now<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kdzq9d1i-ff2dc8e1e5c14ebf148ee89a32b53ec7'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>These days, 773 million e-mail addresses and 21 million different passwords for online services used worldwide have appeared in Darknet underground forums. According to experts, the list of stolen user information is structured in such a way that it is ideal for implementing the hacker attack \"<a href=\"https:\/\/en.wikipedia.org\/wiki\/Credential_stuffing\" target=\"_blank\" rel=\"nofollow noopener\">credential stuffing<\/a>\" (fill in registration data) are suitable.<\/p>\n<p>In this article you will learn what you need to do now.<\/p>\n<h2>Background<\/h2>\n<p>With credential stuffing, the attacker attempts to gain access to a web service via an automated process. To do this, they use a software program to feed the login mechanism of various web services with e-mail and password combinations from a large user name\/password list.<\/p>\n<p>Collection #1 is a data source that contains many such lists. It contains almost 2.7 billion username-password combinations. Attackers could use them to hijack and control massive numbers of accounts from online web services.<\/p>\n<p>This is particularly successful because many users\u00a0<em>the same combinations<\/em> of mail addresses and passwords for different services. They may therefore become victims of random hits from the Credential Stuffing attack.<\/p>\n<p>To ensure that your accounts are protected, or rather not affected, please take the following steps:<\/p>\n<h2>1. check whether you are affected by Collection #1<\/h2>\n<p>Check on the online service \"<a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Pwnd passwords<\/a>\" whether you are affected. To do this, enter your e-mail address used as your user name in the web service. You will then receive information as to whether this e-mail address is contained in Collection #1 or similar lists.<\/p>\n<p>Don't worry: this service is operated by security researchers and is safe!<\/p>\n<h2><strong>2. Change the password<\/strong><\/h2>\n<p>Change the passwords of all affected online services where you use a corrupted mail address as login name. It is best to change the passwords of all other services you use regularly or which contain sensitive data.<\/p>\n<p>To change the passwords, you usually log in to the respective online service. There you can change your password in Account Settings.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3rngu7-4e99773766030e579f48844e9f4dac67\">\n.flex_column.av-3rngu7-4e99773766030e579f48844e9f4dac67{\npadding:35px 25px 30px 25px;\nbackground-color:#b3dff1;\n}\n<\/style>\n<div  class='flex_column av-3rngu7-4e99773766030e579f48844e9f4dac67 av_one_full  avia-builder-el-6  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-ky7gvi65-aa14b641c9257e477ce38a0d8beaa8a7'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong>External Data Protection Officer<\/strong><\/p>\n<p>You are welcome to contact us as\u00a0<strong>external data protection officer (DPO)\u00a0<\/strong>order. We also offer individual consulting services as well as audits and will be happy to provide you with a non-binding offer. You can find more information about our external data protection officers on our website.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-ky7gvo0u-0a55ef9b11f1231f98381bb4c46e7b93-wrap avia-button-left  avia-builder-el-8  el_after_av_textblock  avia-builder-el-last'><a href='https:\/\/www.robin-data.io\/en\/data-protection-officer-gdpr'  class='avia-button av-ky7gvo0u-0a55ef9b11f1231f98381bb4c46e7b93 av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Discover DSB services\"><span class='avia_iconbox_title' >Discover DSB services<\/span><\/a><\/div><\/p><\/div><\/p>\n<div  class='flex_column av-2pjaov-43ca9c938df83b66c2977a322d4ac3aa av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-kdzqball-82db6bf32815eb57bf1ff24c789f78bd'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2><strong>3. Use secure passwords<\/strong><\/h2>\n<p>Use secure passwords for this and from now on. A secure password should be as long as possible. Security researchers recommend a length of at least 12 characters.<\/p>\n<p>Strings of characters within the password should not appear in dictionaries. Ideally, your password should consist of upper and lower case letters and numbers and, if necessary, 1-2 special characters.<\/p>\n<p>You can create a secure password using the so-called\u00a0<em>Mnemonic rule<\/em>. To do this, think of a sentence and create the password by combining letters within that sentence.<\/p>\n<p>An example of a mnemonic could look as follows:<\/p>\n<blockquote>\n<p>I would like to make my online accounts more secure in the near future and use a secure password for each account!<\/p>\n<\/blockquote>\n<p>If you use the first letter of each word to create the 23-digit password, it would be as follows:<\/p>\n<blockquote>\n<p>IwlTmmoamsitNfauaSpfea!