{"id":19433,"date":"2024-03-12T12:57:49","date_gmt":"2024-03-12T11:57:49","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=19433"},"modified":"2024-03-12T12:57:49","modified_gmt":"2024-03-12T11:57:49","slug":"le-applicazioni-web-sono-suscettibili-di-vulnerabilita","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/it\/le-applicazioni-web-sono-suscettibili-di-vulnerabilita\/","title":{"rendered":"Le applicazioni web sono suscettibili di vulnerabilit\u00e0"},"content":{"rendered":"<figure id=\"attachment_19435\" aria-describedby=\"caption-attachment-19435\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19435\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg\" alt=\"\" width=\"680\" height=\"454\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg 680w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps-18x12.jpg 18w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps-375x250.jpg 375w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps-524x350.jpg 524w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-19435\" class=\"wp-caption-text\">Analisi Kaspersky: la maggior parte (70%) delle vulnerabilit\u00e0 riscontrate riguarda la protezione dei dati, con riferimento a informazioni riservate come password o dati di carte di credito. (Immagine: www.depositphotos.com)<\/figcaption><\/figure>\n<p>Per l'analisi, Kaspersky ha esaminato le vulnerabilit\u00e0 delle applicazioni web sviluppate internamente da aziende dei settori IT, governativo, assicurativo, delle telecomunicazioni, delle criptovalute, dell'e-commerce e della sanit\u00e0.<\/p>\n<p>La maggior parte (70%) delle vulnerabilit\u00e0 riscontrate riguarda la protezione dei dati in relazione a informazioni riservate come password, dati di carte di credito, cartelle cliniche, dati personali e informazioni aziendali riservate o controllo degli accessi. Quest'ultimo consente ai criminali informatici di aggirare le linee guida dei siti web e, ad esempio, di modificare o cancellare i dati.<\/p>\n<p>Nella maggior parte delle applicazioni analizzate, gli esperti hanno riscontrato un totale di diverse decine di vulnerabilit\u00e0 relative al controllo degli accessi e alla protezione dei dati; molti dei livelli di rischio pi\u00f9 elevati erano associati alle iniezioni SQL. Alcune delle vulnerabilit\u00e0 analizzate presentavano addirittura un rischio elevato. Ad esempio, l'88% di tutte le vulnerabilit\u00e0 SQL injection analizzate era ad alto rischio; inoltre, il 78% \u00e8 stato classificato come ad alto rischio nell'area delle password deboli.<\/p>\n<p>Inoltre, il 22% di tutte le applicazioni Web esaminate da Kaspersky aveva password deboli. Una possibile ragione \u00e8 che le applicazioni incluse nel campione potrebbero essere versioni di prova e non sistemi reali.<\/p>\n<figure id=\"attachment_19436\" aria-describedby=\"caption-attachment-19436\" style=\"width: 680px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19436\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Tabele_Bild1_ps.jpg\" alt=\"\" width=\"680\" height=\"558\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Tabele_Bild1_ps.jpg 680w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Tabele_Bild1_ps-15x12.jpg 15w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Tabele_Bild1_ps-366x300.jpg 366w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Tabele_Bild1_ps-427x350.jpg 427w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-19436\" class=\"wp-caption-text\">Altri tipi di vulnerabilit\u00e0 riscontrate e la loro presenza in applicazioni web sviluppate internamente. (Immagine: www.kaspersky.de)<\/figcaption><\/figure>\n<p>Oxana Andreeva, esperta di sicurezza del team Kaspersky Security Assessment, commenta: \"La ricerca \u00e8 stata condotta tenendo conto delle vulnerabilit\u00e0 pi\u00f9 comuni nelle applicazioni web sviluppate internamente dalle organizzazioni e del loro livello di rischio. Gli aggressori potrebbero utilizzarle per rubare i dati di autenticazione degli utenti o per eseguire codice dannoso sul server. Ogni vulnerabilit\u00e0 ha un impatto diverso sulla continuit\u00e0 operativa e sulla resilienza. Le aziende dovrebbero quindi prestare attenzione alla sicurezza quando sviluppano applicazioni web e rivederle costantemente\".