{"id":6257,"date":"2018-04-17T14:34:06","date_gmt":"2018-04-17T12:34:06","guid":{"rendered":"https:\/\/news.save.ch\/?p=6257"},"modified":"2023-03-14T08:56:56","modified_gmt":"2023-03-14T07:56:56","slug":"die-fuehrungsebene-ein-it-sicherheitsrisiko","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","title":{"rendered":"The management level - an IT security risk?"},"content":{"rendered":"<figure id=\"attachment_6258\" aria-describedby=\"caption-attachment-6258\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6258 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg\" alt=\"&quot;Management Hack&quot;\" width=\"680\" height=\"368\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg 999w, https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos-375x203.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-6258\" class=\"wp-caption-text\">\u00a9 depositphotos, stnazkul<\/figcaption><\/figure>\n<p>Technical IT security systems are only as strong as their weakest link - this not only involves new technologies and software solutions, but also the \"human risk factor\". Minimizing this potential vulnerability by training security awareness and establishing supporting technical solutions must always be an important component of a preventive security strategy.<\/p>\n<p><strong>Check total C-Level<\/strong><\/p>\n<p>NTT Security determines the specific status of the \"human vulnerability\" for a company's IT security in the new \"<a href=\"https:\/\/www.nttsecurity.com\/de-ch\/management-hack-service\">Management hack<\/a>\". The focus is on the management level of a company, i.e. the entire C-level such as the CEO, CFO or CIO. The security provider writes that the management level is an attractive target for any hacker, as this group of people usually enjoys unrestricted access to confidential company data. It is not uncommon for managers to benefit from special privileges: security policies and standards are suspended or relaxed in order to simplify login, for example - with fatal consequences.<\/p>\n<p>After appropriate coordination with the client, simulated, personalized social engineering attacks are carried out, of which the people in focus ideally know nothing. According to NTT, this involves analyzing how responsible the management level is in terms of security awareness and IT security. Subsequently, concrete weak points are identified and measures are recommended.<\/p>\n<p><strong>First experiences with \"Management Hack<\/strong><\/p>\n<p>The company, which specializes in IT security, has conducted several \"management hack\" projects in Scandinavia. \"The results surprised even us. In many cases, we gained access to company-critical data in just ten minutes, such as business plans, M&amp;A planning, enterprise resource planning systems, domain controllers, user names or passwords. Administrative credentials were also often found,\" explains NTT Security's Kai Grunwitz. \"The associated dangers for a company are obvious. For example, an attacker with administrative rights can move freely in the network and often access critical information unnoticed for a long time.\"<\/p>\n<p>The new service is aimed at increasing security awareness at board and management level - but ultimately also at establishing a new security strategy and culture throughout the company. \"Our initial projects have shown that there is definitely a need for action on the corporate side,\" says Grunwitz. \"The level of maturity with regard to cyber security is still rather low at management level, to put it mildly.\"<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Technische IT-Sicherheitssysteme sind immer nur so stark wie ihr schw\u00e4chstes Glied \u2013 dabei geht es nicht nur um neue Technologien und Softwarel\u00f6sungen, sondern auch um den \u201eRisikofaktor Mensch\u201c. Die Minimierung dieser potenziellen Schwachstelle durch die Schulung der Security Awareness und Etablierung unterst\u00fctzender technischer L\u00f6sungen muss immer ein wichtiger Baustein einer pr\u00e4ventiven Sicherheitsstrategie sein. Gesamtes C-Level [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[],"class_list":["post-6257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"\"Management Hack\"","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko? - Save<\/title>\n<meta name=\"description\" content=\"Mit dem Einsatz spezieller Social-Engineering-Techniken l\u00e4sst sich \u00fcberpr\u00fcfen, inwiefern F\u00fchrungskr\u00e4fte ein Sicherheitsrisiko darstellen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko? - Save\" \/>\n<meta property=\"og:description\" content=\"Mit dem Einsatz spezieller Social-Engineering-Techniken l\u00e4sst sich \u00fcberpr\u00fcfen, inwiefern F\u00fchrungskr\u00e4fte ein Sicherheitsrisiko darstellen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-17T12:34:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"999\" \/>\n\t<meta property=\"og:image:height\" content=\"541\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko?\",\"datePublished\":\"2018-04-17T12:34:06+00:00\",\"dateModified\":\"2023-03-14T07:56:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\"},\"wordCount\":377,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/Risk-Depositphotos.jpg\",\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\",\"name\":\"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko? - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/Risk-Depositphotos.jpg\",\"datePublished\":\"2018-04-17T12:34:06+00:00\",\"dateModified\":\"2023-03-14T07:56:56+00:00\",\"description\":\"Mit dem Einsatz spezieller Social-Engineering-Techniken l\u00e4sst sich \u00fcberpr\u00fcfen, inwiefern F\u00fchrungskr\u00e4fte ein Sicherheitsrisiko darstellen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/Risk-Depositphotos.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/Risk-Depositphotos.jpg\",\"width\":999,\"height\":541,\"caption\":\"\u00a9 depositphotos, stnazkul\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/die-fuehrungsebene-ein-it-sicherheitsrisiko\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The executive level - an IT security risk? - Save","description":"The use of special social engineering techniques can be used to check the extent to which executives pose a security risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","og_locale":"en_US","og_type":"article","og_title":"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko? - Save","og_description":"Mit dem Einsatz spezieller Social-Engineering-Techniken l\u00e4sst sich \u00fcberpr\u00fcfen, inwiefern F\u00fchrungskr\u00e4fte ein Sicherheitsrisiko darstellen.","og_url":"https:\/\/news.save.ch\/en\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","og_site_name":"Save","article_published_time":"2018-04-17T12:34:06+00:00","article_modified_time":"2023-03-14T07:56:56+00:00","og_image":[{"width":999,"height":541,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko?","datePublished":"2018-04-17T12:34:06+00:00","dateModified":"2023-03-14T07:56:56+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/"},"wordCount":377,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","url":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/","name":"The executive level - an IT security risk? - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","datePublished":"2018-04-17T12:34:06+00:00","dateModified":"2023-03-14T07:56:56+00:00","description":"The use of special social engineering techniques can be used to check the extent to which executives pose a security risk.","breadcrumb":{"@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/04\/Risk-Depositphotos.jpg","width":999,"height":541,"caption":"\u00a9 depositphotos, stnazkul"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/die-fuehrungsebene-ein-it-sicherheitsrisiko\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Die F\u00fchrungsebene \u2013 ein IT-Sicherheitsrisiko?"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/6257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=6257"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/6257\/revisions"}],"predecessor-version":[{"id":17457,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/6257\/revisions\/17457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/6258"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=6257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=6257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=6257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}