{"id":11581,"date":"2021-03-01T08:22:17","date_gmt":"2021-03-01T07:22:17","guid":{"rendered":"https:\/\/news.save.ch\/?p=11581"},"modified":"2023-07-21T06:45:44","modified_gmt":"2023-07-21T04:45:44","slug":"hackerangriff-was-nun","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/hackerangriff-was-nun\/","title":{"rendered":"Piratage informatique - et maintenant ?"},"content":{"rendered":"<figure id=\"attachment_10694\" aria-describedby=\"caption-attachment-10694\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10694 size-full\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_238860084_s-2019.jpg\" alt=\"Cyber-attaque\" width=\"1000\" height=\"666\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_238860084_s-2019.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2020\/10\/Depositphotos_238860084_s-2019-375x250.jpg 375w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-10694\" class=\"wp-caption-text\">\u00a9 depositphotos, Funtap<\/figcaption><\/figure>\n<p>Pour de nombreuses entreprises et organisations, la probabilit\u00e9 d'\u00eatre victime d'une cyberattaque \u00e0 tout moment est \u00e9lev\u00e9e. Blackberry cite un exemple : en 2020, une panne informatique a ainsi \u00e9t\u00e9 d\u00e9clench\u00e9e \u00e0 l'h\u00f4pital universitaire de D\u00fcsseldorf, \u00e0 la suite de quoi une patiente a d\u00fb \u00eatre transport\u00e9e dans un autre h\u00f4pital et est d\u00e9c\u00e9d\u00e9e.<\/p>\n<p>Le fait que ces derniers temps, davantage d'\u00e9tablissements d'enseignement et d'organisations de sant\u00e9 <a href=\"https:\/\/news.save.ch\/fr\/cyber-angriffe-auf-schweizer-spitaeler-gestiegen\/\" target=\"_blank\" rel=\"noopener\">dans le collimateur des cybercriminels<\/a>n'est pas un fait nouveau. Mais que faire lorsqu'une entreprise a vent d'une cyberattaque ? Blackberry donne quatre conseils sur la marche \u00e0 suivre dans une telle situation.<\/p>\n<h2>Ne pas payer de ran\u00e7on<\/h2>\n<p>Les attaques de ransomware continuent d'augmenter, la tactique des cybercriminels est convoit\u00e9e, car de nombreuses entreprises sont pouss\u00e9es \u00e0 payer une ran\u00e7on en cas d'urgence absolue. Mais la question de savoir si les cybercriminels lib\u00e8rent vraiment les donn\u00e9es crypt\u00e9es est toujours une autre question. Blackberry mentionne \u00e9galement que le paiement d'une ran\u00e7on n'est pas tr\u00e8s judicieux, car les cybercriminels savent dans tous les cas ce qu'ils veulent et continuent \u00e0 utiliser cette tactique.<\/p>\n<h2>V\u00e9rifier tous les niveaux du syst\u00e8me<\/h2>\n<p>En moyenne, les cyberattaques au sein d'une organisation passent inaper\u00e7ues pendant les 124 premi\u00e8res heures : un temps suffisant pour que les pirates puissent explorer l'ensemble du syst\u00e8me. Les experts en informatique devraient donc surveiller plus r\u00e9guli\u00e8rement et donc d\u00e9tecter plus t\u00f4t toute anomalie dans le trafic de donn\u00e9es, par exemple.<\/p>\n<h2>Investir dans le savoir-faire cybern\u00e9tique des employ\u00e9s<\/h2>\n<p>Tous les collaborateurs devraient conna\u00eetre, dans le sens d'une formation de sensibilisation, les proc\u00e9dures correctes \u00e0 suivre en cas de cyberattaque, afin que, par exemple, les collaborateurs sachent \u00e9galement comment traiter certaines pi\u00e8ces jointes aux e-mails. La prise de conscience des vuln\u00e9rabilit\u00e9s ou des contenus dangereux ne devrait pas \u00eatre l'apanage des cyber-responsables d'une entreprise.<\/p>\n<h2>Centraliser plusieurs flux de donn\u00e9es dans un seul syst\u00e8me<\/h2>\n<p>Pour une transparence rapide en cas d'\u00e9carts dans le trafic de donn\u00e9es, des analyses r\u00e9guli\u00e8res doivent \u00eatre effectu\u00e9es sur les flux de donn\u00e9es. Ainsi, il sera beaucoup plus facile de trouver et de localiser les anomalies, surtout si les donn\u00e9es sont stock\u00e9es dans un syst\u00e8me. Il est donc judicieux de recourir \u00e0 des analyses statistiques pour identifier un comportement anormal.