{"id":1689,"date":"2014-07-10T13:24:12","date_gmt":"2014-07-10T11:24:12","guid":{"rendered":"http:\/\/blog.gdsys.de\/en\/?p=1689"},"modified":"2014-07-10T13:24:12","modified_gmt":"2014-07-10T11:24:12","slug":"economic-espionage-risks-measures-sensitization","status":"publish","type":"post","link":"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/","title":{"rendered":"Economic espionage \u2013 risks, measures, awareness"},"content":{"rendered":"<p><span id=\"result_box\" lang=\"en\"><span class=\"hps\">Hacker attacks,<\/span> <span class=\"hps\">data<\/span> <span class=\"hps\">theft,<\/span> <span class=\"hps\">eavesdropping<\/span> <span class=\"hps\">scandals<\/span> <span class=\"hps\">&#8211; the list of<\/span> <span class=\"hps\">dangers<\/span> <span class=\"hps\">on the internet<\/span> <span class=\"hps\">is longer than you think<\/span>. <span class=\"hps\">However, not only<\/span> <span class=\"hps\">individuals<\/span> <span class=\"hps\">but also companies<\/span> <span class=\"hps\">are a popular<\/span> <span class=\"hps\">target of attacks<\/span>. And most of the time, hackers aren&#8217;t interested in <span class=\"hps\">individual<\/span> <span class=\"hps\">passwords.<\/span> E<span class=\"hps\">conomic<\/span> <span class=\"hps\">espionage rather aims for<\/span> <span class=\"hps\">data<\/span> <span class=\"hps\">that include<\/span> <span class=\"hps\">patents,<\/span> <span class=\"hps\">designs<\/span> <span class=\"hps\">or<\/span> specific<span class=\"hps\"> procedures<\/span>. <span class=\"hps\">To<\/span> <span class=\"hps\">prevent these attacks and to become aware of their danger<\/span>, <span class=\"hps\">we&#8217;ve invited<\/span> <span class=\"hps\">Reinhard<\/span> <span class=\"hps\">Vespers<\/span>, Speaker <span class=\"hps\">for<\/span> C<span class=\"hps\">ounterintelligence<\/span> <span class=\"hps\">at the Department for Municipal Affairs<\/span><span class=\"hps\"> of North Rhine<\/span>-Westphalia. <span class=\"hps\">As part<\/span> <span class=\"hps\">of an exciting<\/span> <span class=\"hps\">presentation he<\/span> <span class=\"hps\">explained <\/span><span class=\"hps\">the dangers of<\/span> <span class=\"hps\">economic espionage<\/span> <span class=\"hps\">and<\/span> <span class=\"hps\">cyber crime.<\/span><\/span><\/p>\n<h2><strong><span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"hps\">Cyber<\/span> <span class=\"hps\">\u200b\u200bcrime<\/span> <span class=\"hps\">&#8211;<\/span> <span class=\"hps\">the<\/span> <span class=\"hps\">underestimated<\/span> <span class=\"hps\">risk<\/span><\/span><\/strong><\/h2>\n<p><span id=\"result_box\" lang=\"en\"><span class=\"hps atn\"><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Spionage_640.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright wp-image-1701 \" src=\"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Spionage_640-300x225.jpg\" alt=\"Protection against economic espionage\" width=\"196\" height=\"147\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Spionage_640-300x225.jpg 300w, https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Spionage_640.jpg 640w\" sizes=\"(max-width: 196px) 100vw, 196px\" \/><\/a>&#8220;<\/span>It can take years <span class=\"hps\">to make<\/span> <span class=\"hps\">a company as secure as possible<\/span> <span class=\"hps\">and<\/span> <span class=\"hps\">only<\/span> <span class=\"hps\">seconds to<\/span> <span class=\"hps\">destroy it<\/span>&#8221; <span class=\"hps\">&#8211;<\/span> <span class=\"hps\">a phrase that<\/span> should give companies much to think about, especially when considering the <span class=\"hps\">increasing threat<\/span> <span class=\"hps\">of industrial espionage<\/span> <span class=\"hps\">and<\/span> <span class=\"hps\">cyber crime.<\/span> <span class=\"hps\">As a speaker<\/span> <span class=\"hps\">for<\/span> <span class=\"hps\">counterintelligence,<\/span> <span class=\"hps\">Reinhard<\/span> <span class=\"hps\">Vesper<\/span> <span class=\"hps\">has<\/span> <span class=\"hps\">witnessed<\/span> <span class=\"hps\">quite a bit<\/span> <span class=\"hps\">in this area.<\/span> <span class=\"hps\">&#8220;Today,<\/span> <span class=\"hps\">it takes<\/span> <span class=\"hps\">only<\/span> <span class=\"hps\">an intelligent<\/span> <span class=\"hps\">mind<\/span>, a computer and <span class=\"hps\">an Internet connection<\/span><span class=\"hps\"> to attack<\/span> <span class=\"hps\">an entire company<\/span>.