Itsicherheit-online.com - SEO Checker

Overview of the SEO Check
Meta information
100% 
Page quality
66% 
Page structure
58% 
Link structure
38% 
Server
91% 
External factors
100% 
SEO Score
Response time
0.04 s
File size
320.30 kB
Words
753
Media files
28
Number of links
75 internal / 1 external

Task list of SEO Improvements

Meta specifications

Title
(Critically important)
Fachmagazin IT-SICHERHEIT
The length of the page title is perfect. (272 pixels out of 580 max pixel length)
There are no duplicate words in the title
Meta description
(Critically important)
Das Portal IT-SICHERHEIT bietet Software, Dienstleistungen, Fachbeiträge, Seminare, Webinare von Cybersecurity bis Informationssicherheit.
The length of the meta description is perfect. (881 pixels out of 1000 max pixel length)
Crawlability
(Critically important)
There are no problems in accessing the website.
Canonical URL
(Important)
https://www.itsicherheit-online.com/
There is a valid canonical link specified.
Language
(Somewhat important)
Language detected in text: de
Language defined in HTML: de
Server location: Germany
The following language is defined by HTML: de
Alternate/Hreflang Links
(Somewhat important)
There are no alternate links specified on this page.
Other meta tags
(Somewhat important)
There is no rel next meta tag on this page.
There is no rel prev meta tag on this page.
Domain
(Somewhat important)
The domain is no subdomain.
The domain length is good.
The domain does not contain non-latin characters.
Page URL
(Somewhat important)
No parameters were found in the URL.
No session ID was found in the URL.
The URL does not have too many subdirectories.
Charset encoding
(Somewhat important)
The charset encoding (UTF-8) is set correctly.
Doctype
(Nice to have)
The doctype HTML 5 is set correctly.
The doctype is placed at first in the HTML code.
Favicon
(Nice to have)
The favicon is linked correctly.

Meta tags

NameValue
msapplication-TileColor#0086c0
msapplication-confighttps://www.itsicherheit-online.com/app/themes/friendventure-itsicherheit-online/dist/assets/icons/favicon/browserconfig-717184c399.xml
theme-color#faf9f8
viewportwidth=device-width, initial-scale=1
referrerstrict-origin-when-cross-origin
robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
authorjyoung
descriptionDas Portal IT-SICHERHEIT bietet Software, Dienstleistungen, Fachbeiträge, Seminare, Webinare von Cybersecurity bis Informationssicherheit.
google-site-verification__DocHbCh5D-uvJpYh7uZuywP1Ug_c-LOEJEPgsg3Wk
article:modified_time2025-06-25T12:29:33+00:00
langde
twitter:cardsummary
twitter:titleStartseite
twitter:descriptionEmpty
twitter:imagehttps://www.itsicherheit-online.com/app/uploads/2022/02/Bildschirmfoto-2022-02-21-um-11.06.25.png
twitter:image:altNahaufnahme eines Computerbildschirms mit verschwommenem, buntem Programmcode, auf dem Wörter wie „order“ und „post“ zu sehen sind. Die Codezeilen bestehen aus einer Mischung aus orangefarbenem, blauem und weißem Text auf dunklem Hintergrund und vermitteln den Eindruck einer Entwicklungsumgebung.
twitter:site@IT_SICHERHEIT24
og:titleStartseite
og:descriptionEmpty
og:image:altNahaufnahme eines Computerbildschirms mit verschwommenem, buntem Programmcode, auf dem Wörter wie „order“ und „post“ zu sehen sind. Die Codezeilen bestehen aus einer Mischung aus orangefarbenem, blauem und weißem Text auf dunklem Hintergrund und vermitteln den Eindruck einer Entwicklungsumgebung.
og:imagehttps://www.itsicherheit-online.com/app/uploads/2022/02/Bildschirmfoto-2022-02-21-um-11.06.25.png
og:urlhttps://www.itsicherheit-online.com/
og:site_nameIT-SICHERHEIT
charsetutf-8

Automatically check itsicherheit-online.com including all subpages at once!

Try for free
Guaranteed free of charge during trial period.

