{"id":22177,"date":"2023-10-24T06:10:27","date_gmt":"2023-10-24T04:10:27","guid":{"rendered":"https:\/\/news.save.ch\/?p=22177"},"modified":"2023-10-27T10:07:27","modified_gmt":"2023-10-27T08:07:27","slug":"schluss-mit-den-provisorien-in-der-it-sicherheit","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/schluss-mit-den-provisorien-in-der-it-sicherheit\/","title":{"rendered":"An end to provisional solutions in IT security"},"content":{"rendered":"<figure id=\"attachment_22178\" aria-describedby=\"caption-attachment-22178\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-22178\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S-680x452.jpg\" alt=\"Sensitization\" width=\"680\" height=\"452\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S-680x452.jpg 680w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S-768x510.jpg 768w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S-18x12.jpg 18w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S-375x249.jpg 375w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S-527x350.jpg 527w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S.jpg 1000w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-22178\" class=\"wp-caption-text\">Depositphotos, Yra1105<\/figcaption><\/figure>\n<p>Requirements in the area of security, data protection and compliance are familiar to employees. Nevertheless, they become a challenge in everyday work. Whether out of convenience or ignorance, situations arise time and again that quickly become critical for IT security. For example, when team members, pressed for time, quickly send sensitive documents to the wrong contacts via a public file hosting system or, quite banally, conduct sensitive conversations in public spaces. To prevent employees from resorting to so-called \"shadow IT\" or being too careless with sensitive information, clear instructions for critical scenarios and regular training are needed. Communications provider <a href=\"http:\/\/www.materna-virtual-solution.com\" target=\"_blank\" rel=\"noopener\">Materna Virtual Solution<\/a> shows four safety-critical situations that happen quickly in everyday work and should therefore be handled all the more strictly.<\/p>\n<p><strong><em>1. handle sensitive data pragmatically.<\/em><\/strong> When it comes to work performance, modern technology has real boosters in store for employees: in the subway, you can conveniently make phone calls via smartphone, give screen approval for customer data in the meeting, or simply let print jobs linger in the departmental printer until the next coffee run. Are there any security concerns?<\/p>\n<p><em>#Security:<\/em> Sensitive and personal data should only be shared with trusted persons within the company and in compliance with data protection requirements and security regulations. Under no circumstances should personal information simply circulate unprotected in public spaces - phone calls in the subway are therefore just as taboo as unprotected documents.<\/p>\n<p><em><strong>2. security should be defined by everyone.<\/strong> <\/em>Phishing emails are well known, and insecure websites or apps can be identified at a glance... Experienced employees know that the firewall offers protection against all attackers and that the easiest time to install updates is between Christmas and New Year. There haven't been any data protection problems with WhatsApp either, everything is encrypted, isn't it?<\/p>\n<p><em>#Security:<\/em> In terms of comprehensive IT security, the same transparent IT security specifications must apply to all stakeholders in the company. This includes the requirement that regular system updates are installed and that no insecure applications are used for data transfer or communication. Under no circumstances should each employee define his or her own standards, put updates on standby for extended periods of time, or use private messengers for professional purposes.<\/p>\n<p><strong><em>Devices should not lie around unused.<\/em><\/strong> Your employer provides you with the latest smartphone or performance notebook, and then it's supposed to lie around uselessly on the weekend? That would be a shame. Private use is more in line with the spirit of sustainability and also provides a lot of family fun when gaming finally runs smoothly. What's the big deal?<\/p>\n<p><em>#Security:<\/em> Professional devices require a special protection concept if they are also used for private purposes in addition to work. According to COPE (Corporate-Owned, Personally Enabled), companies can prepare their devices for secure private use. This can be done, for example, by installing a container-based solution in which all business applications are processed in an encrypted software container.<\/p>\n<p><strong><em>4. passwords that are easy to remember.<\/em> <\/strong>Assigning a new password every few months, and having to make it longer and more complicated each time? No more of that. \"1234\" and \"Schatzi\" used to provide enough protection and for professional hackers the whole effort is a waste of time anyway ...<\/p>\n<p><em>#Security:<\/em> Passwords and multi-level authentication measures are essential and must not be freely accessible or shared with third parties. IT administrators must ensure strict implementation of authentication access. They can support employees in password management through the use of tools and appropriate training. Under no circumstances should printed password lists be found on the desk - and yes: even a locked roll container does not offer sufficient protection.<\/p>\n<p>\"Of course, these don'ts are exaggerated, but they are still reality in everyday life. At the latest when a security attack has paralyzed the company,\" explains Christian Pohlenz, Security Expert at Materna Virtual Solution. \"There is therefore no way around an internal company security concept that includes DSGVO requirements and compliance with security measures. The be-all and end-all is then regular training. After all, any security concept is only as good as its implementation by employees in everyday life.