<\/p>\n<p><em>Source : Blackberry<\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>F\u00fcr viele Unternehmen und Organisationen ist die Wahrscheinlichkeit hoch, jederzeit Opfer eines Cyberangriffs zu werden. Ein Beispiel nennt Blackberry: So wurde am Universit\u00e4tsklinikum in D\u00fcsseldorf im Jahr 2020 ein IT-Ausfall ausgel\u00f6st, woraufhin eine Patientin in ein anderes Spital gebracht werden musste und starb. Dass in letzter Zeit auch mehr Bildungseinrichtungen und Gesundheitsorganisationen ins Visier von [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":10942,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[1,3313],"tags":[5732,1165,1168,926,3394,117,1062,5159],"class_list":["post-11581","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-digitalisierung","tag-awareness-training","tag-blackberry","tag-cyber","tag-cyberangriff","tag-cyberangriffe","tag-hacker","tag-loesegeld","tag-ransomware-angriffe"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"1","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackerangriff \u2013 was nun? - Save<\/title>\n<meta name=\"description\" content=\"T\u00e4glich stehen sich viele Unternehmen einer Bedrohung ausgesetzt. Doch, was ist zu tun, wenn es bereits passiert? Blackberry hat einen Leitfaden erstellt, der aufzeigen soll, worauf es ankommt, wenn Dritte bereits einen erfolgreichen Angriff durchgef\u00fchrt haben.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/hackerangriff-was-nun\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackerangriff \u2013 was nun? - Save\" \/>\n<meta property=\"og:description\" content=\"T\u00e4glich stehen sich viele Unternehmen einer Bedrohung ausgesetzt. Doch, was ist zu tun, wenn es bereits passiert? Blackberry hat einen Leitfaden erstellt, der aufzeigen soll, worauf es ankommt, wenn Dritte bereits einen erfolgreichen Angriff durchgef\u00fchrt haben.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/hackerangriff-was-nun\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-01T07:22:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-21T04:45:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/12\/Cybersecurity_pixaby_teaser.png\" \/>\n\t<meta property=\"og:image:width\" content=\"945\" \/>\n\t<meta property=\"og:image:height\" content=\"554\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Simon Gr\u00f6flin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Gr\u00f6flin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/\"},\"author\":{\"name\":\"Simon Gr\u00f6flin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/ad4ef21102fd6125312409ac57d5296d\"},\"headline\":\"Hackerangriff \u2013 was nun?\",\"datePublished\":\"2021-03-01T07:22:17+00:00\",\"dateModified\":\"2023-07-21T04:45:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/\"},\"wordCount\":340,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Cybersecurity_pixaby_teaser.png\",\"keywords\":[\"Awareness Training\",\"Blackberry\",\"cyber\",\"Cyberangriff\",\"Cyberangriffe\",\"Hacker\",\"L\u00f6segeld\",\"Ransomware-Angriffe\"],\"articleSection\":[\"ALLGEMEIN\",\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/\",\"name\":\"Hackerangriff \u2013 was nun? - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Cybersecurity_pixaby_teaser.png\",\"datePublished\":\"2021-03-01T07:22:17+00:00\",\"dateModified\":\"2023-07-21T04:45:44+00:00\",\"description\":\"T\u00e4glich stehen sich viele Unternehmen einer Bedrohung ausgesetzt. Doch, was ist zu tun, wenn es bereits passiert? Blackberry hat einen Leitfaden erstellt, der aufzeigen soll, worauf es ankommt, wenn Dritte bereits einen erfolgreichen Angriff durchgef\u00fchrt haben.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Cybersecurity_pixaby_teaser.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Cybersecurity_pixaby_teaser.png\",\"width\":945,\"height\":554,\"caption\":\"Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/hackerangriff-was-nun\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackerangriff \u2013 was nun?