<\/p>\n<\/blockquote>\n<p>This password is secure according to\u00a0<a href=\"https:\/\/www.heise.de\/security\/meldung\/Sichere-Passwoerter-Viele-der-herkoemmlichen-Sicherheitsregeln-bringen-nichts-3797935.html\" target=\"_blank\" rel=\"nofollow noopener\">state of the art technology\u00a0<\/a>and the\u00a0<a href=\"https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html\" target=\"_blank\" rel=\"nofollow noopener\">is based on the recommendations of the security experts of NIST<\/a>\u00a0(National Institute for Standardization, USA), which develop such recommendations with worldwide validity<a href=\"https:\/\/www.heise.de\/security\/meldung\/Sichere-Passwoerter-Viele-der-herkoemmlichen-Sicherheitsregeln-bringen-nichts-3797935.html\" target=\"_blank\" rel=\"noopener\">.<\/a><\/p>\n<h2>4. Create and remember passwords more easily - use digital tools<\/h2>\n<p>It is clear that the mnemonic rule is catchy, but for the multitude of online services used today it is very difficult to apply. For this reason, it is advisable to use digital tools to manage passwords.<\/p>\n<p>The free and from the\u00a0<a href=\"https:\/\/www.bsi-fuer-buerger.de\/BSIFB\/DE\/Empfehlungen\/Passwoerter\/passwoerter_node.html\" target=\"_blank\" rel=\"nofollow noopener\">BSI<\/a>\u00a0(German Federal Office for Information Security) recommended tool\u00a0<a href=\"https:\/\/keepass.info\/\" target=\"_blank\" rel=\"nofollow noopener\">Keepass<\/a>. Keepass is available for Windows, Mac OS, Linux, iOS and Android.<\/p>\n<p>Keepass can generate secure passwords for you. These can then be stored together with the user name of an online service in a secure password vault in Keepass.<\/p>\n<p>In future, log in to a web service, simply copy the username and password from Keepass and use these data to login.<\/p>\n<p>To secure the password vault, you then need a very secure password. Create this with a long record based on the above mnemonic rule. Write down this password - and possibly other very important passwords - on a piece of paper and store it, for example in a safe.<\/p>\n<p>Tip: you can also store PIN numbers of your bank cards and other sensitive information in Keepass. Use this opportunity to protect your sensitive data!<\/p>\n<h2>What do we learn from the Collection #1 Hack?<\/h2>\n<p>It has again been confirmed that absolute security does not exist. Hackers are as active as ever and every online service is potentially at risk of being hacked.<\/p>\n<p>Nevertheless, it\u00a0<em>also<\/em>\u00a0depends on us to protect our own accounts and data as well as possible against attacks. The following points can guide us in this:<\/p>\n<ul>\n<li>Choose online services you use carefully. For example, to test a service, use\u00a0<a href=\"http:\/\/www.emailtester.de\/anonyme-email-adresse\/wegwerf-einmalmail.php\" target=\"_blank\" rel=\"nofollow noopener\">Disposable e-mail addresses<\/a>\u00a0 that they only use once.<\/li>\n<li>Ideally, use a unique combination of user name and password for each online service<\/li>\n<li>Change your passwords regularly. Use a password vault to manage the multitude of secure passwords, such as\u00a0<a href=\"https:\/\/keepass.info\/\" target=\"_blank\" rel=\"nofollow noopener\">Keepass<\/a><\/li>\n<li>If possible use the\u00a0<a href=\"https:\/\/de.wikipedia.org\/wiki\/Zwei-Faktor-Authentisierung\" target=\"_blank\" rel=\"nofollow noopener\">2-factor authentication<\/a>\u00a0to protect your online account<\/li>\n<li>Protect your children online by creating an email address for them that does not reveal their identity.<\/li>\n<\/ul>\n<p>Providers of online services will also face enormous challenges in the future to ensure the security of customer data.<\/p>\n<p>Fundamental safety deficiencies as in the case of\u00a0<a href=\"https:\/\/www.golem.de\/news\/knuddels-leak-datenschuetzer-verhaengen-erstmalig-bussgeld-nach-dsgvo-1811-137857.html\" target=\"_blank\" rel=\"nofollow noopener\">Cuddles.com<\/a>\u00a0must be avoided. There is a need for further standards that regulate the security of online services in a binding manner across all sectors in the future.<\/p>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-11  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-13  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/collection-1-hack-data-protection-for-companies&#038;t=Collection%20%231%20Hack%20%E2%80%93%20Das%20m%C3%BCssen%20Sie%20jetzt%20unternehmen' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Collection%20%231%20Hack%20%E2%80%93%20Das%20m%C3%BCssen%20Sie%20jetzt%20unternehmen&#038;url=https:\/\/www.robin-data.io\/en\/?p=3071' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Collection%20%231%20Hack%20%E2%80%93%20Das%20m%C3%BCssen%20Sie%20jetzt%20unternehmen&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/collection-1-hack-data-protection-for-companies' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Collection%20%231%20Hack%20%E2%80%93%20Das%20m%C3%BCssen%20Sie%20jetzt%20unternehmen&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/collection-1-hack-data-protection-for-companies' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-14  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: center;\">This might interest you