{"id":15587,"date":"2021-12-09T10:05:55","date_gmt":"2021-12-09T09:05:55","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=15587"},"modified":"2021-12-14T14:02:38","modified_gmt":"2021-12-14T13:02:38","slug":"three-key-security-trends-for-2022","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/three-key-security-trends-for-2022\/","title":{"rendered":"Three key security trends for 2022"},"content":{"rendered":"<figure id=\"attachment_15588\" aria-describedby=\"caption-attachment-15588\" style=\"width: 1000px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-15588\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg\" alt=\"\" width=\"1000\" height=\"718\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg 1000w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S-768x551.jpg 768w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S-16x12.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S-244x175.jpg 244w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S-487x350.jpg 487w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S-920x661.jpg 920w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S-300x215.jpg 300w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-15588\" class=\"wp-caption-text\">\u00a9 Depositphotos, nevarpp<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>IT security specialist Cybereason sees three key trends for 2022:<\/p>\n<h2><strong>Trend #1: Ransomware crime reaches new dimension<\/strong><\/h2>\n<p>Ransomware as such is not a new trend - but it will certainly have a decisive impact on the next year. Because what is new is the approach that hackers are taking with regard to the extortion software. Instead of guerrilla actions by individual small groups who spread their malware as widely as possible, criminal tactics are evolving. Cartels are now forming that make ransomware an element of large-scale attack strategies. These are referred to as so-called <a href=\"https:\/\/www.cybereason.com\/blog\/an-operation-centric-approach-to-ransomops-prevention\">RansomOps<\/a>. <\/p>\n<p>RansomOps are different from classic ransomware attacks. Whereas ransomware attackers previously often acted directly after penetrating corporate networks, they now take an approach in which companies are infiltrated over the long term. After the malware makes it into the network, it initially behaves inconspicuously, gathering information about the valuable data and digital infrastructure. Only when companies discover these comparatively inconspicuous behavior patterns, for example with the help of <a href=\"https:\/\/www.cybereason.com\/blog\/solarwinds-attacks-highlight-advantage-of-indicators-of-behavior-for-early-detection\">Indicators of Behavior (IOBs)<\/a>they can successfully defend their network against these attacks.<\/p>\n<h2><strong>Trend #2: Supply chains multiply vulnerabilities\u00a0<\/strong><\/h2>\n<p>Nearly all companies today have a widespread and sophisticated supply chain. Cybercriminals take advantage of this by targeting individual links in these supply chains and then spreading their attacks to all companies in the supply chain. The results of the Cybereason research on <a href=\"https:\/\/www.cybereason.com\/blog\/deadringer-exposing-chinese-threat-actors-targeting-major-telcos\">DeadRinger<\/a> and <a href=\"https:\/\/www.cybereason.com\/blog\/operation-ghostshell-novel-rat-targets-global-aerospace-and-telecoms-firms\">GhostShell<\/a> were already indicative of this strategy this year. Attackers targeted telecommunications companies whose networks then served as doorways into the digital infrastructure of other companies. These attacks were only a means to an end. Instead of infiltrating 100 individual companies, it is enough to hack one company. This also shows that cyber criminals are thinking in terms of ever larger structures and are more frequently pursuing long-term strategies. This development will continue. Companies need to be aware of this - especially those with a large-scale supply chain and many interfaces with subcontractors.<\/p>\n<h2><strong>Trend #3: Cyber criminals and states cooperate<\/strong><\/h2>\n<p>It is a truism that the wars of the future will increasingly be fought on battlefields in cyberspace. What is interesting, however, is that state actors have also increasingly targeted private companies in the past year. These often have control over a state's critical infrastructure, for example in oil production or food production. So it is only logical that they are targeted in interstate conflicts. Cyber criminals and states are increasingly cooperating with each other in this regard. While criminals act out of financial incentive, states focus on geopolitical interests. This trend will continue in 2022, especially as conflicts between states intensify.<\/p>\n<h2><strong>Preparation is half the battle<\/strong><\/h2>\n<p>\"Cybercriminals' approaches will continue to advance in 2022. Hardly anywhere else is change as rapid and ubiquitous as in the world of cybersecurity. It is therefore essential for the security of companies that they continue to develop here and always remain up to date,\" Frank K\u00f6lmel, Vice President Central Europe at Cybereason, looks ahead. \"Only those who know the methods and strategies of hackers and prepare their companies accordingly will be able to protect themselves effectively against cyber attacks in 2022.\"<\/p>\n<p><em>Source: <a href=\"http:\/\/www.cybereason.com\">Cybereason<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<blockquote>\n<p><strong>discover security vulnerabilities<\/strong><\/p>\n<p>The trade association <a href=\"http:\/\/www.suissedigital.ch\">Suissedigital<\/a> launched a bug bounty program for its members together with the IT security company FortIT about six months ago. Under the programme, hackers are rewarded with a bounty if they discover security gaps in the IT system or in IT services offered (e.g. Internet, TV or telephony services).