<\/p>\n<p><strong>Raccomandazioni di Kaspersky per la protezione delle applicazioni Web sviluppate in azienda<\/strong><\/p>\n<ul>\n<li>Implementare un ciclo di vita di sviluppo del software sicuro (SSDLC).<\/li>\n<li>Eseguire valutazioni periodiche della sicurezza delle applicazioni e adottare misure appropriate.<\/li>\n<li>Monitorare il funzionamento delle applicazioni.<\/li>\n<\/ul>\n<p><em>Fonte: <a href=\"http:\/\/www.kaspersky.de\">www.kaspersky.de<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Le vulnerabilit\u00e0 nel controllo degli accessi e il rischio di divulgazione dei dati sono le falle di sicurezza pi\u00f9 diffuse nelle applicazioni web sviluppate internamente. Lo dimostra una recente analisi di Kaspersky per il periodo 2021-2023. <\/p>","protected":false},"author":380,"featured_media":19435,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[3560,3382,3326,3352],"class_list":["post-19433","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-cybersicherheit","tag-datenschutz","tag-risikomanagement","tag-unternehmen"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Webanwendungen sind Schwachstellen-anf\u00e4llig - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"Schwachstellen bei der Zugangskontrolle und das Risiko der Offenlegung von Daten sind die weit verbreitetsten Sicherheitsm\u00e4ngel in unternehmensintern entwickelten Webanwendungen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/it\/le-applicazioni-web-sono-suscettibili-di-vulnerabilita\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webanwendungen sind Schwachstellen-anf\u00e4llig\" \/>\n<meta property=\"og:description\" content=\"Schwachstellen bei der Zugangskontrolle und das Risiko der Offenlegung von Daten sind die weit verbreitetsten Sicherheitsm\u00e4ngel in unternehmensintern entwickelten Webanwendungen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/it\/le-applicazioni-web-sono-suscettibili-di-vulnerabilita\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-12T11:57:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adelisa Kalajdzini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Webanwendungen sind Schwachstellen-anf\u00e4llig\" \/>\n<meta name=\"twitter:description\" content=\"#Schwachstellen bei der Zugangskontrolle und das #Risiko der Offenlegung von #Daten sind die weit verbreitetsten #Sicherheitsm\u00e4ngel in unternehmensintern entwickelten #Webanwendungen.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adelisa Kalajdzini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/\"},\"author\":{\"name\":\"Adelisa Kalajdzini\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/4ebe2e04afdd80427ae9c9069dde7175\"},\"headline\":\"Webanwendungen sind Schwachstellen-anf\u00e4llig\",\"datePublished\":\"2024-03-12T11:57:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/\"},\"wordCount\":348,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg\",\"keywords\":[\"Cybersicherheit\",\"Datenschutz\",\"Risikomanagement\",\"Unternehmen\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/\",\"url\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/\",\"name\":\"Webanwendungen sind Schwachstellen-anf\u00e4llig - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg\",\"datePublished\":\"2024-03-12T11:57:49+00:00\",\"description\":\"Schwachstellen bei der Zugangskontrolle und das Risiko der Offenlegung von Daten sind die weit verbreitetsten Sicherheitsm\u00e4ngel in unternehmensintern entwickelten Webanwendungen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg\",\"width\":680,\"height\":454,\"caption\":\"Kaspersky Analyse: Der Grossteil (70 Prozent) der gefundenen Schwachstellen betrifft die Bereiche Datenschutz hinsichtlich vertraulicher Informationen wie Passw\u00f6rter oder Kreditkartendaten. (Bild: www.depositphotos.com)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webanwendungen sind Schwachstellen-anf\u00e4llig\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/4ebe2e04afdd80427ae9c9069dde7175\",\"name\":\"Adelisa Kalajdzini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b95b0122f29123fee33229802f3b16b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b95b0122f29123fee33229802f3b16b?s=96&d=mm&r=g\",\"caption\":\"Adelisa Kalajdzini\"},\"url\":\"https:\/\/www.m-q.ch\/it\/author\/adelisa-kalajdzini\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le applicazioni web sono suscettibili di vulnerabilit\u00e0 - Gestione e qualit\u00e0 MQ","description":"Le vulnerabilit\u00e0 nel controllo degli accessi e il rischio di divulgazione dei dati sono le falle di sicurezza pi\u00f9 comuni nelle applicazioni web sviluppate internamente.