{"id":14032,"date":"2021-04-02T10:25:48","date_gmt":"2021-04-02T08:25:48","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=14032"},"modified":"2021-04-01T16:06:40","modified_gmt":"2021-04-01T14:06:40","slug":"unmasking-insider-threats","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/insider-bedrohungen-entlarven\/","title":{"rendered":"Exposing insider threats"},"content":{"rendered":"<figure id=\"attachment_14033\" aria-describedby=\"caption-attachment-14033\" style=\"width: 1000px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14033 size-full\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\" alt=\"Insider Threats\" width=\"1000\" height=\"750\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg 1000w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-768x576.jpg 768w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-16x12.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-233x175.jpg 233w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-467x350.jpg 467w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-920x690.jpg 920w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019-300x225.jpg 300w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-14033\" class=\"wp-caption-text\">\u00a9 Depositphotos, Andreus<\/figcaption><\/figure>\n<p>Threats from \"insiders\" make many IT security departments break out in a cold sweat. And rightly so, because they are already firmly anchored in corporate IT. They therefore pose a particularly high risk after a compromise because they can hardly be detected by normal security mechanisms that are directed outwards. It is therefore difficult to fully protect against insider threats using traditional means. To guard against insider threats and uncover what is happening inside the organization, organizations need the right strategies and technical solutions that go beyond traditional IT security methods.<\/p>\n<p><strong>Insider threats: 50-70% of all security breaches<\/strong><\/p>\n<p>If you look at what threats are ultimately successful and have been able to penetrate an organization's IT, insider threats are by no means a negligible risk. According to Gartner's Information Risk Research team, insider threats are actually responsible for 50 to 70 percent of all security incidents, and for security breaches specifically, insiders are responsible for three-quarters of them.<\/p>\n<p>The consequences can be severe: The Ponemon Institute estimates that insider threats cost $8.76 million per year per affected company. This is due in no small part to the fact that it takes an average of 280 days to identify and contain each breach - a frightening scenario for any company.<\/p>\n<p><strong>The three main types of insider threats<\/strong><\/p>\n<p>The most famous example of an insider threat is certainly Edward Snowden.<br \/>\nBut its activities, while best known, are by no means typical of the scenarios most organizations face, especially in a commercial context. In the majority of cases, insider threats take three main forms: \"accidental,\" \"compromised,\" or \"malicious\" insiders.<\/p>\n<p>1. as the name suggests, the \"malicious\" insider is typically an employee or contractor who steals information. Edward Snowden is probably the most famous example of this, though many other malicious insiders capture information not as whistleblowers but for financial gain, such as the thieves of Swiss bank data a few years ago.<\/p>\n<p>2. the \"compromised\" insider is considered by many to be the most problematic form, as this person has usually done nothing more than innocently click on a link or enter a password. This is often the result of phishing campaigns, where users are presented with a link to an authentic-looking website in order to trick them into entering login credentials or other sensitive information.<\/p>\n<p>3. and alternatively, but no less dangerous, is the \"accidental\" or \"negligent\" insider. Exposing these insiders can be particularly challenging because no matter how much care companies and employees take with cybersecurity, mistakes happen.<\/p>\n<p><strong>Beyond trainings there are technological possibilities of defense<\/strong><\/p>\n<p>To avoid such simple but, in the worst case, very far-reaching mistakes, many organizations are already making intensive use of training to raise their employees' awareness in this direction. Undoubtedly, some accidental and compromised insider attacks can be prevented simply by training end users to recognize and avoid phishing attempts. But even beyond training, there are technological opportunities that focus on user behavior to better protect against insider threats.<\/p>\n<p><strong>User and Entity Behavior Analysis (UEBA)<\/strong><\/p>\n<p>Using traditional cybersecurity solutions that only look outward creates a very large blind spot. To address the multi-layered challenges of insider threats, security teams need the technology infrastructures and tools to see the whole picture and therefore all threats - including those from the inside. This is where User and Entity Behaviour Analysis (UEBA) comes in handy. By understanding typical behaviors, security teams can more easily identify when a problem is occurring. AI and machine learning-based solutions are already being deployed by many organizations for effective, proactive protection. <\/p>\n<p><strong>Conclusion: Proactive strategy with analytics increases security<\/strong><\/p>\n<p>Organizations need the technology infrastructure and tools to see the full threat picture. Modern SOCs therefore use UEBA within their SIEM systems to also protect against human error, negligence and malicious insiders from the inside. Combined with training, such a proactive strategy can dramatically reduce the blind spot on the inside and detect many insider threats early.