{"id":6587,"date":"2018-07-09T16:50:19","date_gmt":"2018-07-09T14:50:19","guid":{"rendered":"https:\/\/news.save.ch\/?p=6587"},"modified":"2023-03-14T08:56:53","modified_gmt":"2023-03-14T07:56:53","slug":"unterschaetztes-risiko-insider-angriff","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/unterschaetztes-risiko-insider-angriff\/","title":{"rendered":"Underestimated risk: insider attack"},"content":{"rendered":"<figure id=\"attachment_6588\" aria-describedby=\"caption-attachment-6588\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6588 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/07\/Depositphotos_putilich.jpg\" alt=\"Insider Threat\" width=\"680\" height=\"477\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/07\/Depositphotos_putilich.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2018\/07\/Depositphotos_putilich-375x263.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-6588\" class=\"wp-caption-text\">\u00a9 depositphotos, putilich<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: 'Arial','sans-serif';\">Insiders - be they careless employees or malicious employees who steal or even delete data for financial or personal motives - are an enormous risk for data security in companies. Often, employees, outside contractors and other third parties have legitimate access to sensitive data in order to operate effectively and flexibly. This presents a challenge for security teams because it is much more difficult to detect threats when the actor in question has valid access to corporate data. However, with appropriate policies and technologies, the risk of internal data loss or theft can be significantly reduced.<\/span><\/p>\n<p><strong>Sensitization of careless employees<\/strong><\/p>\n<p>Raising awareness and training their own employees is one of the most effective defenses companies have against insider threats. This is because most unintentional data breaches result from the actions of a careless employee. Regular data security training teaches employees how to properly handle sensitive company data. In addition, all employees should be informed about new data policies or technologies before they are implemented.<\/p>\n<p><strong>Data-centric security approach <\/strong><\/p>\n<p><span style=\"font-family: 'Arial','sans-serif';\">However, this does not protect sensitive data from employees who use their access rights to deliberately do the wrong thing. However, the risk of data misuse or theft from insider threats can be mitigated with appropriate technologies. These technologies should be data-centric: That is, they give security teams visibility into what corporate data is being accessed, how, when and by whom. This allows security managers to quickly identify unusual activity. In addition, these technologies should automatically prevent an unauthorized employee from copying, transferring or deleting sensitive data. Such a data-centric approach to security also ensures that careless employees do not accidentally move or send sensitive data.<\/span><\/p>\n<p><strong>UEBA tools monitor user behavior<\/strong><\/p>\n<p>User and Entity Behavior Analysis (UEBA) is a cybersecurity process for tracking suspicious or malicious behavior. UEBA tools monitor the user behavior of employees and external contractors with access to applications, accounts, and servers that store sensitive data. To do this, UEBA tools use advanced machine learning algorithms combined with statistical analysis methods to identify potential insider threats. This is done by creating a standard behavioral profile of the user in question, with information such as the location and devices from which a user usually logs in, which files and servers they usually access, how often and at what time, what access rights they currently have, and much more.<\/p>\n<p>If a user downloads a certain amount of data from a certain device every day and accesses a certain number of servers every week, the analytics tool will notice that the account suddenly downloads gigabytes of data from a foreign location or accesses new servers. Thus, the tool will sound the alarm.<\/p>\n<p>UEBA also protects against external threats: For example, it may be relatively easy for cybercriminals to use phishing attacks to steal credentials such as an employee's username and password, but it will be difficult to mimic the default behavior of that user on the network.<br \/>\n<em>By Christoph M. Kumpa, Director DACH &amp; EE at <a href=\"https:\/\/digitalguardian.com\/\">Digital Guardian<\/a><\/em><\/p>\n<p><em>More on the topic of insider threat <a href=\"https:\/\/news.save.ch\/en\/sicherheit-und-kontrollen-im-laendervergleich\/\">here<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Insider \u2013 seien es unachtsame Angestellte oder b\u00f6swillige Mitarbeiter, die aus finanziellen oder pers\u00f6nlichen Motiven Daten stehlen oder gar l\u00f6schen \u2013 sind ein enormes Risiko f\u00fcr die Datensicherheit in Unternehmen. Oft haben Angestellte, externe Auftragnehmer und andere Dritte legitimen Zugriff auf sensible Daten, um effektiv und flexibel arbeiten zu k\u00f6nnen. Dies stellt eine Herausforderung [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6588,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96,62,63],"class_list":["post-6587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime","tag-ict-sicherheit","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"UEBA","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Untersch\u00e4tztes Risiko: Insider-Angriff - Save<\/title>\n<meta name=\"description\" content=\"Untersch\u00e4tzt wird oft eine Gefahr, die bereits im Firmengeb\u00e4ude sitzt: Die Insider-Bedrohung.