&#8221;<\/span><\/p>\n<p>Therefore, it might come as a surprise that, according to a <a title=\"German study about cyber crime\" href=\"http:\/\/www.gdv.de\/2014\/03\/cyber-kriminalitaet-das-unterschaetzte-risiko\/\" target=\"_blank\">German study<\/a>, only 6% of all small and medium-sized companies consider cyber crimes as a possible risk to their existence. <span id=\"result_box\" lang=\"en\"><span class=\"hps\">A<\/span> <span class=\"hps\">fatal<\/span> mis<span class=\"hps\">judgement<\/span> <span class=\"hps\">when<\/span> <span class=\"hps\">considering that<\/span> <span class=\"hps\">the damage caused by<\/span> <span class=\"hps\">cyber crime<\/span> <span id=\"result_box\" lang=\"en\"> <span class=\"hps\">is calculated<\/span><\/span> <span class=\"hps\">to \u20ac 500 billion<\/span> <span class=\"hps\">annually<\/span><\/span>. Attacks can hit companies in many forms:<\/p>\n<ul>\n<li>Hacking<\/li>\n<li><a title=\"More information about Social Engineering\" href=\"http:\/\/www.social-engineer.org\/\" target=\"_blank\">Social Engineering<\/a><\/li>\n<li><span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"hps\">Computer<\/span> <span class=\"hps\">espionage or<\/span> <span class=\"hps\">sabotage<\/span><\/span><\/li>\n<li>Falsification of data<\/li>\n<li>Product piracy<\/li>\n<li><span id=\"result_box\" lang=\"en\"><span class=\"hps\">In-house<\/span> <span class=\"hps\">access to<\/span> <span class=\"hps\">corporate data through<\/span> <span class=\"hps\">IT systems<\/span><\/span><\/li>\n<\/ul>\n<h2><strong>Dangers lurk around every corner<br \/>\n<\/strong><\/h2>\n<p><span id=\"result_box\" lang=\"en\"><span class=\"hps\">However,<\/span> <span class=\"hps\">dangers lurk<\/span> <span class=\"hps\">even in places<\/span> <span class=\"hps\">where you<\/span> <span class=\"hps\">would not<\/span> <span class=\"hps\">suspect<\/span> <span class=\"hps\">them.<\/span> Even w<span class=\"hps\">ithout any ulterior motives, people can easily<\/span><span class=\"hps\"> infiltrate their company&#8217;s IT systems with manipulated data when <\/span>using<span class=\"hps\"> private<\/span> <span class=\"hps\">notebooks, tablets<\/span> <span class=\"hps\">and smartphones<\/span><span class=\"hps\">.<\/span> This way, they unintentionally endanger the company&#8217;s data security, its corporate secrets <span class=\"hps\">and<\/span>, in the worst <span class=\"hps\">case,<\/span> <span class=\"hps\">even its existence <\/span><span class=\"hps\">and thus<\/span> <span class=\"hps\">their own jobs<\/span>.<\/span><\/p>\n<p><span id=\"result_box\" lang=\"en\"><span class=\"hps\">Each<\/span> <span class=\"hps\">trainee,<\/span> <span class=\"hps\">each<\/span> <span class=\"hps\">cleaning power<\/span>, even long-term, <span class=\"hps\">loyal<\/span> <span class=\"hps\">employees<\/span> <span class=\"hps\">can<\/span> <span class=\"hps\">pose a potential risk<\/span> <span class=\"hps\">when <\/span><span class=\"hps\">blackmailed by<\/span> <span class=\"hps\">a third party.<\/span><\/span><\/p>\n<h2><strong>Measures against economic espionage<br \/>\n<\/strong><\/h2>\n<p><span id=\"result_box\" lang=\"en\"><span class=\"hps\">When<\/span> talking about economic<span class=\"hps\"> espionage,<\/span>\u00a0<span class=\"hps\">Reinhard<\/span> <span class=\"hps\">Vespers&#8217; intentions are not to\u00a0<\/span><span class=\"hps\">stir up<\/span> <span class=\"hps\">fear.<\/span> <span class=\"hps\">As a speaker<\/span> <span class=\"hps\">for<\/span> C<span class=\"hps\">ounterintelligence,<\/span> <span class=\"hps\">he<\/span> aims at making companies and their employees aware of<span class=\"hps\"> the<\/span> <span class=\"hps\">many dangers<\/span> <span class=\"hps\">and<\/span> <span class=\"hps\">risks involved in processing<\/span><span class=\"hps\"> data. According to Vesper c<\/span><span class=\"hps\">ompanies should<\/span> <span class=\"hps\">develop a<\/span> <span class=\"hps\">safety philosophy<\/span> <span class=\"hps\">that manifests itself<\/span> <span class=\"hps\">as an integral<\/span> <span class=\"hps\">part of all<\/span> <span class=\"hps\">business-related<\/span> <span class=\"hps\">actions.