{"id":1531,"date":"2017-06-12T15:27:04","date_gmt":"2017-06-12T13:27:04","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=1531"},"modified":"2017-06-13T15:57:04","modified_gmt":"2017-06-13T13:57:04","slug":"1531-2","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/1531-2\/","title":{"rendered":"The Human Factor: Study analyzes user behavior during cyber attacks"},"content":{"rendered":"<figure id=\"attachment_1532\" aria-describedby=\"caption-attachment-1532\" style=\"width: 640px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1532\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\" alt=\"\" width=\"640\" height=\"383\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png 640w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-16x10.png 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-292x175.png 292w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-585x350.png 585w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-300x180.png 300w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet-624x373.png 624w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-1532\" class=\"wp-caption-text\">The study proves: Some 42 percent of attacks now occur via mobile devices. (Image: Depositphtos)<\/figcaption><\/figure>\n<p>The key finding of \"The Human Factor\" study is that cybercriminals are increasingly focusing on human error rather than technical errors to obtain money, personal data or intellectual property. Proofpoint's goal is to increase public awareness and sensitivity to this issue in order to improve security.<\/p>\n<p>For example, Proopoint is seeing an increasing share of business email compromise (BEC) attacks against decision makers. These attacks represent the fastest growing segment of cybercriminals with an estimated damage of about five billion US dollars. Fraudsters send emails without malware to trick recipients into transferring money or revealing personal information.<\/p>\n<p><em>Proofpoint comes to quite interesting and surprising conclusions:<\/em><\/p>\n<ul>\n<li><em>Sharp increase in the share of business email compromise (BEC, aka CEO fraud) attacks from one percent in 2015 to 42 percent last year (measured with the emergence of mails with banking Trojans).<\/em><\/li>\n<li><em>Someone always clicks - and quickly. Nearly 90 percent of all clicks occur within the first 24 hours after mail receipt. A quarter of them happen within the first ten minutes and half of them after about an hour. It is hardly surprising that the average time between the arrival of the mail and the click on the fraudulent link is shortest during business hours between 08:00 in the morning and 15:00 in the afternoon. - In this aspect, the local habits of users in different regions do not differ.<\/em><\/li>\n<li><em>More than 90 percent of fraudulent emails were designed to trick users into entering their credentials on spoofed phishing sites. Of particular note: Today, nearly all attacks (99 percent) that target fraud require human interaction to install malware. Thus, few exploit vulnerabilities in software. Among the phishing emails, while those aimed at stealing Apple IDs were the most common, those asking for Google Drive data were the most clicked.<\/em><\/li>\n<li><em>Half of all clicks on fraudulent URLs are from devices that are not subject to enterprise systems management. Around 42 percent now come from a mobile device. This rate has more than doubled from the long-term comparable figure of 20 percent. Eight percent of all clicks still come from potentially unprotected versions of Windows for which there are no longer any security patches due to their age.<\/em><\/li>\n<li><em>Fraudulent pseudo-support to harvest personal data via social media increased 150 percent in 2016. In this approach, the criminals create a social media account for support requests that is almost indistinguishable from that of a legitimate company. If a user seeks help from that very company and tweets their request, for example, these scammers attempt to redirect the request to their account. They usually then ask the person seeking help to enter their login details.<\/em><\/li>\n<li><em>Watch out on Thursday: on this day of the week, the volume of mails with malware attached increases by 38 percent compared to the average volume on weekdays. Tuesday, Wednesday and Thursday are particularly popular with ransomware senders. Banking Trojans peak on Wednesday. Campaigns attacking point-of-sales tend to occur on Thursday or Friday. Keyloggers and backdoor attacks prefer Mondays.<\/em><\/li>\n<\/ul>\n<p><strong>Other countries, other e-mail customs<\/strong><\/p>\n<p>Attackers now know the habits of mail users and send their mail attacks around four to five hours after the start of the normal working day, most of them at lunchtime. However, there are significant differences in the response to these mails around the world: While in the USA, Canada and Australia people often react to the mails exactly in these four to five hours, the French like to click at noon around 13:00. German and Swiss users, on the other hand, tend to be impatient and click right in the first few hours of the working day. The situation is completely different in Great Britain: Here, clicking is evenly distributed over the time until around 2:00 p.m., after which it becomes significantly less.<\/p>\n<p>Proofpoint's \"The Human Factor \" report is based on research of countless attack attempts across more than 5,000 Proofpoint enterprise customers in 2016.<\/p>\n<p><em><a href=\"https:\/\/www.proofpoint.com\/de\/resources\/white-papers\/human-factor-report\">Here<\/a> to download the complete report<\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>The most important finding from the study \u201eThe Human Factor\u201c: Cyber criminals are increasingly focusing on human error rather than technical errors in order to gain access to money, personal data or intellectual property. Proofpoint's aim is to increase public awareness and sensitivity to this issue and thus improve security [...].