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/unterschaetztes-risiko-insider-angriff\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Untersch\u00e4tztes Risiko: Insider-Angriff - Save\" \/>\n<meta property=\"og:description\" content=\"Untersch\u00e4tzt wird oft eine Gefahr, die bereits im Firmengeb\u00e4ude sitzt: Die Insider-Bedrohung.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/unterschaetztes-risiko-insider-angriff\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-09T14:50:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/07\/Depositphotos_putilich.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"702\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Untersch\u00e4tztes Risiko: Insider-Angriff\",\"datePublished\":\"2018-07-09T14:50:19+00:00\",\"dateModified\":\"2023-03-14T07:56:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/\"},\"wordCount\":504,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Depositphotos_putilich.jpg\",\"keywords\":[\"Cyber-Crime\",\"ICT-Sicherheit\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/\",\"name\":\"Untersch\u00e4tztes Risiko: Insider-Angriff - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Depositphotos_putilich.jpg\",\"datePublished\":\"2018-07-09T14:50:19+00:00\",\"dateModified\":\"2023-03-14T07:56:53+00:00\",\"description\":\"Untersch\u00e4tzt wird oft eine Gefahr, die bereits im Firmengeb\u00e4ude sitzt: Die Insider-Bedrohung.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Depositphotos_putilich.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Depositphotos_putilich.jpg\",\"width\":1000,\"height\":702,\"caption\":\"\u00a9 depositphotos, putilich\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/unterschaetztes-risiko-insider-angriff\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Untersch\u00e4tztes Risiko: Insider-Angriff\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Underestimated risk: insider attack - Save","description":"Often underestimated is a danger that already sits in the company building: the insider threat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/unterschaetztes-risiko-insider-angriff\/","og_locale":"en_US","og_type":"article","og_title":"Untersch\u00e4tztes Risiko: Insider-Angriff - Save","og_description":"Untersch\u00e4tzt wird oft eine Gefahr, die bereits im Firmengeb\u00e4ude sitzt: Die Insider-Bedrohung.","og_url":"https:\/\/news.save.ch\/en\/unterschaetztes-risiko-insider-angriff\/","og_site_name":"Save","article_published_time":"2018-07-09T14:50:19+00:00","article_modified_time":"2023-03-14T07:56:53+00:00","og_image":[{"width":1000,"height":702,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/07\/Depositphotos_putilich.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Untersch\u00e4tztes Risiko: Insider-Angriff","datePublished":"2018-07-09T14:50:19+00:00","dateModified":"2023-03-14T07:56:53+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/"},"wordCount":504,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/07\/Depositphotos_putilich.jpg","keywords":["Cyber-Crime","ICT-Sicherheit","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/","url":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/","name":"Underestimated risk: insider attack - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/07\/Depositphotos_putilich.jpg","datePublished":"2018-07-09T14:50:19+00:00","dateModified":"2023-03-14T07:56:53+00:00","description":"Often underestimated is a danger that already sits in the company building: the insider threat.","breadcrumb":{"@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/07\/Depositphotos_putilich.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/07\/Depositphotos_putilich.jpg","width":1000,"height":702,"caption":"\u00a9 depositphotos, putilich"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/unterschaetztes-risiko-insider-angriff\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Untersch\u00e4tztes Risiko: Insider-Angriff"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/6587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=6587"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/6587\/revisions"}],"predecessor-version":[{"id":17440,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/6587\/revisions\/17440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/6588"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=6587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=6587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=6587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}