{"id":11681,"date":"2021-03-12T07:24:46","date_gmt":"2021-03-12T06:24:46","guid":{"rendered":"https:\/\/news.save.ch\/?p=11681"},"modified":"2023-07-21T05:16:15","modified_gmt":"2023-07-21T03:16:15","slug":"geistiges-eigentum-schuetzen","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/geistiges-eigentum-schuetzen\/","title":{"rendered":"Protect intellectual property"},"content":{"rendered":"<figure id=\"attachment_11683\" aria-describedby=\"caption-attachment-11683\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11683 size-full\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/03\/DigitalGuardian.jpg\" alt=\"Intellectual property\" width=\"1000\" height=\"667\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/03\/DigitalGuardian.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2021\/03\/DigitalGuardian-375x250.jpg 375w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-11683\" class=\"wp-caption-text\">\u00a9 Depositphotos, Jirsak<\/figcaption><\/figure>\n<p>Intellectual property must be particularly well protected. Once hackers have penetrated a corporate network, they can successfully exfiltrate and sell business-critical information to a competitor or nation-state with competitive global markets. Ten measures ensure companies are better prepared to protect business-critical data. The security provider\u00a0<a href=\"https:\/\/digitalguardian.com\/\">Digital Guardian<\/a>\u00a0provides ten tips below that can be implemented immediately.<\/p>\n<h2>1. encrypt sensitive data<\/h2>\n<p>Encrypting sensitive data is critical to protecting intellectual property. This allows companies to add another layer of protection that makes it more difficult to access data if it is stolen by an attacker. Encryption should be fully disk and file-based for endpoints, in addition to enforcing encryption for email and devices.<\/p>\n<h2>2. keep operating systems and software up to date<\/h2>\n<p>Operating system and software updates contain critical security updates that address vulnerabilities. Automatic software updates should therefore be enabled whenever possible to streamline the process and ensure that everything is always up to date.<\/p>\n<h2>3. deployment of data security solutions<\/h2>\n<p>Antivirus software does not protect against all types of threats, but only provides basic protection against common, known malware. Attackers targeting sensitive intellectual property typically use sophisticated methods to penetrate systems. Antivirus software can be bypassed in these attacks. Organizations should therefore consider deploying data security software that resides at the kernel level of endpoints and provides a complete view of all data being accessed and transmitted. The solution should be able to fully lock down both structured and unstructured confidential data and employ enforcement policies to prevent this data from leaving the enterprise IT environment.<\/p>\n<h2>4. accounts with unique, complex passwords<\/h2>\n<p>Reusing the same or slightly modified passwords across different accounts is one of the biggest security risks in a data breach. If employees use their passwords more than once, compromising a non-sensitive account can give hackers access to the corporate network. From there, attackers can move to privileged accounts and access sensitive data stored in databases, directories and other IT resources.<\/p>\n<h2>5. archive data promptly and securely<\/h2>\n<p>Minimizing the amount of data stored by organizations on devices reduces the amount of information available to an attacker who has gained access to those devices. When data is no longer needed, it should be encrypted and moved to an offline storage device for long-term archiving.<\/p>\n<h2>6. regular activity monitoring across user accounts.<\/h2>\n<p>Monitoring user behavior for anomalous or suspicious activity is one of the fastest ways to detect a security breach before it can cause damage. When suspicious activity is detected, all parties involved should be notified immediately. Even if other safeguards are in place, monitoring is often the fastest way to detect a security breach. Common warning signs include credentials used on multiple computers, employees accessing databases or directories they have never accessed before, or logins outside of working hours.<\/p>\n<h2>7. change all passwords after possible data breach.<\/h2>\n<p>After a security breach becomes known, the most important first step is to change all associated passwords. This ensures that the credentials are useless, even if they have been stolen.<\/p>\n<h2>8. data security settings of mobile applications and online accounts<\/h2>\n<p>It is also critical to keep up with data security settings for various accounts and applications, especially with the popularity of BYOD in the workplace. This ensures that unauthorized users do not have access to private, sensitive information or company intellectual property.