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/ad4ef21102fd6125312409ac57d5296d\",\"name\":\"Simon Gr\u00f6flin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g\",\"caption\":\"Simon Gr\u00f6flin\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/simon-groeflin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Piratage informatique - et maintenant ? - Sauvegarder","description":"Chaque jour, de nombreuses entreprises sont confront\u00e9es \u00e0 une menace. Mais que faire si cela s'est d\u00e9j\u00e0 produit ? Blackberry a r\u00e9dig\u00e9 un guide visant \u00e0 montrer ce qu'il faut faire lorsque des tiers ont d\u00e9j\u00e0 men\u00e9 une attaque r\u00e9ussie.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/hackerangriff-was-nun\/","og_locale":"fr_FR","og_type":"article","og_title":"Hackerangriff \u2013 was nun? - Save","og_description":"T\u00e4glich stehen sich viele Unternehmen einer Bedrohung ausgesetzt. Doch, was ist zu tun, wenn es bereits passiert? Blackberry hat einen Leitfaden erstellt, der aufzeigen soll, worauf es ankommt, wenn Dritte bereits einen erfolgreichen Angriff durchgef\u00fchrt haben.","og_url":"https:\/\/news.save.ch\/fr\/hackerangriff-was-nun\/","og_site_name":"Save","article_published_time":"2021-03-01T07:22:17+00:00","article_modified_time":"2023-07-21T04:45:44+00:00","og_image":[{"width":945,"height":554,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/12\/Cybersecurity_pixaby_teaser.png","type":"image\/png"}],"author":"Simon Gr\u00f6flin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Simon Gr\u00f6flin","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/"},"author":{"name":"Simon Gr\u00f6flin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/ad4ef21102fd6125312409ac57d5296d"},"headline":"Hackerangriff \u2013 was nun?","datePublished":"2021-03-01T07:22:17+00:00","dateModified":"2023-07-21T04:45:44+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/"},"wordCount":340,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/12\/Cybersecurity_pixaby_teaser.png","keywords":["Awareness Training","Blackberry","cyber","Cyberangriff","Cyberangriffe","Hacker","L\u00f6segeld","Ransomware-Angriffe"],"articleSection":["ALLGEMEIN","DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/","url":"https:\/\/news.save.ch\/hackerangriff-was-nun\/","name":"Piratage informatique - et maintenant ? - Sauvegarder","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/12\/Cybersecurity_pixaby_teaser.png","datePublished":"2021-03-01T07:22:17+00:00","dateModified":"2023-07-21T04:45:44+00:00","description":"Chaque jour, de nombreuses entreprises sont confront\u00e9es \u00e0 une menace. Mais que faire si cela s'est d\u00e9j\u00e0 produit ? Blackberry a r\u00e9dig\u00e9 un guide visant \u00e0 montrer ce qu'il faut faire lorsque des tiers ont d\u00e9j\u00e0 men\u00e9 une attaque r\u00e9ussie.","breadcrumb":{"@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/hackerangriff-was-nun\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/12\/Cybersecurity_pixaby_teaser.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2020\/12\/Cybersecurity_pixaby_teaser.png","width":945,"height":554,"caption":"Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/hackerangriff-was-nun\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Hackerangriff \u2013 was nun?"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/ad4ef21102fd6125312409ac57d5296d","name":"Simon Gr\u00f6flin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6ddceb80eb734354635539e0ea5140bb7c41e42de7c45c9a2ab9921b5d5c9a83?s=96&d=mm&r=g","caption":"Simon Gr\u00f6flin"},"url":"https:\/\/news.save.ch\/fr\/author\/simon-groeflin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/11581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=11581"}],"version-history":[{"count":2,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/11581\/revisions"}],"predecessor-version":[{"id":21190,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/11581\/revisions\/21190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/10942"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=11581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=11581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=11581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}