<\/p>","protected":false},"author":35,"featured_media":1532,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[3355,3362],"class_list":["post-1531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-unkategorisiert","tag-cyber-crime","tag-studie"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"In ihrer Studie \u201cThe Human Factor\u201d hat Proofpoint, Inc., eines der f\u00fchrenden Next-Generation Cybersecurity-Unternehmen, &quot;menschelnde&quot; Fakten vogestellt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/1531-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"In ihrer Studie \u201cThe Human Factor\u201d hat Proofpoint, Inc., eines der f\u00fchrenden Next-Generation Cybersecurity-Unternehmen, &quot;menschelnde&quot; Fakten vogestellt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/1531-2\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-12T13:27:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-06-13T13:57:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"383\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\"},\"headline\":\"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen\",\"datePublished\":\"2017-06-12T13:27:04+00:00\",\"dateModified\":\"2017-06-13T13:57:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/\"},\"wordCount\":713,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\",\"keywords\":[\"Cyber-Crime\",\"Studie\"],\"articleSection\":[\"Unkategorisiert\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/\",\"url\":\"https:\/\/www.m-q.ch\/en\/1531-2\/\",\"name\":\"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\",\"datePublished\":\"2017-06-12T13:27:04+00:00\",\"dateModified\":\"2017-06-13T13:57:04+00:00\",\"description\":\"In ihrer Studie \u201cThe Human Factor\u201d hat Proofpoint, Inc., eines der f\u00fchrenden Next-Generation Cybersecurity-Unternehmen, \\\"menschelnde\\\" Fakten vogestellt.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/en\/1531-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png\",\"width\":640,\"height\":383,\"caption\":\"Die Studie belegt: Rund 42 Prozent der Angriffe erfolgen mittlerweile \u00fcber mobile Ger\u00e4te. (Bild: Depositphtos)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/en\/1531-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Unkategorisiert\",\"item\":\"https:\/\/www.m-q.ch\/it\/categoria\/senza-categoria\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/roger-straessle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Human Factor: Study analyzes user behavior during cyber attacks - MQ Management und Qualit\u00e4t","description":"In their study, \"The Human Factor,\" Proofpoint, Inc, one of the leading next-generation cybersecurity companies, has presented \"human\" facts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/1531-2\/","og_locale":"en_US","og_type":"article","og_title":"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen - MQ Management und Qualit\u00e4t","og_description":"In ihrer Studie \u201cThe Human Factor\u201d hat Proofpoint, Inc., eines der f\u00fchrenden Next-Generation Cybersecurity-Unternehmen, \"menschelnde\" Fakten vogestellt.","og_url":"https:\/\/www.m-q.ch\/en\/1531-2\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2017-06-12T13:27:04+00:00","article_modified_time":"2017-06-13T13:57:04+00:00","og_image":[{"width":640,"height":383,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","type":"image\/png"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7"},"headline":"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen","datePublished":"2017-06-12T13:27:04+00:00","dateModified":"2017-06-13T13:57:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/"},"wordCount":713,"commentCount":0,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","keywords":["Cyber-Crime","Studie"],"articleSection":["Unkategorisiert"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/en\/1531-2\/","url":"https:\/\/www.m-q.ch\/en\/1531-2\/","name":"The Human Factor: Study analyzes user behavior during cyber attacks - MQ Management und Qualit\u00e4t","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","datePublished":"2017-06-12T13:27:04+00:00","dateModified":"2017-06-13T13:57:04+00:00","description":"In their study, \"The Human Factor,\" Proofpoint, Inc, one of the leading next-generation cybersecurity companies, has presented \"human\" facts.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/en\/1531-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2017\/06\/The-Human-Factor-Studie-analysiert-Nutzerverhalten-bei-Cyberangriffen-mq-management-u-qualitaet.png","width":640,"height":383,"caption":"Die Studie belegt: Rund 42 Prozent der Angriffe erfolgen mittlerweile \u00fcber mobile Ger\u00e4te. (Bild: Depositphtos)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/en\/1531-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Unkategorisiert","item":"https:\/\/www.m-q.ch\/it\/categoria\/senza-categoria\/"},{"@type":"ListItem","position":2,"name":"The Human Factor: Studie analysiert Nutzerverhalten bei Cyberangriffen"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/www.m-q.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/1531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=1531"}],"version-history":[{"count":1,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/1531\/revisions"}],"predecessor-version":[{"id":1533,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/1531\/revisions\/1533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media\/1532"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=1531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=1531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=1531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}