Page quality

Content
(Critically important)
Some words from the page title are not used within the pages content
Words from the H1 heading are not used in the page content.
There are 2 text duplicates on this page:
  • Duplicate: Nach der betriebswirtschaftlichen Betrachtung im vorhergehenden Beitra...
This page contains 753 words. That's ok.
31.1% of the text are stop words.
The page contains a listing, which indicates a good text layout.
18 paragraphs were found on this page.
No placeholders texts or images were found.
The average number of words per sentence of 14.66 words is good.
Frames
(Critically important)
This page does not use a frameset.
Mobile optimization
(Somewhat important)
A viewport "width=device-width, initial-scale=1" is provided.
At least one Apple touch icon is specified.
Bold and strong tags
(Somewhat important)
The usage of strong and bold tags is perfect. We recommend the use of up to 15 tags for this page.
Image SEO
(Somewhat important)
2 images have no alt attribute. The content of alt attributes is used by search engines.
Social Networks
(Nice to have)
There are only a few social sharing widgets on the page. Make your website popular in social networks with social sharing widgets.
Additional markup
(Nice to have)
No additional page markup was found.
HTTPS
(Somewhat important)
This website uses HTTPS to protect privacy and integrity of the exchanged data.
All included files are also transferred via HTTPS.

Media list

URLAlt attributeTitle
...eader/Assets/logo-desktop-42410f7064.svgIT-SICHERHEIT
...Header/Assets/logo-mobile-b20577979c.svgIT-SICHERHEIT
...-sicherheit_superheld-120x0-c-center.pngSuperheld zeigt beide Daumen nach oben
...er-IT-S_mobil_750x800-120x0-c-center.jpgSlider IT-SICHERHEIT 3/2025 - Mobile Ansicht
...beStock_392567784-1_1-120x0-c-center.pngMobile Slider Webkonferenz auf Laptop
...ock_562715264_750x800-120x0-c-center.pngMann vor Flipchart. Vor ihm Zuhörer und Zuhörerinnen - Mobile Ansicht
data:[...] Base64Blaues Datenschutz-Schild
data:[...] Base64Datenschutz in der Cloud
data:[...] Base64Lupe sucht Schwachstellen
data:[...] Base64Digitale Banksicherheit
data:[...] Base64Cybersecurity Incident Response
data:[...] Base64Schachspiel mit blauem und rotem Team
...anner_Newsletter@2x-2336x0-c-default.jpgBanner Newsletter
data:[...] Base64Angriffserkennung
data:[...] Base64Erkennung von Cyberattacken
data:[...] Base64Cybersecurity
data:[...] Base64Cybersecurity Incident Response
data:[...] Base64KI-basierte Business-Lösung
data:[...] Base64Symbolische Darstellung von Datenbanken mit Datenfeldern und EU-Sternen, die auf Datenschutz und Datenverarbeitung in der EU hinweisen.
data:[...] Base64Cover IT-SICHERHEIT 3/2025
data:[...] Base64Cover IT-SICHERHEIT 2/2025
data:[...] Base64Cover IT-Sicherheit Special IT-Sicherheit im Gesundheitswesen
...anner_Newsletter@2x-2336x0-c-default.jpgBanner Newsletter
data:[...] Base64Eine digitale Illustration eines Telekommunikationsturms vor dunklem Hintergrund. Geometrische Formen und ein blaues Gittermuster verstärken den futuristischen Look und betonen die Technologie hinter dem sicheren Betrieb von 5G-Netzen mit fortschrittlichen Antennen und Satellitenschüsseln.
data:[...] Base64Ein blaues Bild mit technischem Thema zeigt eine Lupe, einen Stapel Datenträger und ein Schild mit einem Vorhängeschloss als Symbol für Sicherheit. Dies spiegelt den Weg „In zwölf Schritten zum ISMS“ wider, alles überlagert auf einem Leiterplattenhintergrund.
data:[...] Base64Eine Person im Anzug sitzt mit einem Laptop am Schreibtisch. Darüber schwebt ein Keycloak-fähiges digitales Schlosssymbol, umgeben von verschiedenen Technologie- und Sicherheitssymbolen, die Cybersicherheitskonzepte repräsentieren. Die Szene spielt in einem modernen, schwach beleuchteten Büroumfeld.
...ext@3x-200x25.806451612903-c-default.pngNo alt attribute provided
...eit@3x-200x21.935483870968-c-default.pngNo alt attribute provided

Page structure

H1 heading
(Critically important)
Awareness-Training: Der Weg zum Cyberhero
Too many H1 headings
Headings
(Important)
Some headings occur twice on the page.
There are 29 headings on the page. The amount of headings should be in a more proper relation to the amount of text.

