{"id":8632,"date":"2019-09-09T14:24:11","date_gmt":"2019-09-09T12:24:11","guid":{"rendered":"https:\/\/news.save.ch\/?p=8632"},"modified":"2023-03-14T08:56:44","modified_gmt":"2023-03-14T07:56:44","slug":"fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen","status":null,"type":"post","link":"https:\/\/news.save.ch\/en\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/","title":{"rendered":"Five tips against identity theft"},"content":{"rendered":"<figure id=\"attachment_8633\" aria-describedby=\"caption-attachment-8633\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8633 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/09\/credit-card-pixaby-scaled-1.jpg\" alt=\"Identity Theft\" width=\"680\" height=\"483\" \/><figcaption id=\"caption-attachment-8633\" class=\"wp-caption-text\">The impact of identity theft on companies is enormous: millions of dollars in damage can quickly be incurred. (Source: Pixabay)<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Criminals are targeting identities primarily through phishing technologies (67%) and malware (33%). That's according to NTT Security's 2019 Global Threat Intelligence Report (GTIR). According to the report, phishing attacks target <a href=\"https:\/\/www.nttsecurity.com\/2019GTIR\">GTIR 2019<\/a> on Google (27%) and especially on Microsoft accounts (45%), most notably Office 365. However, Microsoft applications are not only popular targets of phishing attacks, malware spam campaigns are also a big problem. Over 95% of identity theft-related malware targeted vulnerabilities in a Microsoft Office application or operating system, with nearly 35% exploiting the CVE-2017-11882 vulnerability.<\/p>\n<p>The Trickbot Trojan (62%) plays a major role in keylogger malware. Previously, Trickbot only targeted bank data, but the new variant can also grab passwords from other applications.<\/p>\n<p>The impact of identity theft on companies is enormous: millions in damage can quickly be incurred when fraudsters pose as company directors and direct payments to false accounts. Industrial espionage or blackmail, including ransom demands, can also have serious financial consequences. If companies no longer have access to important data, for example in the event of a ransomware attack, ongoing operations are disrupted or, in the worst case, come to a standstill.<\/p>\n<p><strong>Five measures<\/strong><\/p>\n<p>With five tips from <a href=\"https:\/\/www.nttsecurity.com\">NTT Security<\/a> However, companies can make identity theft more difficult and take the right measures in an emergency:<\/p>\n<ol>\n<li><strong> First, companies need strong passwords.<\/strong> Weak passwords are often still the biggest security weakness. If the same or a very similar log-in is used for different accounts, hackers can reuse stolen credentials. For real protection, users should have to prove or enter a second factor for authentication in addition to the password, which an attacker cannot know or possess. Modern tokens in the context of multi-factor authentication (MFA) are an effective solution. Some sort of unique password is generated for each authentication process - for example, a code sent via SMS or a push message prompting \"confirm\" or \"deny.\" Multi-factor authentication is especially necessary for systems that require administrator rights to access. This makes it much harder for attackers to gain access to sensitive information and networks by using old usernames and passwords. In addition, electronic data should be encrypted and documents protected with digital signatures.<\/li>\n<li><strong> Not every employee needs to be able to access every area on the company's network.<\/strong> Companies should segment the network and define exactly who has what rights. This is especially true for cloud and hybrid environments. This way, criminals who gain less privileged access cannot immediately penetrate the entire company network.<\/li>\n<li><strong> An important point is the training of the employees.<\/strong> Targeted training on security policies, current threats and how to deal with them increases the vigilance and awareness of individual users. Among other things, rules should be defined that specify behavioral patterns for e-mail inquiries regarding bank transfers.<\/li>\n<li><strong> An incident response strategy helps in the event of an attack.<\/strong> In addition to the question of the appropriate response, the main question is whether and how quickly an incident can be detected at all. Answers are provided by a comprehensive real-time view of network traffic and sophisticated logics for successful analysis. When an incident does occur, those responsible must first qualify, assess and classify a security incident. Critical to this is the context and associated risks, as not all incidents are security incidents and have the same impact. After identifying the problem, the next task is to stop the cyber attack and limit the damage. To do this, IT staff must use a security playbook that details how to proceed to examine in detail all potentially affected components, such as operating systems, configuration files, applications and data, and also initiate the necessary data recovery measures if necessary. Ideally, a disaster recovery plan (DRP) exists that describes exactly how the damaged company is to deal with a security incident, what measures are to be initiated and who is responsible.<\/li>\n<li><strong> An identity governance strategy is a prerequisite for fending off targeted attacks.<\/strong> Put simply, identity governance is about combining policy-driven identity management with compliance. The concrete requirements include, for example, the company-wide assignment of roles and authorizations, the regulation of user access and the monitoring of the fulfillment of compliance requirements. In view of the fact that many companies lose track of which services are running with which account on which server or which cloud, the topic of identity governance is of great importance.<\/li>\n<\/ol>\n<p>\"There is no such thing as one hundred percent protection against identity theft. This makes it all the more important for companies to consider basic points,\" explains Frank Balow, Director Identity &amp; Key Management EMEA at NTT Security. \"With stolen identities, hackers can penetrate deeper and deeper into corporate networks. Even if the initially stolen username and password does not yet allow access to highly sensitive areas - in combination with social engineering or with other known or obtained passwords, attackers can get further and, in the worst case, carry out dedicated attacks. Compromised accounts can also be used by attackers to launch external attacks on business partners and customers.