{"id":5411,"date":"2017-09-26T17:00:12","date_gmt":"2017-09-26T15:00:12","guid":{"rendered":"https:\/\/news.save.ch\/?p=5411"},"modified":"2023-03-14T08:57:01","modified_gmt":"2023-03-14T07:57:01","slug":"groesste-schwachstelle-sind-nicht-verwaltete-geraete","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/","title":{"rendered":"Company data: What vulnerabilities?"},"content":{"rendered":"<figure id=\"attachment_5412\" aria-describedby=\"caption-attachment-5412\" style=\"width: 680px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5412 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/09\/Depositphotos_42198547_m-2015.jpg\" alt=\"Survey, vulnerability, unmanaged devices\" width=\"680\" height=\"468\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/09\/Depositphotos_42198547_m-2015.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2017\/09\/Depositphotos_42198547_m-2015-375x258.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-5412\" class=\"wp-caption-text\">\u00a9 depositphotos, mindscanner<\/figcaption><\/figure>\n<p>The data security specialist <a href=\"https:\/\/www.bitglass.com\/\">Bitglass<\/a> conducted a survey of 129 participants at the \"Black Hat\" security conference in Las Vegas this summer. It revealed the high value of data in the digital age: 82.8% of respondents said that data is a target of cyberattacks due to its monetary value. Furthermore, the survey participants provided an overview of attack strategies and the effectiveness of known security measures:<\/p>\n<p><strong>Vulnerabilities: Unmanaged devices\/BYOD in first place<\/strong><br \/>\nAs indicated by survey respondents, unmanaged devices (61.2%), such as those used in the context of <a href=\"https:\/\/news.save.ch\/en\/sechs-tipps-fuer-ein-sicheres-byod-konzept\/\">BYOD<\/a>and out-of-date systems (55%) pose the greatest threat to data security. Furthermore, mobile devices (36.4%), cloud storage locations (26.4%) and traditional local security measures (20.9%) are cited as particularly vulnerable.<\/p>\n<p><strong>Security measures: Password protection and facial recognition critical<\/strong><br \/>\nSecuring documents using passwords is rated as the least effective measure (33.3%) by the \"black hats\". Second place goes to facial recognition technology (19.4%), followed by access restrictions (15.5%).<\/p>\n<p><strong>Attack strategies: phishing, the most successful method<\/strong><br \/>\nThe survey participants see phishing (58.9%) as the most efficient method for data theft by a wide margin. Attacks by means of malware and ransomware are only in second place (26.4%). Device theft (6.2 %), wifi spoofing (4.7%) and other strategies such as social engineering, data theft by employees and exploiting weak AWS rules (3.9%) are far less important.<\/p>\n<p>Commenting on the findings, Rich Campagna, Chief Executive Officer of Bitglass, said, \"Organizations are struggling to address the proliferation of BYOD with their security measures. They need to ensure that employees can securely access data from any device, including unmanaged mobile devices. The ability to monitor data, its location and access is critical to preventing data loss and hacking attacks. The fact that phishing was cited as the number one method for data theft is particularly troubling given the challenges associated with BYOD security. Low visibility regarding unmanaged devices can make it difficult for organizations to identify and respond to phishing and malware.\"<\/p>\n<p><strong>All survey results at a glance<\/strong><\/p>\n<p><strong>What is the biggest vulnerability for enterprise data? <\/strong><\/p>\n<ol>\n<li>Non-managed devices (61.2%)<\/li>\n<li>Non-current systems (55%)<\/li>\n<li>Mobile devices (36.4%)<\/li>\n<li>Data at rest in the cloud (26.4%)<\/li>\n<li>Traditional local security (20.9%)<\/li>\n<li>Other (1,55%)<\/li>\n<\/ol>\n<p><strong>What do you think is the least effective security tool?<\/strong><br \/>\n1. password protected documents (33.3%)<br \/>\n2. face detection (19.4%)<br \/>\n3. access restrictions (15.5%)<br \/>\n4. network firewalls (11.6%)<br \/>\n5. mobile device management (MDM) (11.6%)<br \/>\n6. other (5.4%)<br \/>\n7. fingerprints (3.1%)<\/p>\n<p><strong>Which data theft method do you think is most effective?<\/strong><br \/>\n1. phishing (58.9%)<br \/>\n2. malware\/ransomware\/spyware (26.4%)<br \/>\n3. device theft (6.2%)<br \/>\n4. WLAN spoofing (4.7%)<br \/>\n5. other (3.9 %)*<\/p>\n<p><em>* \"Other\" includes user manipulation (social engineering), employee theft, and exploitation of weak AWS rules.<\/em><\/p>\n<p><strong>Why is data so often the target of cyber attacks?