Heading structure

Heading levelContent
H1 Awareness-Training: Der Weg zum Cyberhero
H1 Webinare und Webkonferenzen
H2 KI in der Abwehr: Erkennen. Reagieren. Überschätzt?
H2 Online-Schulungen und Seminare
H2 Aktuelles
H2 Webinare & Webkonferenzen
H2 Neueste Fachbeiträge
H2 Whitepaper, E-Books und mehr
H2 Newsletter Anmeldung
H2 Meistgelesene Fachbeiträge
H3 Fünf Grundlagen für den Schutz von morgen
H3 Warum beim Datenschutz nachgerüstet werden muss
H3 Nur Priorisieren reicht nicht – Schwachstellenmanagement braucht Taten
H3 DORA: Fünf Gelegenheiten, um Cybersicherheit und Resilienz zu erhöhen
H3 Welche Betriebsmodelle passen zu welcher Organisation?
H3 Warum Prävention jetzt zählt
H3 Angriffserkennung mit einer Enterprise Cybersecurity Plattform
H3 Webkonferenz Angriffserkennung
H3 Speedwebkonferenz KRITIS – Fünf Lösungen in 85 Minuten
H3 Welche Betriebsmodelle passen zu welcher Organisation? Duplicate text
H3 Wenn KI zur Schatten-IT wird
H3 Digitale Souveränität oder Doppelstruktur?
H3 IT-SICHERHEIT 3/2025 – Schwerpunkt EDR | XDR | MDR
H3 IT-SICHERHEIT 2/2025 – Schwerpunkt OT-Security
H3 Special IT-Sicherheit im Gesundheitswesen
H3 Newsletter abonnieren
H3 Wie sich 5G-Netze sicher betreiben lassen
H3 In zwölf Schritten zum ISMS
H3 Keycloak: Log-In und SSO machen noch kein IAM
Some anchor texts are used more than once.
18 links don't have an anchor text.
The number of internal links is ok.
None of the anchor texts is too long.
All internal links are not using dynamic parameters.
There are 1 external links on this page.
LinkAttributesAnchor text
/Subdomain IMG-ALT IT-SICHERHEIT
/kategorie/security-management/Subdomain Security Management
/kategorie/cybersecurity/Subdomain Cybersecurity
/kategorie/endpoint-security/Subdomain Endpoint Security
/kategorie/cloud-web/Subdomain Cloud & Web
/kategorie/managed-security/Subdomain Managed Security
/kategorie/kritis/Subdomain KRITIS
/elearning/Subdomain Cyberhero
/webinare/Subdomain Webinare
/magazin-it-sicherheit/Subdomain Magazin
/roadshow-it-sicherheit-muenchen/Subdomain Roadshow
/anbieter/Subdomain Anbieter
/seminare/Subdomain Seminare
/kategorie/security-management/Subdomain Text duplicate Security Management
/kategorie/cybersecurity/Subdomain Text duplicate Cybersecurity
/kategorie/endpoint-security/Subdomain Text duplicate Endpoint Security
/kategorie/cloud-web/Subdomain Text duplicate Cloud & Web
/kategorie/managed-security/Subdomain Text duplicate Managed Security
/kategorie/kritis/Subdomain Text duplicate KRITIS
/elearning/Subdomain Jetzt testen!
/magazin-it-sicherheit/Subdomain Zum Download
/webinare/Subdomain Zu den Terminen
/seminare/New window Subdomain Text duplicate Zu den Terminen
/news/cybersecurity/fuenf-grun...Subdomain No Text
/kategorie/cybersecurity/Subdomain Text duplicate Cybersecurity
/news/cloud-web/warum-beim-dat...Subdomain No Text
/kategorie/cloud-web/Subdomain Text duplicate Cloud & Web
/news/security-management/nur-...Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/news/security-management/dora...Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/security-management/welche-be...Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/news/security-management/waru...Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/news/Alle aktuellen Beiträge
/newsletter/New window Subdomain IMG-ALT Banner Newsletter
/webinare/angriffserkennung-mi...Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/webinare/webkonferenz-angriff...Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/webinare/speed-webkonferenz-k...Subdomain No Text
/kategorie/kritis/Subdomain Text duplicate KRITIS
/webinare/Alle Webinare & Konferenzen
/security-management/welche-be...Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/security-management/wenn-ki-z...Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/cybersecurity/digitale-souver...Subdomain No Text
/kategorie/cybersecurity/Subdomain Text duplicate Cybersecurity
/fachbeitraege/Alle Fachbeiträge
/downloads/it-sicherheit-3-2025/Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/downloads/it-sicherheit-2-2025/Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/downloads/special-it-sicherhe...Subdomain No Text
/kategorie/kritis/Subdomain Text duplicate KRITIS
/downloads/Alle Downloads
/newsletter/New window Subdomain Text duplicate IMG-ALT Banner Newsletter
/cybersecurity/wie-sich-5g-net...Subdomain No Text
/kategorie/cybersecurity/Subdomain Text duplicate Cybersecurity
/security-management/in-zwoelf...Subdomain No Text
/kategorie/security-management/Subdomain Text duplicate Security Management
/endpoint-security/keycloak-lo...Subdomain No Text
/kategorie/endpoint-security/Subdomain Text duplicate Endpoint Security
https://www.datakontext.com/External Subdomain datakontext.com
/kontakt/Subdomain Kontakt
/magazin-it-sicherheit/Subdomain Text duplicate Magazin
/downloads/Subdomain Whitepaper
/widerruf/Subdomain Widerruf
/datenschutzinformation/Subdomain Datenschutzinformation
/elearning/Subdomain E-Learning IT-Sicherheit
/mediadaten/Subdomain Mediadaten
/impressum/Subdomain Impressum
/datenschutzerklaerung/Subdomain Datenschutzerklärung
/agb/Subdomain AGB