<\/p>\n<h2>9. device controls for removable media<\/h2>\n<p>Although most IT security focuses on protecting against external attackers, insider threats should not be ignored. Organizations should ensure they have controls in place for removable devices to prevent employees from accessing and exfiltrating sensitive intellectual property within the network. Device control security software that automates the process with policy-based usage controls for removable media, including alerts or blocking when risky behavior is detected, is very effective in preventing insider threats.<\/p>\n<h2>10. employee training against phishing attacks<\/h2>\n<p>Attackers often find it more effective to use social engineering to trick a target into a desired action than to conduct complex, manual hacking attacks. Phishing attacks usually have telltale signs such as unknown senders, foreign domain names, fake websites, or emails with malicious links or attachments. Regular employee training and simulation training are therefore recommended to strengthen employee vigilance.<\/p>\n<p>Intellectual property is among a company's most valuable assets. That's why it's important to implement a comprehensive data security strategy, including basic best practices such as password hygiene and solid patch management in all internal departments and with third-party vendors that work with intellectual property. This can significantly reduce the risk of intellectual property theft.<\/p>\n<p><em>Source: Digital Guardian<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Geistiges Eigentum gilt es besonders gut zu sch\u00fctzen. Sind Hacker in ein Firmennetzwerk eingedrungen, k\u00f6nnen sie nach erfolgreicher Exfiltrierung gesch\u00e4ftskritische Informationen an einen Wettbewerber oder Nationalstaat mit konkurrierenden globalen M\u00e4rkten verkaufen. Zehn Massnahmen stellen sicher, dass Unternehmen besser darauf vorbereitet sind, gesch\u00e4ftskritische Daten zu sch\u00fctzen.\u00a0Der Sicherheitsanbieter\u00a0Digital Guardian\u00a0gibt im Folgenden zehn Tipps, die sich sofort umsetzen [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":11683,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[1,3313],"tags":[5685,363,1177,1178,117,1179,1102,1471],"class_list":["post-11681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-digitalisierung","tag-data-security","tag-daten","tag-digital-guardian","tag-geistiges-eigentum","tag-hacker","tag-intellectual-property","tag-passwoerter","tag-verschluesselung"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"1","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Geistiges Eigentum sch\u00fctzen - Save<\/title>\n<meta name=\"description\" content=\"Gesch\u00e4ftskritische Informationen lassen sich an einen Wettbewerber oder Nationalstaat mit konkurrierenden globalen M\u00e4rkten verkaufen. Mit zehn Tipps stellen Unternehmen sicher, gesch\u00e4ftliche Daten mit wenig Aufwand zu sch\u00fctzen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Geistiges Eigentum sch\u00fctzen - Save\" \/>\n<meta property=\"og:description\" content=\"Gesch\u00e4ftskritische Informationen lassen sich an einen Wettbewerber oder Nationalstaat mit konkurrierenden globalen M\u00e4rkten verkaufen. Mit zehn Tipps stellen Unternehmen sicher, gesch\u00e4ftliche Daten mit wenig Aufwand zu sch\u00fctzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-12T06:24:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-21T03:16:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/03\/DigitalGuardian.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Gr\u00f6flin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Gr\u00f6flin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.m-q.ch\\\/de\\\/geistiges-eigentum-bitte-schuetzen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/geistiges-eigentum-schuetzen\\\/\"},\"author\":{\"name\":\"Simon Gr\u00f6flin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/ad4ef21102fd6125312409ac57d5296d\"},\"headline\":\"Geistiges Eigentum sch\u00fctzen\",\"datePublished\":\"2021-03-12T06:24:46+00:00\",\"dateModified\":\"2023-07-21T03:16:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/geistiges-eigentum-schuetzen\\\/\"},\"wordCount\":832,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.m-q.ch\\\/de\\\/geistiges-eigentum-bitte-schuetzen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/DigitalGuardian.jpg\",\"keywords\":[\"Data Security\",\"Daten\",\"Digital Guardian\",\"Geistiges Eigentum\",\"Hacker\",\"Intellectual Property\",\"Passw\u00f6rter\",\"Verschl\u00fcsselung\"],\"articleSection\":[\"ALLGEMEIN\",\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/geistiges-eigentum-schuetzen\\\/\",\"url\":\"https:\\\/\\\/www.m-q.ch\\\/de\\\/geistiges-eigentum-bitte-schuetzen\\\/\",\"name\":\"Geistiges Eigentum sch\u00fctzen - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.m-q.ch\\\/de\\\/geistiges-eigentum-bitte-schuetzen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.m-q.ch\\\/de\\\/geistiges-eigentum-bitte-schuetzen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/DigitalGuardian.jpg\",\"datePublished\":\"2021-03-12T06:24:46+00:00\",\"dateModified\":\"2023-07-21T03:16:15+00:00\",\"description\":\"Gesch\u00e4ftskritische