<\/p>","protected":false},"excerpt":{"rendered":"<p>Bedrohungen durch \u00abInsider\u00bb treiben vielen IT-Sicherheitsabteilungen den Angstschweiss auf die Stirn. Und dies auch zurecht, denn sie sind bereits fest in der Unternehmens-IT verankert. Sie stellen deswegen nach einer Kompromittierung ein besonders hohes Risiko dar, weil sie von normalen Sicherheitsmechanismen, die sich nach aussen richten, kaum erkannt werden k\u00f6nnen. Es ist also schwierig, sich mit [&hellip;]<\/p>\n","protected":false},"author":35,"featured_media":14033,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[4883,4885,4884],"class_list":["post-14032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-insider-bedrohung","tag-ueba","tag-user-and-entity-behavior-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Insider-Bedrohungen entlarven - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Insider-Bedrohungen: So k\u00f6nnen sich Organisationen besser gegen menschliches Versagen, Nachl\u00e4ssigkeit und b\u00f6swillige Insider sch\u00fctzen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/unmasking-insider-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insider-Bedrohungen entlarven - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"Insider-Bedrohungen: So k\u00f6nnen sich Organisationen besser gegen menschliches Versagen, Nachl\u00e4ssigkeit und b\u00f6swillige Insider sch\u00fctzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/unmasking-insider-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-02T08:25:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\"},\"headline\":\"Insider-Bedrohungen entlarven\",\"datePublished\":\"2021-04-02T08:25:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\"},\"wordCount\":698,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\",\"keywords\":[\"Insider-Bedrohung\",\"UEBA\",\"User and Entity Behavior Analysis\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\",\"url\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\",\"name\":\"Insider-Bedrohungen entlarven - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\",\"datePublished\":\"2021-04-02T08:25:48+00:00\",\"description\":\"Insider-Bedrohungen: So k\u00f6nnen sich Organisationen besser gegen menschliches Versagen, Nachl\u00e4ssigkeit und b\u00f6swillige Insider sch\u00fctzen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg\",\"width\":1000,\"height\":750,\"caption\":\"\u00a9 Depositphotos, Andreus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insider-Bedrohungen entlarven\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/roger-straessle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exposing Insider Threats - MQ Management and Quality","description":"Insider Threats: How organizations can better protect themselves against human error, negligence, and malicious insiders.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/unmasking-insider-threats\/","og_locale":"en_US","og_type":"article","og_title":"Insider-Bedrohungen entlarven - MQ Management und Qualit\u00e4t","og_description":"Insider-Bedrohungen: So k\u00f6nnen sich Organisationen besser gegen menschliches Versagen, Nachl\u00e4ssigkeit und b\u00f6swillige Insider sch\u00fctzen.","og_url":"https:\/\/www.m-q.ch\/en\/unmasking-insider-threats\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2021-04-02T08:25:48+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7"},"headline":"Insider-Bedrohungen entlarven","datePublished":"2021-04-02T08:25:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/"},"wordCount":698,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","keywords":["Insider-Bedrohung","UEBA","User and Entity Behavior Analysis"],"articleSection":["Risikomanagement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/","url":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/","name":"Exposing Insider Threats - MQ Management and Quality","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","datePublished":"2021-04-02T08:25:48+00:00","description":"Insider Threats: How organizations can better protect themselves against human error, negligence, and malicious insiders.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/03\/Depositphotos_10256883_s-2019.jpg","width":1000,"height":750,"caption":"\u00a9 Depositphotos, Andreus"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/insider-bedrohungen-entlarven\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Insider-Bedrohungen entlarven"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/www.m-q.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/14032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=14032"}],"version-history":[{"count":2,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/14032\/revisions"}],"predecessor-version":[{"id":14035,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/14032\/revisions\/14035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media\/14033"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=14032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=14032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=14032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}