\"<\/p>\n<p><em>Source: NTT Security<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Die Identit\u00e4ten greifen die Kriminellen vor allem mittels Phishing-Technologien (67%) und Malware (33%) ab. Das zeigt der Global Threat Intelligence Report (GTIR) 2019 von NTT Security. Phishing-Attacken zielen laut GTIR 2019 auf Google (27%) und vor allem auf Microsoft-Konten (45%), allen voran Office 365. Microsoft-Applikationen sind aber nicht nur beliebtes Ziel von Phishing-Angriffen, auch [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":8633,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[511,63],"class_list":["post-8632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-identitaetsdiebstahl","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Identit\u00e4tsdiebstahl","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F\u00fcnf Tipps gegen Identit\u00e4tsdiebstahl - Save<\/title>\n<meta name=\"description\" content=\"Der Missbrauch von Identit\u00e4ten und das Aussp\u00e4hen von Login-Informationen sind nach wie vor ein grosses Problem f\u00fcr Firmen. F\u00fcnf Tipps helfen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/en\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00fcnf Tipps gegen Identit\u00e4tsdiebstahl - Save\" \/>\n<meta property=\"og:description\" content=\"Der Missbrauch von Identit\u00e4ten und das Aussp\u00e4hen von Login-Informationen sind nach wie vor ein grosses Problem f\u00fcr Firmen. F\u00fcnf Tipps helfen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/en\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-09T12:24:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/09\/credit-card-pixaby-scaled-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"995\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"F\u00fcnf Tipps gegen Identit\u00e4tsdiebstahl\",\"datePublished\":\"2019-09-09T12:24:11+00:00\",\"dateModified\":\"2023-03-14T07:56:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/\"},\"wordCount\":833,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/credit-card-pixaby-scaled-1-scaled.jpg\",\"keywords\":[\"Identit\u00e4tsdiebstahl\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/\",\"name\":\"F\u00fcnf Tipps gegen Identit\u00e4tsdiebstahl - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/credit-card-pixaby-scaled-1-scaled.jpg\",\"datePublished\":\"2019-09-09T12:24:11+00:00\",\"dateModified\":\"2023-03-14T07:56:44+00:00\",\"description\":\"Der Missbrauch von Identit\u00e4ten und das Aussp\u00e4hen von Login-Informationen sind nach wie vor ein grosses Problem f\u00fcr Firmen. F\u00fcnf Tipps helfen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/credit-card-pixaby-scaled-1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/credit-card-pixaby-scaled-1-scaled.jpg\",\"width\":1400,\"height\":995,\"caption\":\"Die Auswirkungen von Identit\u00e4tsdiebstahl auf Unternehmen sind enorm: Schnell entsteht ein Millionenschaden. Quelle: Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F\u00fcnf Tipps gegen Identit\u00e4tsdiebstahl\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five tips against identity theft - Save","description":"Misuse of identities and spying on login information are still a big problem for companies. Five tips help.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/en\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/","og_locale":"en_US","og_type":"article","og_title":"F\u00fcnf Tipps gegen Identit\u00e4tsdiebstahl - Save","og_description":"Der Missbrauch von Identit\u00e4ten und das Aussp\u00e4hen von Login-Informationen sind nach wie vor ein grosses Problem f\u00fcr Firmen. F\u00fcnf Tipps helfen.","og_url":"https:\/\/news.save.ch\/en\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/","og_site_name":"Save","article_published_time":"2019-09-09T12:24:11+00:00","article_modified_time":"2023-03-14T07:56:44+00:00","og_image":[{"width":1400,"height":995,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/09\/credit-card-pixaby-scaled-1-scaled.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"F\u00fcnf Tipps gegen Identit\u00e4tsdiebstahl","datePublished":"2019-09-09T12:24:11+00:00","dateModified":"2023-03-14T07:56:44+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/"},"wordCount":833,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/09\/credit-card-pixaby-scaled-1-scaled.jpg","keywords":["Identit\u00e4tsdiebstahl","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/","url":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/","name":"Five tips against identity theft - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/09\/credit-card-pixaby-scaled-1-scaled.jpg","datePublished":"2019-09-09T12:24:11+00:00","dateModified":"2023-03-14T07:56:44+00:00","description":"Misuse of identities and spying on login information are still a big problem for companies. Five tips help.","breadcrumb":{"@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/09\/credit-card-pixaby-scaled-1-scaled.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/09\/credit-card-pixaby-scaled-1-scaled.jpg","width":1400,"height":995,"caption":"Die Auswirkungen von Identit\u00e4tsdiebstahl auf Unternehmen sind enorm: Schnell entsteht ein Millionenschaden. Quelle: Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/fuenf-tipps-die-identitaetsdieben-das-leben-schwer-machen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"F\u00fcnf Tipps gegen Identit\u00e4tsdiebstahl"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Swiss trade journal for safety","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Security Forum","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/8632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/comments?post=8632"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/8632\/revisions"}],"predecessor-version":[{"id":17377,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/posts\/8632\/revisions\/17377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media\/8633"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/media?parent=8632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/categories?post=8632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/en\/wp-json\/wp\/v2\/tags?post=8632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}