{"id":6949,"date":"2018-10-15T07:00:04","date_gmt":"2018-10-15T05:00:04","guid":{"rendered":"https:\/\/news.save.ch\/?p=6949"},"modified":"2023-03-14T08:56:52","modified_gmt":"2023-03-14T07:56:52","slug":"fuenf-massnahmen-gegen-die-mobile-schatten-it","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/","title":{"rendered":"Five measures against mobile shadow IT"},"content":{"rendered":"<figure id=\"attachment_6950\" aria-describedby=\"caption-attachment-6950\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6950\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/09\/Depositphotos_132686448_m-2015.jpg\" alt=\"\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/09\/Depositphotos_132686448_m-2015.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2018\/09\/Depositphotos_132686448_m-2015-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-6950\" class=\"wp-caption-text\">\u00a9 depositphotos, garagestock<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>The <a href=\"https:\/\/de.wikipedia.org\/wiki\/Schatten-IT\">Shadow IT<\/a> has always been a problem for companies: While it used to be mainly personal Excel sheets or databases that formed a largely uncontrolled and unauthorized IT structure, it is now more and more about mobile systems and applications. Smartphones and tablets are used by employees bypassing corporate IT regulations. They use apps like WhatsApp and Evernote or file shares like Dropbox or Google Drive for their professional tasks as well.<\/p>\n<p>Such uncontrolled systems pose legal challenges for companies, not least because compliance with regulations on data protection, copyright protection or retention obligations is in no way ensured. In addition, they pose a constant threat to IT security because attackers could gain easy access to corporate IT via inadequately secured mobile applications.<\/p>\n<p>Virtual Solution clarifies what companies can do to combat mobile shadow IT:<\/p>\n<ol>\n<li><strong>Inform employees<\/strong>The carelessness of employees when using smartphones and tablets is often due to a lack of knowledge, for example with regard to legal implications; only when employees are fully informed about the problems associated with the use of unauthorized apps can they be expected to handle them more carefully.<\/li>\n<li><strong>Learning from employees<\/strong>Companies should take a good look at which apps employees use privately. From this, they can learn which functionalities are needed and which the company apps do not provide; if \"official\" alternatives are available, the risk from possible employee misconduct is reduced.<\/li>\n<li><strong>Involve departments<\/strong>Many departments now decide for themselves which tools to use. Companies should ensure that IT and business departments work closely together so that meaningful apps are made available and security standards are adhered to in the process. IT and compliance officers must not act as \"brakemen\" but as constructive business enablers.<\/li>\n<li><strong>Control infrastructure access<\/strong>Companies need to define exactly which apps are allowed to access which internal resources or cloud services. For example, they must define which email app is allowed to access the Exchange or Office365 server; unauthorized apps must not be allowed access.<\/li>\n<li><strong>Provide the right apps<\/strong>When selecting approved apps, security and compatibility with stationary IT are important. Nevertheless, usability also has a high priority. Only if users are satisfied with the apps and can do their work without any problems will they not go looking for shadow apps.<\/li>\n<\/ol>\n<p>\"The basic problem of shadow IT is not the unintelligent users, but the IT decision-makers who do not take enough account of the employees' needs,\" explains G\u00fcnter Junk, CEO of the <a href=\"https:\/\/www.virtual-solution.com\/\">Virtual Solution AG<\/a> in Munich. \"They generally want to work productively, so shadow IT is always a piece of practiced criticism; corporate IT should take that very seriously and focus more on employee requirements in the future.