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/it\/le-applicazioni-web-sono-suscettibili-di-vulnerabilita\/","og_locale":"it_IT","og_type":"article","og_title":"Webanwendungen sind Schwachstellen-anf\u00e4llig","og_description":"Schwachstellen bei der Zugangskontrolle und das Risiko der Offenlegung von Daten sind die weit verbreitetsten Sicherheitsm\u00e4ngel in unternehmensintern entwickelten Webanwendungen.","og_url":"https:\/\/www.m-q.ch\/it\/le-applicazioni-web-sono-suscettibili-di-vulnerabilita\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2024-03-12T11:57:49+00:00","og_image":[{"width":680,"height":454,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg","type":"image\/jpeg"}],"author":"Adelisa Kalajdzini","twitter_card":"summary_large_image","twitter_title":"Webanwendungen sind Schwachstellen-anf\u00e4llig","twitter_description":"#Schwachstellen bei der Zugangskontrolle und das #Risiko der Offenlegung von #Daten sind die weit verbreitetsten #Sicherheitsm\u00e4ngel in unternehmensintern entwickelten #Webanwendungen.","twitter_image":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg","twitter_misc":{"Scritto da":"Adelisa Kalajdzini","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/"},"author":{"name":"Adelisa Kalajdzini","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/4ebe2e04afdd80427ae9c9069dde7175"},"headline":"Webanwendungen sind Schwachstellen-anf\u00e4llig","datePublished":"2024-03-12T11:57:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/"},"wordCount":348,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg","keywords":["Cybersicherheit","Datenschutz","Risikomanagement","Unternehmen"],"articleSection":["Risikomanagement"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/","url":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/","name":"Le applicazioni web sono suscettibili di vulnerabilit\u00e0 - Gestione e qualit\u00e0 MQ","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg","datePublished":"2024-03-12T11:57:49+00:00","description":"Le vulnerabilit\u00e0 nel controllo degli accessi e il rischio di divulgazione dei dati sono le falle di sicurezza pi\u00f9 comuni nelle applicazioni web sviluppate internamente.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2024\/03\/Kaspersky_Bild1_ps.jpg","width":680,"height":454,"caption":"Kaspersky Analyse: Der Grossteil (70 Prozent) der gefundenen Schwachstellen betrifft die Bereiche Datenschutz hinsichtlich vertraulicher Informationen wie Passw\u00f6rter oder Kreditkartendaten. (Bild: www.depositphotos.com)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/webanwendungen-sind-schwachstellen-anfaellig\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Webanwendungen sind Schwachstellen-anf\u00e4llig"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"Gestione e qualit\u00e0 MQ","description":"Piattaforma per sistemi di gestione integrati.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Fachmedien AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/4ebe2e04afdd80427ae9c9069dde7175","name":"Adelisa Kalajdzini","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2b95b0122f29123fee33229802f3b16b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b95b0122f29123fee33229802f3b16b?s=96&d=mm&r=g","caption":"Adelisa Kalajdzini"},"url":"https:\/\/www.m-q.ch\/it\/author\/adelisa-kalajdzini\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/posts\/19433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/users\/380"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/comments?post=19433"}],"version-history":[{"count":3,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/posts\/19433\/revisions"}],"predecessor-version":[{"id":19438,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/posts\/19433\/revisions\/19438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/media\/19435"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/media?parent=19433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/categories?post=19433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/it\/wp-json\/wp\/v2\/tags?post=19433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}