<\/span><\/span><\/p>\n<p>The safety philosophy should include aspects like:<\/p>\n<ul>\n<li><span id=\"result_box\" class=\"short_text\" lang=\"en\"><span class=\"hps\">Security concept<\/span> <span class=\"hps\">for all business units<br \/>\n<\/span><\/span><\/li>\n<li>Analysis of weaknesses<\/li>\n<li>Security aspects when it comes to personnel, even when employing interns<\/li>\n<li>Working contracts with no-competition and confidentiality clauses<\/li>\n<li>Comprehensive protection of information and communications systems<\/li>\n<li>Separation of private and corporate passwords<\/li>\n<\/ul>\n<p><span id=\"result_box\" lang=\"en\"><span class=\"hps\">Although<\/span> <span class=\"hps\">nowadays it<\/span> <span class=\"hps\">often<\/span> <span class=\"hps\">seems<\/span> <span class=\"hps\">that<\/span> <span class=\"hps\">companies can<\/span> <span class=\"hps\">do little<\/span> <span class=\"hps\">against cyber<\/span> <span class=\"hps\">crime and<\/span> <span class=\"hps\">economic espionage<\/span>, <span class=\"hps\">these recommendations<\/span> <span class=\"hps\">provide a good basis<\/span> <span class=\"hps\">to make the entire company more aware of security risks<\/span>. Thanks <span class=\"hps\">Reinhard<\/span> <span class=\"hps\">Vespers&#8217;<\/span> <span class=\"hps\">lecture, we at G&amp;D are <\/span><span class=\"hps\">now<\/span> <span class=\"hps\">better prepared<\/span> <span class=\"hps\">to<\/span> <span class=\"hps\">face the dangers<\/span> <span class=\"hps\">of economic espionage<\/span><span class=\"hps\">.<\/span><\/span><\/p>\n<div class=\"shariff\" data-title=\"Economic espionage \u2013 risks, measures, awareness\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/blog.gdsys.de\/en\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"tlx\" data-services='[\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"whatsapp\",\"mail\",\"info\"]' data-image=\"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Spionage_640-300x225.jpghttps:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Spionage_640-300x225.jpg 300w, https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Spionage_640.jpg 640w\" data-url=\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/\" data-lang=\"en\" data-theme=\"color\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hacker attacks, data theft, eavesdropping scandals &#8211; the list of dangers on the internet is longer than you think. However, not only individuals but also companies are a popular target of attacks. And most of the time, hackers aren&#8217;t interested in individual passwords. Economic espionage rather aims for data that include patents, designs or specific &#8230;<\/p>\n","protected":false},"author":2,"featured_media":1696,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[319,318,317,316,321,320],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Economic espionage \u2013 risks, measures, awareness<\/title>\n<meta name=\"description\" content=\"\u2b06 Economic espionage can hit any small &amp; medium-sized companies even though they are often not aware of it. We show you measures to protect your company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Economic espionage \u2013 risks, measures, awareness\" \/>\n<meta property=\"og:description\" content=\"\u2b06 Economic espionage can hit any small &amp; medium-sized companies even though they are often not aware of it. We show you measures to protect your company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/\" \/>\n<meta property=\"og:site_name\" content=\"Corporate Blog from Guntermann &amp; Drunck\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-10T11:24:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Wirtschaftsspionage_Slider.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bianca Schmidt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\",\"url\":\"https:\/\/blog.gdsys.de\/en\/\",\"name\":\"Corporate Blog from Guntermann &amp; Drunck\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Wirtschaftsspionage_Slider.png\",\"contentUrl\":\"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Wirtschaftsspionage_Slider.png\",\"width\":900,\"height\":400},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#webpage\",\"url\":\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/\",\"name\":\"Economic espionage \u2013 risks, measures, awareness\",\"isPartOf\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#primaryimage\"},\"datePublished\":\"2014-07-10T11:24:12+00:00\",\"dateModified\":\"2014-07-10T11:24:12+00:00\",\"author\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08\"},\"description\":\"\u2b06 Economic espionage can hit any small & medium-sized companies even though they are often not aware of it. We show you measures to protect your company.