too:<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-16  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-17  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-16316 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7' data-rel='slide-1' class='slide-image' title='TISAX requirements: Prepare certification step by step'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall-495x343.png\" class=\"wp-image-15255 avia-img-lazy-loading-not-15255 attachment-portfolio size-portfolio wp-post-image\" alt=\"IT security incident\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: TISAX requirements: Prepare certification step by step\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7' title='TISAX requirements: Prepare certification step by step'>TISAX requirements: Prepare certification step by step<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >TISAX\u00ae requirements: Information on the question catalogue, maturity levels and certification. Prepare the assessment level and audit.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-01-08T13:19:57+01:00\" >8 January 2024<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-04-10T08:39:56+02:00\" >2024-01-08 13:19:57<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 16:15:24<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>TISAX requirements: Prepare certification step by step<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-15168 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident' data-rel='slide-1' class='slide-image' title='What to do in the event of an IT security incident?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall-495x343.png\" class=\"wp-image-15255 avia-img-lazy-loading-not-15255 attachment-portfolio size-portfolio wp-post-image\" alt=\"IT security incident\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: What to do in the event of an IT security incident?\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident' title='What to do in the event of an IT security incident?'>What to do in the event of an IT security incident?<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >The most important facts about IT security incidents. Learn practical tips on recognising and dealing with IT emergencies in the article.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-12-07T13:52:45+01:00\" >7 December 2022<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-04-10T08:39:56+02:00\" >2022-12-07 13:52:45<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>What to do in the event of an IT security incident?<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-12189 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system' data-rel='slide-1' class='slide-image' title='ISMS: definition, implementation, standards'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-not-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: ISMS: Definition, implementation, standards\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system' title='ISMS: definition, implementation, standards'>ISMS: definition, implementation, standards<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >All information on the information security management system: delimitation of DPMS, notes on implementation, norms and standards<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-10-26T14:56:51+02:00\" >26 October 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-04-10T08:39:56+02:00\" >2021-10-26 14:56:51<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:26<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ISMS: definition, implementation, standards<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>773 million e-mail addresses and 21 million different passwords for online services used worldwide have been discovered in underground forums in the Dark Net these days. According to experts, the list of stolen user information is structured in such a way that it is ideally suited for the implementation of the hacker attack \"Credential Stuffing\" (filling in login data).<\/p>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[48,37,39],"class_list":["post-3071","post","type-post","status-publish","format-standard","hentry","category-news","tag-cybersicherheit","tag-datenschutz","tag-dsgvo"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Collection #1 Hack - Das m\u00fcssen Sie jetzt unternehmen<\/title>\n<meta name=\"description\" content=\"Im Dark-Net-Foren tauchten dieser Tage die Liste Collection #1 von 773 Mio. E-Mailadresse und 21 Mio. Passw\u00f6rter auf. Jetzt lesen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/collection-1-hack-data-protection-for-companies\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Collection #1 Hack - Das m\u00fcssen Sie jetzt unternehmen\" \/>\n<meta property=\"og:description\" content=\"Im Dark-Net-Foren tauchten dieser Tage die Liste Collection #1 von 773 Mio. E-Mailadresse und 21 Mio. Passw\u00f6rter auf. Jetzt lesen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/collection-1-hack-data-protection-for-companies\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-10T06:39:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T12:34:24+00:00\" \/>\n<meta