\"<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Die Schatten-IT ist f\u00fcr Unternehmen schon immer ein Problem gewesen: Waren es fr\u00fcher vor allem pers\u00f6nliche Excel-Sheets oder Datenbanken, die eine weitgehend unkontrollierte und nicht autorisierte IT-Struktur bildeten, so geht es mittlerweile mehr und mehr um mobile Systeme und Anwendungen. Smartphones und Tablets werden von Mitarbeitenden an den Vorschriften der Unternehmens-IT vorbei genutzt. Sie [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":6950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[62,63],"class_list":["post-6949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-ict-sicherheit","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Schatten-IT","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F\u00fcnf Massnahmen gegen die mobile Schatten-IT - Save<\/title>\n<meta name=\"description\" content=\"Mobile Schatten-IT ist zu einer Herausforderung f\u00fcr die Unternehmens-IT geworden: Mitarbeiter nutzen nicht genehmigte Ger\u00e4te und Apps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00fcnf Massnahmen gegen die mobile Schatten-IT - Save\" \/>\n<meta property=\"og:description\" content=\"Mobile Schatten-IT ist zu einer Herausforderung f\u00fcr die Unternehmens-IT geworden: Mitarbeiter nutzen nicht genehmigte Ger\u00e4te und Apps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-15T05:00:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/09\/Depositphotos_132686448_m-2015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"F\u00fcnf Massnahmen gegen die mobile Schatten-IT\",\"datePublished\":\"2018-10-15T05:00:04+00:00\",\"dateModified\":\"2023-03-14T07:56:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/\"},\"wordCount\":473,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Depositphotos_132686448_m-2015.jpg\",\"keywords\":[\"ICT-Sicherheit\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/\",\"name\":\"F\u00fcnf Massnahmen gegen die mobile Schatten-IT - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Depositphotos_132686448_m-2015.jpg\",\"datePublished\":\"2018-10-15T05:00:04+00:00\",\"dateModified\":\"2023-03-14T07:56:52+00:00\",\"description\":\"Mobile Schatten-IT ist zu einer Herausforderung f\u00fcr die Unternehmens-IT geworden: Mitarbeiter nutzen nicht genehmigte Ger\u00e4te und Apps.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Depositphotos_132686448_m-2015.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/Depositphotos_132686448_m-2015.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 depositphotos,\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-massnahmen-gegen-die-mobile-schatten-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F\u00fcnf Massnahmen gegen die mobile Schatten-IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five measures against mobile shadow IT - Save","description":"Mobile shadow IT has become a challenge for enterprise IT: Employees use unapproved devices and apps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/","og_locale":"en_US","og_type":"article","og_title":"F\u00fcnf Massnahmen gegen die mobile Schatten-IT - Save","og_description":"Mobile Schatten-IT ist zu einer Herausforderung f\u00fcr die Unternehmens-IT geworden: Mitarbeiter nutzen nicht genehmigte Ger\u00e4te und Apps.","og_url":"https:\/\/news.save.ch\/en\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/","og_site_name":"Save","article_published_time":"2018-10-15T05:00:04+00:00","article_modified_time":"2023-03-14T07:56:52+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/09\/Depositphotos_132686448_m-2015.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"F\u00fcnf Massnahmen gegen die mobile Schatten-IT","datePublished":"2018-10-15T05:00:04+00:00","dateModified":"2023-03-14T07:56:52+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/"},"wordCount":473,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/09\/Depositphotos_132686448_m-2015.jpg","keywords":["ICT-Sicherheit","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/","url":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/","name":"Five measures against mobile shadow IT - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/09\/Depositphotos_132686448_m-2015.jpg","datePublished":"2018-10-15T05:00:04+00:00","dateModified":"2023-03-14T07:56:52+00:00","description":"Mobile shadow IT has become a challenge for enterprise IT: Employees use unapproved devices and apps.","breadcrumb":{"@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/09\/Depositphotos_132686448_m-2015.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2018\/09\/Depositphotos_132686448_m-2015.jpg","width":1000,"height":667,"caption":"\u00a9 depositphotos,"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/fuenf-massnahmen-gegen-die-mobile-schatten-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"F\u00fcnf Massnahmen gegen die mobile Schatten-IT"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/6949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=6949"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/6949\/revisions"}],"predecessor-version":[{"id":17429,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/6949\/revisions\/17429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/6950"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=6949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=6949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=6949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}