Informationen lassen sich an einen Wettbewerber oder Nationalstaat mit konkurrierenden globalen M\u00e4rkten verkaufen. Mit zehn Tipps stellen Unternehmen sicher, gesch\u00e4ftliche Daten mit wenig Aufwand zu sch\u00fctzen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.m-q.ch\\\/de\\\/geistiges-eigentum-bitte-schuetzen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.m-q.ch\\\/de\\\/geistiges-eigentum-bitte-schuetzen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.m-q.ch\\\/de\\\/geistiges-eigentum-bitte-schuetzen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/DigitalGuardian.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/DigitalGuardian.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 Depositphotos, Jirsak\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.m-q.ch\\\/de\\\/geistiges-eigentum-bitte-schuetzen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Geistiges Eigentum sch\u00fctzen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/ad4ef21102fd6125312409ac57d5296d\",\"name\":\"Simon Gr\u00f6flin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"caption\":\"Simon Gr\u00f6flin\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/simon-groeflin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect intellectual property - Save","description":"Business-critical information can be sold to a competitor or nation-state with competing global markets. With ten tips, companies can ensure that business data is protected with little effort.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/","og_locale":"en_US","og_type":"article","og_title":"Geistiges Eigentum sch\u00fctzen - Save","og_description":"Gesch\u00e4ftskritische Informationen lassen sich an einen Wettbewerber oder Nationalstaat mit konkurrierenden globalen M\u00e4rkten verkaufen. Mit zehn Tipps stellen Unternehmen sicher, gesch\u00e4ftliche Daten mit wenig Aufwand zu sch\u00fctzen.","og_url":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/","og_site_name":"Save","article_published_time":"2021-03-12T06:24:46+00:00","article_modified_time":"2023-07-21T03:16:15+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/03\/DigitalGuardian.jpg","type":"image\/jpeg"}],"author":"Simon Gr\u00f6flin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Simon Gr\u00f6flin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/geistiges-eigentum-schuetzen\/"},"author":{"name":"Simon Gr\u00f6flin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/ad4ef21102fd6125312409ac57d5296d"},"headline":"Geistiges Eigentum sch\u00fctzen","datePublished":"2021-03-12T06:24:46+00:00","dateModified":"2023-07-21T03:16:15+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/geistiges-eigentum-schuetzen\/"},"wordCount":832,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/03\/DigitalGuardian.jpg","keywords":["Data Security","Daten","Digital Guardian","Geistiges Eigentum","Hacker","Intellectual Property","Passw\u00f6rter","Verschl\u00fcsselung"],"articleSection":["ALLGEMEIN","DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/geistiges-eigentum-schuetzen\/","url":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/","name":"Protect intellectual property - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/03\/DigitalGuardian.jpg","datePublished":"2021-03-12T06:24:46+00:00","dateModified":"2023-07-21T03:16:15+00:00","description":"Business-critical information can be sold to a competitor or nation-state with competing global markets. With ten tips, companies can ensure that business data is protected with little effort.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/03\/DigitalGuardian.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2021\/03\/DigitalGuardian.jpg","width":1000,"height":667,"caption":"\u00a9 Depositphotos, Jirsak"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/de\/geistiges-eigentum-bitte-schuetzen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Geistiges Eigentum sch\u00fctzen"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/ad4ef21102fd6125312409ac57d5296d","name":"Simon Gr\u00f6flin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","caption":"Simon Gr\u00f6flin"},"url":"https:\/\/news.save.ch\/en\/author\/simon-groeflin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/11681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=11681"}],"version-history":[{"count":2,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/11681\/revisions"}],"predecessor-version":[{"id":21164,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/11681\/revisions\/21164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/11683"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=11681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=11681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=11681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}