<\/p>\n<p>The telecommunications company net+ (<a href=\"http:\/\/www.netplus.ch\/\">www.netplus.ch<\/a>) was the first association member to get involved in the programme, according to Suissedigital. After evaluating the first experiences during a pilot, the company draws a positive conclusion: \"The bug bounty programme works excellently. We have been able to discover and eliminate a number of weak points. This benefits our customers, but also us as a company and our partner networks,\" says Jean-Blaise Rey, Head of Applications at net+. The company is so satisfied with the programme that it intends to switch from the pilot to a regular model in 2022, according to Suissedigital.<\/p>\n<p><strong><em>Further information:<\/em><\/strong><\/p>\n<\/blockquote>\n<ul>\n<li>\n<blockquote><p><em>To the bug bounty program:\u00a0<a href=\"https:\/\/bugbountyhub.com\/de-ch\">https:\/\/bugbountyhub.com\/de-ch<\/a><\/em><\/p><\/blockquote>\n<\/li>\n<li>\n<blockquote><p><em>To the online test \"Security Check <a href=\"https:\/\/securitycheck.suissedigital.ch\/\">https:\/\/securitycheck.suissedigital.ch<\/a><\/em><\/p><\/blockquote>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>&nbsp; The IT security specialist Cybereason sees three major trends for 2022: Trend #1: Ransomware crime reaches new dimension Ransomware as such is not a new trend - but it will certainly have a decisive impact on the next year. Because what is new is the approach that hackers are taking with regard to the extortion software. Instead of guerrilla actions by individual small groups that [...]<\/p>","protected":false},"author":35,"featured_media":15588,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[3553,4718],"class_list":["post-15587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-ransomware","tag-suissedigital"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Drei wesentliche Security-Trends f\u00fcr 2022 - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Worauf m\u00fcssen sich Unternehmen f\u00fcr 2022 vorbereiten? Drei wesentliche IT-Security-Trends.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/three-key-security-trends-for-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Drei wesentliche Security-Trends f\u00fcr 2022 - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"Worauf m\u00fcssen sich Unternehmen f\u00fcr 2022 vorbereiten? Drei wesentliche IT-Security-Trends.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/three-key-security-trends-for-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-09T09:05:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-14T13:02:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"718\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\"},\"headline\":\"Drei wesentliche Security-Trends f\u00fcr 2022\",\"datePublished\":\"2021-12-09T09:05:55+00:00\",\"dateModified\":\"2021-12-14T13:02:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/\"},\"wordCount\":679,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg\",\"keywords\":[\"Ransomware\",\"Suissedigital\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/\",\"url\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/\",\"name\":\"Drei wesentliche Security-Trends f\u00fcr 2022 - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg\",\"datePublished\":\"2021-12-09T09:05:55+00:00\",\"dateModified\":\"2021-12-14T13:02:38+00:00\",\"description\":\"Worauf m\u00fcssen sich Unternehmen f\u00fcr 2022 vorbereiten? Drei wesentliche IT-Security-Trends.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg\",\"width\":1000,\"height\":718,\"caption\":\"\u00a9 Depositphotos, nevarpp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Drei wesentliche Security-Trends f\u00fcr 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/roger-straessle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three key security trends for 2022 - MQ management and quality","description":"What do businesses need to prepare for in 2022? Three key IT security trends.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/three-key-security-trends-for-2022\/","og_locale":"en_US","og_type":"article","og_title":"Drei wesentliche Security-Trends f\u00fcr 2022 - MQ Management und Qualit\u00e4t","og_description":"Worauf m\u00fcssen sich Unternehmen f\u00fcr 2022 vorbereiten? Drei wesentliche IT-Security-Trends.","og_url":"https:\/\/www.m-q.ch\/en\/three-key-security-trends-for-2022\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2021-12-09T09:05:55+00:00","article_modified_time":"2021-12-14T13:02:38+00:00","og_image":[{"width":1000,"height":718,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7"},"headline":"Drei wesentliche Security-Trends f\u00fcr 2022","datePublished":"2021-12-09T09:05:55+00:00","dateModified":"2021-12-14T13:02:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/"},"wordCount":679,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg","keywords":["Ransomware","Suissedigital"],"articleSection":["Risikomanagement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/","url":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/","name":"Three key security trends for 2022 - MQ management and quality","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg","datePublished":"2021-12-09T09:05:55+00:00","dateModified":"2021-12-14T13:02:38+00:00","description":"What do businesses need to prepare for in 2022? Three key IT security trends.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/12\/Depositphotos_40873681_S.jpg","width":1000,"height":718,"caption":"\u00a9 Depositphotos, nevarpp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/drei-wesentliche-security-trends-fuer-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Drei wesentliche Security-Trends f\u00fcr 2022"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/www.m-q.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/15587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=15587"}],"version-history":[{"count":5,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/15587\/revisions"}],"predecessor-version":[{"id":15600,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/15587\/revisions\/15600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media\/15588"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=15587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=15587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=15587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}