{"id":19713,"date":"2024-05-02T10:34:38","date_gmt":"2024-05-02T08:34:38","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=19713"},"modified":"2024-06-07T07:04:05","modified_gmt":"2024-06-07T05:04:05","slug":"world-password-day-2024-in-search-of-passwordless-solutions","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/","title":{"rendered":"World Password Day 2024: In search of passwordless solutions"},"content":{"rendered":"<figure id=\"attachment_19720\" aria-describedby=\"caption-attachment-19720\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19720\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg\" alt=\"\" width=\"680\" height=\"454\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg 680w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps-18x12.jpg 18w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps-375x250.jpg 375w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps-524x350.jpg 524w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-19720\" class=\"wp-caption-text\">Although we know that passwords can be cracked, exposed or stolen and then used against us, many people and companies still rely on them. (Image: www.depositphotos.com)<\/figcaption><\/figure>\n<p>Although we know that passwords can be cracked, disclosed or stolen and then used against us, many people and companies still rely on them. There are various reasons for this. Understanding these is essential to strengthening our passwords or moving away from them in favor of more effective authentication solutions. Passwords are simply practical: both users and IT administrators are familiar with how they work, they are easy to implement and require minimal investment and existing infrastructure. They require no additional hardware and almost every device and application supports password authentication.<\/p>\n<h3><strong>Less dependence on passwords<\/strong><\/h3>\n<p>Anyone considering alternatives to passwords needs to balance security, ease of use and scalability to ensure a seamless yet secure user experience. Too much complexity in authentication processes will only lead to users finding ways to circumvent them. Companies that want to move away from passwords without overburdening their users have a choice between:<\/p>\n<h3><strong>Two-factor or multi-factor authentication (2FA or MFA):<\/strong><\/h3>\n<p>These methods have now become the standard for many applications. With 2FA, users must present two factors of identification before gaining access to the device or application. Typically, these factors include something they know (e.g. a password) and something they have (e.g. a code they can share via a mobile device). The additional time and complexity are comparatively low. MFA adds additional layers of authentication, e.g. something that is unique to the user (biometric authentication) or something that they perform (behavioral biometric authentication). However, in recent years, attackers have increasingly learned to circumvent 2FA and MFA through targeted phishing or by exploiting \"MFA fatigue\" by flooding users with fake login notifications until they wave one through.<\/p>\n<h3><strong>Single Sign-On (SSO): <\/strong><\/h3>\n<p>SSO allows users to access different devices or applications with just one set of credentials. This reduces the need for passwords and improves the user experience. This approach is very effective for company or organization-internal logins, for example, but is often time-consuming to implement and set up. SSO can also be risky if it is extended to logins on the Internet and access is gained via the login data for popular services and websites such as Google, Facebook, Yahoo, Apple or Microsoft. The login itself then becomes simple. However, if an account with one of these providers is compromised, the attacker can access any other account for which the SSO is used. In addition, data is often exchanged between the individual providers, which many users are not aware of, but also do not want.<\/p>\n<h3><strong>Biometric authentication: <\/strong><\/h3>\n<p>These include methods such as fingerprint recognition, facial recognition, iris scanning and voice recognition. Behavioral biometrics, on the other hand, is based on the recognition of typing or device usage behavior. Biometric authentication methods offer a high level of security while being user-friendly, as users do not have to remember passwords or answers to security queries. In addition, many users are already familiar with them, as many end-user devices already have biometric authentication capabilities, which can facilitate and accelerate the deployment and adoption of these methods on an enterprise-wide level. However, not every device is suitable for biometric authentication and implementing the required technology can be very costly. In addition, users must agree to use their biometric data in a professional context.<\/p>\n<h3><strong>Hardware tokens: <\/strong><\/h3>\n<p>These physical devices generate unique, often time-limited codes or cryptographic keys for authentication as an additional layer of security for logging in. An attacker would need physical access to the token and would also need to know the user's login details to gain access to their account. The disadvantage: a forgotten password can simply be reset, but a lost hardware token must be replaced. In the meantime, an alternative back-up process must also be set up for logging in.<\/p>\n<h3><strong>Certificate-based authentication: <\/strong><\/h3>\n<p>This approach is based on digital certificates issued by a certification authority in combination with public key cryptography to check and verify the user's identity. The certificate stores identification-relevant information and a public key, while the user himself has a virtual private key. This authentication method is suitable, for example, in cases where companies employ contractors who require temporary access to their network. However, implementing this method can be comparatively costly and time-consuming.<\/p>\n<p>There is also another dynamic approach: risk-based authentication. When a login attempt is made, the associated risk of unauthorized access is first determined based on various factors such as user behaviour, location and device information and the authentication requirements are adjusted accordingly.<\/p>\n<p>To ensure the highest possible level of authentication security, the focus of those responsible should not be on eliminating passwords, but on reducing dependency on them. Passwordless approaches rely on alternative or additional authentication methods that, like those mentioned above, are both secure and user-friendly, often as part of a broader zero trust approach. Both passwordless access and Zero Trust help to increase the security of devices, users and networks in an ever-changing threat landscape without compromising the user experience - and in combination, end our reliance on passwords.<\/p>\n<p><em>Source: <a href=\"http:\/\/www.barracuda.com\">www.barracuda.com<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Around half (49%) of the data breaches reported last year (and 86% of all data breaches within web applications) involved the use of stolen login credentials such as usernames and passwords. In Germany alone, around 3.2 million user accounts were successfully hacked in the first quarter of 2024. In Switzerland, the figure was just under 210,000, so secure authentication still appears to be a challenge for many.