{"id":10453,"date":"2020-08-10T06:00:47","date_gmt":"2020-08-10T04:00:47","guid":{"rendered":"https:\/\/news.save.ch\/?p=10453"},"modified":"2023-03-14T08:56:35","modified_gmt":"2023-03-14T07:56:35","slug":"mobile-kommunikation-fuenf-sicherheitsfallen","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/mobile-kommunikation-fuenf-sicherheitsfallen\/","title":{"rendered":"Mobile communication - five security traps"},"content":{"rendered":"<figure id=\"attachment_10454\" aria-describedby=\"caption-attachment-10454\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10454\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64285043_s-2019.jpg\" alt=\"\" width=\"680\" height=\"466\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64285043_s-2019.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64285043_s-2019-375x257.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-10454\" class=\"wp-caption-text\">Internet User Protection Concept Photo. Men Showing Tablet Computer Mobile Device with Internet Security Concept Illustration on the Display. Safety in the Internet.<\/figcaption><\/figure>\n<p>The challenges regarding IT security are continuously increasing for energy providers, hospitals and transport companies. Mobile devices, for example, have long been a natural companion in everyday working life: they are used to transmit sensitive data and confidential content without being integrated into the same strict security measures as local workstation computers.<\/p>\n<p>According to <a href=\"https:\/\/www.virtual-solution.com\">Virtual Solution<\/a> in Munich, the following security risks present IT managers with major challenges - especially when it comes to tolerating private devices for business purposes or the private use of business cell phones:<\/p>\n<ol>\n<li><strong>Use of unauthorized apps:<\/strong> Users are used to trying out a new app. Whether it is actually safe from malware or complies with the guidelines of the General Data Protection Regulation is not questioned. The EU data protection regulation DSGVO stipulates that personal data must not end up in any app without the consent of the person concerned. However, popular services like WhatsApp in particular cause unintentional data leaks: The messenger reads out the address books of employees, including email contacts and phone numbers of colleagues, customers or partners, and passes this data on to the parent company Facebook.<\/li>\n<li><strong>Unsecured WLANs:<\/strong> In hotels, on the train, in caf\u00e9s - mobile devices now use WLAN connections more frequently than the mobile network. The problem is that most hotspots are not encrypted. Although this gives users convenient access, it also leaves the door wide open for hackers to tap into access data and read the entire data traffic. In addition, the hotspots can be freely named, which increases the risk of network spoofing: Fraudsters can use a supposedly familiar name to lure users into their WLAN.<\/li>\n<li><strong>Mixing private with official:<\/strong> If employees use their private devices for business purposes - in line with the BYOD (Bring Your Own Device) or COPE (Corporate Owned, Personally Enabled) model - or vice versa, data is often moved back and forth between the business and private spheres. This is the case, for example, when business files are temporarily stored in a company's own Dropbox account. For companies, however, it becomes difficult to comply with the guidelines of the GDPR, copyright regulations or retention obligations - and at the same time, the level of protection decreases.<\/li>\n<li><strong>No password protection and no encryption:<\/strong> Mobile devices can be lost, stolen and thus fall into the hands of unauthorized persons. If the smartphone is insufficiently secured, i.e., a weak password or no password at all is present and certificate-based authentication is missing, it is relatively easy for criminals to gain access to the data on the device. Once it is cracked, they usually also have access to cloud, file sharing or networks, and thus access to sensitive corporate internals. Encryption is also not usually standard for mobile communications. However, if data is stored and transmitted unencrypted, the risk of unauthorized access from the outside increases dramatically.<\/li>\n<li><strong>Unpatched devices:<\/strong> Updates for the smartphone operating system as well as the downloaded apps are often annoying for the user, but unavoidable. This is the only way to close security gaps caused by errors or vulnerabilities in the applications before an attacker can exploit them. With BYOD models in particular, however, it becomes an almost impossible task for IT managers to check whether the smartphone of each individual employee is up to date.<\/li>\n<\/ol>\n<p>\"In the digital age, the protection of critical infrastructures also requires new ways and means for mobile communication,\" explains Sascha Wellershoff, from Virtual Solution in Munich. \"The answer to this is a container solution such as SecurePIM, which strictly separates the official from the private area on the mobile end device. Should an attacker actually gain access to the smartphone or tablet, he is then virtually standing in front of a burglar-proof door. Data and documents are stored in encrypted form according to the highest standards and are also transmitted end-to-end in encrypted form. At the same time, compliance with the DSGVO is guaranteed. A high level of user-friendliness is also very important: corporate apps must be just as easy to use as people are used to from their private apps - only truly used solutions increase protection against cyber attacks on mobile end devices.