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Economic espionage \u2013 risks, measures, awareness\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08\",\"name\":\"Bianca Schmidt\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g\",\"caption\":\"Bianca Schmidt\"},\"description\":\"Redakteurin, \u00dcbersetzerin und Bloggerin bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Editor, translator and blogger at Guntermann &amp; Drunck. You can find me on LinkedIn.\",\"url\":\"https:\/\/blog.gdsys.de\/en\/author\/schmba\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Economic espionage \u2013 risks, measures, awareness","description":"\u2b06 Economic espionage can hit any small & medium-sized companies even though they are often not aware of it. We show you measures to protect your company.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/","og_locale":"en_US","og_type":"article","og_title":"Economic espionage \u2013 risks, measures, awareness","og_description":"\u2b06 Economic espionage can hit any small & medium-sized companies even though they are often not aware of it. We show you measures to protect your company.","og_url":"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/","og_site_name":"Corporate Blog from Guntermann &amp; Drunck","article_published_time":"2014-07-10T11:24:12+00:00","og_image":[{"width":900,"height":400,"url":"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Wirtschaftsspionage_Slider.png","type":"image\/png"}],"twitter_misc":{"Written by":"Bianca Schmidt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/blog.gdsys.de\/en\/#website","url":"https:\/\/blog.gdsys.de\/en\/","name":"Corporate Blog from Guntermann &amp; Drunck","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#primaryimage","inLanguage":"en-US","url":"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Wirtschaftsspionage_Slider.png","contentUrl":"https:\/\/blog.gdsys.de\/en\/files\/2014\/07\/Wirtschaftsspionage_Slider.png","width":900,"height":400},{"@type":"WebPage","@id":"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#webpage","url":"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/","name":"Economic espionage \u2013 risks, measures, awareness","isPartOf":{"@id":"https:\/\/blog.gdsys.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#primaryimage"},"datePublished":"2014-07-10T11:24:12+00:00","dateModified":"2014-07-10T11:24:12+00:00","author":{"@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08"},"description":"\u2b06 Economic espionage can hit any small & medium-sized companies even though they are often not aware of it. We show you measures to protect your company.","breadcrumb":{"@id":"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.gdsys.de\/en\/2014\/07\/10\/economic-espionage-risks-measures-sensitization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Economic espionage \u2013 risks, measures, awareness"}]},{"@type":"Person","@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08","name":"Bianca Schmidt","image":{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g","caption":"Bianca Schmidt"},"description":"Redakteurin, \u00dcbersetzerin und Bloggerin bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Editor, translator and blogger at Guntermann &amp; Drunck. You can find me on LinkedIn.","url":"https:\/\/blog.gdsys.de\/en\/author\/schmba\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/1689"}],"collection":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/comments?post=1689"}],"version-history":[{"count":12,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/1689\/revisions"}],"predecessor-version":[{"id":1704,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/1689\/revisions\/1704"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media\/1696"}],"wp:attachment":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media?parent=1689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/categories?post=1689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/tags?post=1689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}