<\/p>","protected":false},"author":380,"featured_media":19720,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[5397,3326,3352],"class_list":["post-19713","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-passwortsicherheit","tag-risikomanagement","tag-unternehmen"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Bei rund der H\u00e4lfte der gemeldeten Datenschutzverletzungen wurden gestohlene Anmeldeinformationen wie Benutzernamen und Passw\u00f6rter verwendet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/world-password-day-2024-in-search-of-passwordless-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen\" \/>\n<meta property=\"og:description\" content=\"Bei rund der H\u00e4lfte der gemeldeten Datenschutzverletzungen wurden gestohlene Anmeldeinformationen wie Benutzernamen und Passw\u00f6rter verwendet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/world-password-day-2024-in-search-of-passwordless-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-02T08:34:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-07T05:04:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adelisa Kalajdzini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen\" \/>\n<meta name=\"twitter:description\" content=\"Bei rund der H\u00e4lfte der gemeldeten #Datenschutzverletzungen wurden gestohlene #Anmeldeinformationen wie #Benutzernamen und #Passw\u00f6rter verwendet.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adelisa Kalajdzini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/\"},\"author\":{\"name\":\"Adelisa Kalajdzini\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/4ebe2e04afdd80427ae9c9069dde7175\"},\"headline\":\"World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen\",\"datePublished\":\"2024-05-02T08:34:38+00:00\",\"dateModified\":\"2024-06-07T05:04:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/\"},\"wordCount\":967,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg\",\"keywords\":[\"Passwortsicherheit\",\"Risikomanagement\",\"Unternehmen\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/\",\"url\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/\",\"name\":\"World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg\",\"datePublished\":\"2024-05-02T08:34:38+00:00\",\"dateModified\":\"2024-06-07T05:04:05+00:00\",\"description\":\"Bei rund der H\u00e4lfte der gemeldeten Datenschutzverletzungen wurden gestohlene Anmeldeinformationen wie Benutzernamen und Passw\u00f6rter verwendet.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg\",\"width\":680,\"height\":454,\"caption\":\"Obwohl wir wissen, dass Passw\u00f6rter geknackt, offengelegt oder gestohlen und dann gegen uns verwendet werden k\u00f6nnen, verlassen sich viele Personen und Unternehmen nach wie vor auf sie. (Bild: www.depositphotos.com)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/4ebe2e04afdd80427ae9c9069dde7175\",\"name\":\"Adelisa Kalajdzini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b95b0122f29123fee33229802f3b16b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b95b0122f29123fee33229802f3b16b?s=96&d=mm&r=g\",\"caption\":\"Adelisa Kalajdzini\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/adelisa-kalajdzini\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"World Password Day 2024: In search of passwordless solutions - MQ Management and Quality","description":"In around half of the reported data breaches, stolen login information such as usernames and passwords were used.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/world-password-day-2024-in-search-of-passwordless-solutions\/","og_locale":"en_US","og_type":"article","og_title":"World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen","og_description":"Bei rund der H\u00e4lfte der gemeldeten Datenschutzverletzungen wurden gestohlene Anmeldeinformationen wie Benutzernamen und Passw\u00f6rter verwendet.","og_url":"https:\/\/www.m-q.ch\/en\/world-password-day-2024-in-search-of-passwordless-solutions\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2024-05-02T08:34:38+00:00","article_modified_time":"2024-06-07T05:04:05+00:00","og_image":[{"width":680,"height":454,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg","type":"image\/jpeg"}],"author":"Adelisa Kalajdzini","twitter_card":"summary_large_image","twitter_title":"World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen","twitter_description":"Bei rund der H\u00e4lfte der gemeldeten #Datenschutzverletzungen wurden gestohlene #Anmeldeinformationen wie #Benutzernamen und #Passw\u00f6rter verwendet.","twitter_image":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg","twitter_misc":{"Written by":"Adelisa Kalajdzini","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/"},"author":{"name":"Adelisa Kalajdzini","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/4ebe2e04afdd80427ae9c9069dde7175"},"headline":"World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen","datePublished":"2024-05-02T08:34:38+00:00","dateModified":"2024-06-07T05:04:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/"},"wordCount":967,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg","keywords":["Passwortsicherheit","Risikomanagement","Unternehmen"],"articleSection":["Risikomanagement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/","url":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/","name":"World Password Day 2024: In search of passwordless solutions - MQ Management and Quality","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg","datePublished":"2024-05-02T08:34:38+00:00","dateModified":"2024-06-07T05:04:05+00:00","description":"In around half of the reported data breaches, stolen login information such as usernames and passwords were used.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/05\/Barracuda_Bild1_ps.jpg","width":680,"height":454,"caption":"Obwohl wir wissen, dass Passw\u00f6rter geknackt, offengelegt oder gestohlen und dann gegen uns verwendet werden k\u00f6nnen, verlassen sich viele Personen und Unternehmen nach wie vor auf sie. (Bild: www.depositphotos.com)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/world-password-day-2024-auf-der-suche-nach-passwortlosen-loesungen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"World Password Day 2024: Auf der Suche nach passwortlosen L\u00f6sungen"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/4ebe2e04afdd80427ae9c9069dde7175","name":"Adelisa Kalajdzini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2b95b0122f29123fee33229802f3b16b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b95b0122f29123fee33229802f3b16b?s=96&d=mm&r=g","caption":"Adelisa Kalajdzini"},"url":"https:\/\/www.m-q.ch\/en\/author\/adelisa-kalajdzini\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/19713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/380"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=19713"}],"version-history":[{"count":7,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/19713\/revisions"}],"predecessor-version":[{"id":19721,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/19713\/revisions\/19721"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media\/19720"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=19713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=19713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=19713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}