Server configuration

HTTP redirects
(Critically important)
This page redirects to "https://www.itsicherheit-online.com/"
HTTP header
(Important)
The X-powered header is sent within the response header. (unnecessary)
The web server transmits the web page (HTML) in compressed form.
Performance
(Somewhat important)
The page response time is excellent with 0.04 seconds.
The file size of the HTML document is fine (320 kB).

HTTP Response Header

NameValue
servernginx
dateSun, 27 Jul 2025 09:14:32 GMT
content-typetext/html; charset=UTF-8
content-length42763
varyAccept-Encoding,User-Agent
last-modifiedSun, 27 Jul 2025 08:32:07 GMT
accept-rangesbytes
cache-controlmax-age=0
expiresSun, 27 Jul 2025 09:14:32 GMT
content-encodinggzip
x-powered-byPleskLin
statuscode200
http_versionHTTP/2

External factors

This website has excellent links from other websites.
This page has backlinks from 53 referring domains.
This page has 232 backlinks.
This page has backlinks from 28 different ip addresses.

Links from Wikipedia

No links from Wikipedia were found.

Robots.txt

User-agent: *
Disallow: /wp/wp-admin/
Allow: /wp/wp-admin/admin-ajax.php

# START WPFORMS BLOCK
# ---------------------------
User-agent: *
Disallow: /wphttps://www.itsicherheit-online.com/app/uploads/wpforms/
# ---------------------------
# END WPFORMS BLOCK

User-agent: GPTBot
Disallow: /

# Legal notice: itsicherheit-online.com expressly reserves the right to use its content for commercial text and data mining (§ 44 b UrhG).
# The use of robots or other automated means to access itsicherheit-online.com or collect or mine data without
# the express permission of itsicherheit-online.com is strictly prohibited.
# itsicherheit-online.com may, in its discretion, permit certain automated access to certain itsicherheit-online.com pages,
# If you would like to apply for permission to crawl itsicherheit-online.com, collect or use data, please email info@datakontext.com

# START YOAST BLOCK
# ---------------------------
User-agent: *
Disallow:

Sitemap: https://www.itsicherheit-online.com/sitemap_index.xml
# ---------------------------
# END YOAST BLOCK

Search preview

www.itsicherheit-online.com
Fachmagazin IT-SICHERHEIT
Das Portal IT-SICHERHEIT bietet Software, Dienstleistungen, Fachbeiträge, Seminare, Webinare von Cybersecurity bis Informationssicherheit.

Most important keywords

Following keywords were found. You can check the keyword optimization of this page for each keyword.

KeywordResultRecheck
IT-Sicherheit74%Check
Security56%Check
Webinare54%Check
Fachbeiträge54%Check
IT-SICHERHEIT 2025 Schwerpunkt54%Check
Cybersecurity52%Check
News51%Check
Seminare50%Check
Cyberhero50%Check
Awareness-Training50%Check

Automatically check itsicherheit-online.com including all subpages at once!

Try for free
Guaranteed free of charge during trial period.

Cookie Policy

We use cookies to make our site work and also for analytics and advertising purposes. You can enable or disable optional cookies as desired. See the following links for more information.

We need these so the site can function properly

So we can better understand how visitors use our website

So we can serve you tailored ads and promotions