\"<\/p>\n<p><em>Source: Virtual Solution<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Die Herausforderungen bez\u00fcglich IT-Sicherheit nehmen f\u00fcr Energieversorger, Krankenh\u00e4user oder Transportunternehmen kontinuierlich zu. Mobile Endger\u00e4te etwa sind l\u00e4ngst selbstverst\u00e4ndliche Begleiter im Arbeitsalltag: Sie werden zur \u00dcbermittlung sensibler Daten und vertraulicher Inhalte genutzt, ohne dass sie in dieselben strengen Sicherheitsmassnahmen wie die lokalen Arbeitsplatzrechner eingebunden sind. Gem\u00e4ss Virtual Solution in M\u00fcnchen stellen folgende Sicherheitsrisiken die IT-Verantwortlichen dabei [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":10454,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[733,964,650],"class_list":["post-10453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-byod","tag-kritische-infrastrukturen","tag-mobile-kommunikation"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Mobile Kommunikation","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Kommunikation \u2013 f\u00fcnf Sicherheitsfallen - Save<\/title>\n<meta name=\"description\" content=\"Gerade Betreiber von kritischen Infrastrukturen m\u00fcssen ihre mobile Kommunikation vor den unterschiedlichsten Sicherheitsrisiken sch\u00fctzen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/mobile-kommunikation-fuenf-sicherheitsfallen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Kommunikation \u2013 f\u00fcnf Sicherheitsfallen - Save\" \/>\n<meta property=\"og:description\" content=\"Gerade Betreiber von kritischen Infrastrukturen m\u00fcssen ihre mobile Kommunikation vor den unterschiedlichsten Sicherheitsrisiken sch\u00fctzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/mobile-kommunikation-fuenf-sicherheitsfallen\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T04:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64285043_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"685\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Mobile Kommunikation \u2013 f\u00fcnf Sicherheitsfallen\",\"datePublished\":\"2020-08-10T04:00:47+00:00\",\"dateModified\":\"2023-03-14T07:56:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/\"},\"wordCount\":703,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Depositphotos_64285043_s-2019.jpg\",\"keywords\":[\"BYOD\",\"kritische Infrastrukturen\",\"mobile Kommunikation\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/\",\"name\":\"Mobile Kommunikation \u2013 f\u00fcnf Sicherheitsfallen - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Depositphotos_64285043_s-2019.jpg\",\"datePublished\":\"2020-08-10T04:00:47+00:00\",\"dateModified\":\"2023-03-14T07:56:35+00:00\",\"description\":\"Gerade Betreiber von kritischen Infrastrukturen m\u00fcssen ihre mobile Kommunikation vor den unterschiedlichsten Sicherheitsrisiken sch\u00fctzen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Depositphotos_64285043_s-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Depositphotos_64285043_s-2019.jpg\",\"width\":1000,\"height\":685,\"caption\":\"Internet User Protection Concept Photo. Men Showing Tablet Computer Mobile Device with Internet Security Concept Illustration on the Display. Safety in the Internet.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/mobile-kommunikation-fuenf-sicherheitsfallen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Kommunikation \u2013 f\u00fcnf Sicherheitsfallen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile communication - five security traps - Save","description":"Operators of critical infrastructures in particular need to protect their mobile communications from a wide range of security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/mobile-kommunikation-fuenf-sicherheitsfallen\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Kommunikation \u2013 f\u00fcnf Sicherheitsfallen - Save","og_description":"Gerade Betreiber von kritischen Infrastrukturen m\u00fcssen ihre mobile Kommunikation vor den unterschiedlichsten Sicherheitsrisiken sch\u00fctzen.","og_url":"https:\/\/news.save.ch\/en\/mobile-kommunikation-fuenf-sicherheitsfallen\/","og_site_name":"Save","article_published_time":"2020-08-10T04:00:47+00:00","article_modified_time":"2023-03-14T07:56:35+00:00","og_image":[{"width":1000,"height":685,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64285043_s-2019.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Mobile Kommunikation \u2013 f\u00fcnf Sicherheitsfallen","datePublished":"2020-08-10T04:00:47+00:00","dateModified":"2023-03-14T07:56:35+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/"},"wordCount":703,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64285043_s-2019.jpg","keywords":["BYOD","kritische Infrastrukturen","mobile Kommunikation"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/","url":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/","name":"Mobile communication - five security traps - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64285043_s-2019.jpg","datePublished":"2020-08-10T04:00:47+00:00","dateModified":"2023-03-14T07:56:35+00:00","description":"Operators of critical infrastructures in particular need to protect their mobile communications from a wide range of security risks.","breadcrumb":{"@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64285043_s-2019.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/08\/Depositphotos_64285043_s-2019.jpg","width":1000,"height":685,"caption":"Internet User Protection Concept Photo. Men Showing Tablet Computer Mobile Device with Internet Security Concept Illustration on the Display. Safety in the Internet."},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/mobile-kommunikation-fuenf-sicherheitsfallen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Mobile Kommunikation \u2013 f\u00fcnf Sicherheitsfallen"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=10453"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10453\/revisions"}],"predecessor-version":[{"id":17315,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/10453\/revisions\/17315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/10454"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=10453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=10453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=10453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}