{"id":11329,"date":"2024-06-13T10:00:00","date_gmt":"2024-06-13T08:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=11329"},"modified":"2025-08-13T19:10:40","modified_gmt":"2025-08-13T17:10:40","slug":"chopped-company-2","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/gehackte-unternehmen-2\/","title":{"rendered":"Security in cyberspace is essential"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11329\" class=\"elementor elementor-11329\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-556b9fcd e-con-full e-flex e-con e-parent\" data-id=\"556b9fcd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2334dade elementor-widget elementor-widget-text-editor\" data-id=\"2334dade\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">58% German companies were affected last year<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Cyber attacks are almost part of everyday business life. According to a recent survey, 58% of German companies were affected last year. However, new technologies from quantum computers to artificial intelligence could further increase the scale and impact of cybercrime. Security departments should upgrade their technology, as effective cyber security measures not only protect sensitive information, but also help to maintain customer trust.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p><a href=\"https:\/\/defenderbox.de\/en\/product\/\">Cybersecurity<\/a> refers to protecting systems, networks and programs from digital attacks so that hacker attacks have no way of accessing, changing or destroying sensitive information.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Intact and proactive cybersecurity measures are critical to maintaining online security, protecting privacy and mitigating the risks associated with cyberattacks. Effective cybersecurity measures are essential to protect sensitive data, prevent unauthorized access and ensure the resilience of digital infrastructures.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>What can you do? <a href=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/03\/2024_Whitepaper1-Prognosen2024.pdf\">Read here<\/a> about the \"<a href=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/03\/2024_Whitepaper1-Prognosen2024.pdf\">Top 10 trends &amp; forecasts 2024<\/a>\" on the topic of cybersecurity for your company and how to make your SME more cybersecure.<\/p>\n<!-- \/wp:paragraph --><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":11331,\"width\":\"351px\",\"height\":\"auto\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/03\/2024_Whitepaper1-Prognosen2024.pdf\"><img fetchpriority=\"high\" decoding=\"async\" width=\"597\" height=\"742\" class=\"wp-image-11331\" style=\"width: 351px; height: auto;\" src=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01.png\" alt=\"Read more!\" srcset=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01.png 597w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01-241x300.png 241w, https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01-451x560.png 451w\" sizes=\"(max-width: 597px) 100vw, 597px\" \/><\/a>\n<figcaption class=\"wp-element-caption\"><a href=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/03\/2024_Whitepaper1-Prognosen2024.pdf\">Download now<\/a><\/figcaption>\n<\/figure>\n<!-- \/wp:image --><!-- wp:paragraph -->\n<p>Or would you like to know which security gaps and vulnerabilities exist in your company? Simply use our <a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noopener\">Test installation<\/a> and find out!<\/p>\n<!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In today's interconnected world, where individuals, businesses and organizations rely heavily on digital infrastructure, the importance of cybersecurity cannot be overstated. <\/p>","protected":false},"author":3,"featured_media":11331,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29],"tags":[41,39,38,40,37,36],"class_list":["post-11329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-netzwerksicherheit-mit-defenderbox","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sicherheit im Cyberspace ist unerl\u00e4sslich - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/chopped-company-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicherheit im Cyberspace ist unerl\u00e4sslich - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/chopped-company-2\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-13T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T17:10:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"597\" \/>\n\t<meta property=\"og:image:height\" content=\"742\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Sicherheit im Cyberspace ist unerl\u00e4sslich\",\"datePublished\":\"2024-06-13T08:00:00+00:00\",\"dateModified\":\"2025-08-13T17:10:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/\"},\"wordCount\":216,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Bildschirmfoto-2024-06-06-um-14.10.01.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"Netzwerksicherheit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/\",\"name\":\"Sicherheit im Cyberspace ist unerl\u00e4sslich - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Bildschirmfoto-2024-06-06-um-14.10.01.png\",\"datePublished\":\"2024-06-13T08:00:00+00:00\",\"dateModified\":\"2025-08-13T17:10:40+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Bildschirmfoto-2024-06-06-um-14.10.01.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/Bildschirmfoto-2024-06-06-um-14.10.01.png\",\"width\":597,\"height\":742,\"caption\":\"Sie m\u00f6chten mehr dar\u00fcber wissen, wie Sie Ihr Unternehmen sch\u00fctzen k\u00f6nnen?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/gehackte-unternehmen-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicherheit im Cyberspace ist unerl\u00e4sslich\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security in cyberspace is essential - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/chopped-company-2\/","og_locale":"en_US","og_type":"article","og_title":"Sicherheit im Cyberspace ist unerl\u00e4sslich - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/chopped-company-2\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2024-06-13T08:00:00+00:00","article_modified_time":"2025-08-13T17:10:40+00:00","og_image":[{"width":597,"height":742,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Sicherheit im Cyberspace ist unerl\u00e4sslich","datePublished":"2024-06-13T08:00:00+00:00","dateModified":"2025-08-13T17:10:40+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/"},"wordCount":216,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["Netzwerksicherheit"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/","url":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/","name":"Security in cyberspace is essential - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01.png","datePublished":"2024-06-13T08:00:00+00:00","dateModified":"2025-08-13T17:10:40+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/gehackte-unternehmen-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/06\/Bildschirmfoto-2024-06-06-um-14.10.01.png","width":597,"height":742,"caption":"Sie m\u00f6chten mehr dar\u00fcber wissen, wie Sie Ihr Unternehmen sch\u00fctzen k\u00f6nnen?"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/gehackte-unternehmen-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Sicherheit im Cyberspace ist unerl\u00e4sslich"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/11329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=11329"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/11329\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/11331"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=11329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=11329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=11329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}