<\/strong><br \/>\n1. monetary value (82.8%)<br \/>\n2. personal confirmation (7%)<br \/>\n3. moral reasons (6.3%)<br \/>\n4. entertainment (3.9%)<\/p>\n<p><em>Source: <\/em><a href=\"https:\/\/www.touchdownpr.com\/team\/\"><em>Touchdown PR<\/em><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Die auf Datensicherheit spezialisierte Bitglass hat im Sommer an der \u201eBlack Hat\u201c-Sicherheitskonferenz von Las Vegas eine Umfrage unter 129 Teilnehmern durchgef\u00fchrt. Dabei zeigt sich der hohe\u00a0Stellenwert von Daten im digitalen Zeitalter: 82,8% der Befragten geben an, dass Daten auf Grund des monet\u00e4ren Werts Ziel von Cyberangriffen sind. Ferner gaben die Umfrageteilnehmer einen \u00dcberblick \u00fcber Angriffsstrategien [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":5412,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[62,64],"class_list":["post-5411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-ict-sicherheit","tag-studie"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Umfrage","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Firmendaten: Welche Schwachstellen? - Save<\/title>\n<meta name=\"description\" content=\"Was ist die gr\u00f6sste Schwachstelle f\u00fcr die monet\u00e4r wichtigen Unternehmensdaten? Die Antwort: nicht verwaltete Ger\u00e4te und nicht aktuelle Systeme.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Firmendaten: Welche Schwachstellen? - Save\" \/>\n<meta property=\"og:description\" content=\"Was ist die gr\u00f6sste Schwachstelle f\u00fcr die monet\u00e4r wichtigen Unternehmensdaten? Die Antwort: nicht verwaltete Ger\u00e4te und nicht aktuelle Systeme.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-26T15:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/09\/Depositphotos_42198547_m-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Firmendaten: Welche Schwachstellen?\",\"datePublished\":\"2017-09-26T15:00:12+00:00\",\"dateModified\":\"2023-03-14T07:57:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/\"},\"wordCount\":443,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/Depositphotos_42198547_m-2015.jpg\",\"keywords\":[\"ICT-Sicherheit\",\"Studie\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/\",\"name\":\"Firmendaten: Welche Schwachstellen? - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/Depositphotos_42198547_m-2015.jpg\",\"datePublished\":\"2017-09-26T15:00:12+00:00\",\"dateModified\":\"2023-03-14T07:57:01+00:00\",\"description\":\"Was ist die gr\u00f6sste Schwachstelle f\u00fcr die monet\u00e4r wichtigen Unternehmensdaten? Die Antwort: nicht verwaltete Ger\u00e4te und nicht aktuelle Systeme.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/Depositphotos_42198547_m-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2017\\\/09\\\/Depositphotos_42198547_m-2015.jpg\",\"width\":1000,\"height\":688,\"caption\":\"\u00a9 depositphotos, mindscanner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Firmendaten: Welche Schwachstellen?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Company data: What vulnerabilities? - Save","description":"What is the biggest vulnerability to monetarily important corporate data? The answer: unmanaged devices and out-of-date systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/","og_locale":"en_US","og_type":"article","og_title":"Firmendaten: Welche Schwachstellen? - Save","og_description":"Was ist die gr\u00f6sste Schwachstelle f\u00fcr die monet\u00e4r wichtigen Unternehmensdaten? Die Antwort: nicht verwaltete Ger\u00e4te und nicht aktuelle Systeme.","og_url":"https:\/\/news.save.ch\/en\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/","og_site_name":"Save","article_published_time":"2017-09-26T15:00:12+00:00","article_modified_time":"2023-03-14T07:57:01+00:00","og_image":[{"width":1000,"height":688,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/09\/Depositphotos_42198547_m-2015.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Firmendaten: Welche Schwachstellen?","datePublished":"2017-09-26T15:00:12+00:00","dateModified":"2023-03-14T07:57:01+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/"},"wordCount":443,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/09\/Depositphotos_42198547_m-2015.jpg","keywords":["ICT-Sicherheit","Studie"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/","url":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/","name":"Company data: What vulnerabilities? - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/09\/Depositphotos_42198547_m-2015.jpg","datePublished":"2017-09-26T15:00:12+00:00","dateModified":"2023-03-14T07:57:01+00:00","description":"What is the biggest vulnerability to monetarily important corporate data? The answer: unmanaged devices and out-of-date systems.","breadcrumb":{"@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/09\/Depositphotos_42198547_m-2015.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2017\/09\/Depositphotos_42198547_m-2015.jpg","width":1000,"height":688,"caption":"\u00a9 depositphotos, mindscanner"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/groesste-schwachstelle-sind-nicht-verwaltete-geraete\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Firmendaten: Welche Schwachstellen?"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/5411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=5411"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/5411\/revisions"}],"predecessor-version":[{"id":17487,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/5411\/revisions\/17487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/5412"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=5411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=5411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=5411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}