name=\"author\" content=\"Nadine Porrmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nadine Porrmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen\"},\"author\":{\"name\":\"Nadine Porrmann\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/cd2d4df99b245d9905556830d2c24ffd\"},\"headline\":\"Collection #1 Hack &#8211; Das m\u00fcssen Sie jetzt unternehmen\",\"datePublished\":\"2019-04-10T06:39:56+00:00\",\"dateModified\":\"2025-03-24T12:34:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen\"},\"wordCount\":2409,\"commentCount\":0,\"keywords\":[\"Cybersicherheit\",\"Datenschutz\",\"DSGVO\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen\",\"name\":\"Collection #1 Hack - Das m\u00fcssen Sie jetzt unternehmen\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"datePublished\":\"2019-04-10T06:39:56+00:00\",\"dateModified\":\"2025-03-24T12:34:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/cd2d4df99b245d9905556830d2c24ffd\"},\"description\":\"Im Dark-Net-Foren tauchten dieser Tage die Liste Collection #1 von 773 Mio. E-Mailadresse und 21 Mio. Passw\u00f6rter auf. Jetzt lesen!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Collection #1 Hack &#8211; Das m\u00fcssen Sie jetzt unternehmen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/cd2d4df99b245d9905556830d2c24ffd\",\"name\":\"Nadine Porrmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4f949e3e6176aee133c62cae3f6c9b60f6a23345769503ffdf287ed18cbf93ba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4f949e3e6176aee133c62cae3f6c9b60f6a23345769503ffdf287ed18cbf93ba?s=96&d=mm&r=g\",\"caption\":\"Nadine Porrmann\"},\"description\":\"Frau Porrmann verf\u00fcgt \u00fcber weitreichende Kenntnisse im Marketing und die damit einhergehenden Datenschutz-Anforderungen.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/npo\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Collection #1 Hack - What You Need To Do Now","description":"The Collection #1 list of 773 million email addresses and 21 million passwords appeared in the Dark Net forums these days. Read now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/collection-1-hack-data-protection-for-companies","og_locale":"en_GB","og_type":"article","og_title":"Collection #1 Hack - Das m\u00fcssen Sie jetzt unternehmen","og_description":"Im Dark-Net-Foren tauchten dieser Tage die Liste Collection #1 von 773 Mio. E-Mailadresse und 21 Mio. Passw\u00f6rter auf. Jetzt lesen!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/collection-1-hack-data-protection-for-companies","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2019-04-10T06:39:56+00:00","article_modified_time":"2025-03-24T12:34:24+00:00","author":"Nadine Porrmann","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Nadine Porrmann","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen"},"author":{"name":"Nadine Porrmann","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/cd2d4df99b245d9905556830d2c24ffd"},"headline":"Collection #1 Hack &#8211; Das m\u00fcssen Sie jetzt unternehmen","datePublished":"2019-04-10T06:39:56+00:00","dateModified":"2025-03-24T12:34:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen"},"wordCount":2409,"commentCount":0,"keywords":["Cybersicherheit","Datenschutz","DSGVO"],"articleSection":["News"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen","name":"Collection #1 Hack - What You Need To Do Now","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"datePublished":"2019-04-10T06:39:56+00:00","dateModified":"2025-03-24T12:34:24+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/cd2d4df99b245d9905556830d2c24ffd"},"description":"The Collection #1 list of 773 million email addresses and 21 million passwords appeared in the Dark Net forums these days. Read now!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/collection-1-hack-das-muessen-sie-jetzt-unternehmen#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Collection #1 Hack &#8211; Das m\u00fcssen Sie jetzt unternehmen"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/cd2d4df99b245d9905556830d2c24ffd","name":"Nadine Porrmann","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4f949e3e6176aee133c62cae3f6c9b60f6a23345769503ffdf287ed18cbf93ba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4f949e3e6176aee133c62cae3f6c9b60f6a23345769503ffdf287ed18cbf93ba?s=96&d=mm&r=g","caption":"Nadine Porrmann"},"description":"Ms. Porrmann has extensive knowledge in marketing and the associated data protection requirements.","url":"https:\/\/www.robin-data.io\/en\/author\/npo"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/3071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=3071"}],"version-history":[{"count":11,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/3071\/revisions"}],"predecessor-version":[{"id":7251,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/3071\/revisions\/7251"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=3071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=3071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=3071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}