\"<\/p>","protected":false},"excerpt":{"rendered":"<p>Anforderungen im Bereich der Sicherheit, des Datenschutzes und der Compliance sind Arbeitnehmern bekannt. Im Arbeitsalltag werden sie dennoch zu einer Herausforderung. Ob aus Bequemlichkeit oder Unwissenheit \u2013 immer wieder entstehen Situationen, die schnell kritisch f\u00fcr die IT-Sicherheit werden. Beispielsweise wenn Teammitglieder aus Zeitdruck sensible Dokumente schnell \u00fcber ein \u00f6ffentliches File-Hosting-System an falsche Kontaktpersonen verschicken oder, [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":22178,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[159],"class_list":["post-22177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-digitalisierung"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":null,"_at_widget":null,"_yoast_wpseo_primary_category":"3313","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Schluss mit den Provisorien in der IT-Sicherheit - Save<\/title>\n<meta name=\"description\" content=\"Aus Bequemlichkeit und anderen Gr\u00fcnden entstehen L\u00fccken in der IT-Sicherheit. Vier Punkte, was man beachten sollte.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/schluss-mit-den-provisorien-in-der-it-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schluss mit den Provisorien in der IT-Sicherheit - Save\" \/>\n<meta property=\"og:description\" content=\"Aus Bequemlichkeit und anderen Gr\u00fcnden entstehen L\u00fccken in der IT-Sicherheit. Vier Punkte, was man beachten sollte.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/schluss-mit-den-provisorien-in-der-it-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-24T04:10:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-27T08:07:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"664\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Schluss mit den Provisorien in der IT-Sicherheit\",\"datePublished\":\"2023-10-24T04:10:27+00:00\",\"dateModified\":\"2023-10-27T08:07:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/\"},\"wordCount\":673,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Depositphotos_136855532_S.jpg\",\"keywords\":[\"Digitalisierung\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/\",\"name\":\"Schluss mit den Provisorien in der IT-Sicherheit - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Depositphotos_136855532_S.jpg\",\"datePublished\":\"2023-10-24T04:10:27+00:00\",\"dateModified\":\"2023-10-27T08:07:27+00:00\",\"description\":\"Aus Bequemlichkeit und anderen Gr\u00fcnden entstehen L\u00fccken in der IT-Sicherheit. Vier Punkte, was man beachten sollte.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Depositphotos_136855532_S.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Depositphotos_136855532_S.jpg\",\"width\":1000,\"height\":664,\"caption\":\"Depositphotos, Yra1105\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/schluss-mit-den-provisorien-in-der-it-sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schluss mit den Provisorien in der IT-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An end to provisional solutions in IT security - Save","description":"For convenience and other reasons, gaps in IT security arise. Four points to keep in mind.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/schluss-mit-den-provisorien-in-der-it-sicherheit\/","og_locale":"en_US","og_type":"article","og_title":"Schluss mit den Provisorien in der IT-Sicherheit - Save","og_description":"Aus Bequemlichkeit und anderen Gr\u00fcnden entstehen L\u00fccken in der IT-Sicherheit. Vier Punkte, was man beachten sollte.","og_url":"https:\/\/news.save.ch\/en\/schluss-mit-den-provisorien-in-der-it-sicherheit\/","og_site_name":"Save","article_published_time":"2023-10-24T04:10:27+00:00","article_modified_time":"2023-10-27T08:07:27+00:00","og_image":[{"width":1000,"height":664,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Schluss mit den Provisorien in der IT-Sicherheit","datePublished":"2023-10-24T04:10:27+00:00","dateModified":"2023-10-27T08:07:27+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/"},"wordCount":673,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S.jpg","keywords":["Digitalisierung"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/","url":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/","name":"An end to provisional solutions in IT security - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S.jpg","datePublished":"2023-10-24T04:10:27+00:00","dateModified":"2023-10-27T08:07:27+00:00","description":"For convenience and other reasons, gaps in IT security arise. Four points to keep in mind.","breadcrumb":{"@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/10\/Depositphotos_136855532_S.jpg","width":1000,"height":664,"caption":"Depositphotos, Yra1105"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/schluss-mit-den-provisorien-in-der-it-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Schluss mit den Provisorien in der IT-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/22177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=22177"}],"version-history":[{"count":4,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/22177\/revisions"}],"predecessor-version":[{"id":22182,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/22177\/revisions\/22182"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/22178"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=22177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=22177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=22177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}