{"id":7031,"date":"2024-03-27T10:10:00","date_gmt":"2024-03-27T09:10:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=7031"},"modified":"2025-08-13T19:31:19","modified_gmt":"2025-08-13T17:31:19","slug":"tips_tricks-for-cyber-security","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/tipps_tricks-zur-cybersicherheit\/","title":{"rendered":"Examples &amp; tricks for increased cyber security"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"7031\" class=\"elementor elementor-7031\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6de67773 e-con-full e-flex e-con e-parent\" data-id=\"6de67773\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c774e79 elementor-widget elementor-widget-text-editor\" data-id=\"2c774e79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">Four examples of security vulnerabilities &amp; five tricks to increase your IT security<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>We check with the <a href=\"https:\/\/defenderbox.de\/en\/product\/\" data-type=\"link\" data-id=\"https:\/\/defenderbox.de\/produkt\/\">DEFENDERBOX<\/a> thousands of servers, PCs, printers and network components for our customers and interested parties every week. The result is often shocking, because we always find <strong>critical<\/strong> Security gaps that look like an invitation to hackers. Here are a few examples:<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item {\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|vivid-cyan-blue\"}}}},\"textColor\":\"vivid-cyan-blue\"} -->\n<li class=\"has-vivid-cyan-blue-color has-text-color has-link-color\">Incorrectly configured network drives: incorrect configuration makes them accessible to anyone, enabling the easy spread of ransomware or the reading of confidential data.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item {\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|vivid-cyan-blue\"}}}},\"textColor\":\"vivid-cyan-blue\"} -->\n<li class=\"has-vivid-cyan-blue-color has-text-color has-link-color\">Smart home controls whose default configuration has never been customized. The standard accounts can be easily accessed and changes made. And modified administrator rights enable attacks on the entire IT network.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item {\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|vivid-cyan-blue\"}}}},\"textColor\":\"vivid-cyan-blue\"} -->\n<li class=\"has-vivid-cyan-blue-color has-text-color has-link-color\">Printers that allow the printed data to be read.\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item {\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|vivid-cyan-blue\"}}}},\"textColor\":\"vivid-cyan-blue\"} -->\n<li class=\"has-vivid-cyan-blue-color has-text-color has-link-color\">Network components that have been configured so that everything that happens in the network and which computers are present can be read out.<br \/><br \/><\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p>The fix is very simple, but the damage is massive. What do these examples look like in your network?<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Regardless of the size of the company, many of us ask ourselves the same question: are our security measures sufficient? The constant threat of malware entering the network is a harsh reality. What can you do?<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<h3>MFA Identification of employees<\/h3>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Multi-factor authentication (MFA) should be standard in companies of all sizes. This authentication method requires an employee to enter two or more verification factors before gaining access to a resource. Resources that can be protected in this way include online accounts or VPN connections.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<h3>Virus protection program<\/h3>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>In today's world, every end device must be protected. To do this, it is important to implement an anti-virus program that is appropriate for the company's level of protection. Professional programs offer not only the program, but also background monitoring that allows administrators to see various data on the end devices.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<h3>Access authorizations<\/h3>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Not every employee needs unlimited user rights to carry out their work. As a rule, very specific rights are sufficient. In particular, the user rights for downloading files and executing them should be carefully considered and possibly restricted. Access to the network can usually also be easily limited.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<h3>Backups<\/h3>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Store important files on a separate device or in the cloud. This ensures business continuity even in the event of an attack.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<h3>Use of an independent cybersecurity tool<\/h3>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Use cybersecurity tools such as our <a href=\"https:\/\/defenderbox.de\/en\/poduct\/\" target=\"_blank\" rel=\"noreferrer noopener\">DEFENDERBOX<\/a>. As an independent tool that is not part of your <a href=\"https:\/\/defenderbox.de\/en\/it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Software landscape<\/a> If your IT infrastructure needs to be implemented, it regularly scans your IT infrastructure for vulnerabilities and security gaps. Remember: focus on prevention, because reputational damage cannot be undone.<\/p>\n<!-- \/wp:image --><!-- wp:paragraph --><!-- \/wp:paragraph --><!-- wp:separator {\"className\":\"is-style-wide\",\"style\":{\"spacing\":{\"margin\":{\"top\":\"var:preset|spacing|x-small\",\"bottom\":\"var:preset|spacing|x-small\"}}},\"backgroundColor\":\"tertiary\"} --><!-- \/wp:column --><!-- \/wp:columns --><!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In pentests, we find critical security vulnerabilities in 89% of cases.<\/p>","protected":false},"author":3,"featured_media":7032,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29,31],"tags":[41,39,38,40,37,36],"class_list":["post-7031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-netzwerksicherheit-mit-defenderbox","category-tipps-beispiele-im-gebrauch-der-defenderbox","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beispiele &amp; Tricks f\u00fcr eine erh\u00f6hte Cybersicherheit - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/tips_tricks-for-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beispiele &amp; Tricks f\u00fcr eine erh\u00f6hte Cybersicherheit - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/tips_tricks-for-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-27T09:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T17:31:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Beispiele &amp; Tricks f\u00fcr eine erh\u00f6hte Cybersicherheit\",\"datePublished\":\"2024-03-27T09:10:00+00:00\",\"dateModified\":\"2025-08-13T17:31:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/\"},\"wordCount\":444,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Security.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"Netzwerksicherheit\",\"Tipps &amp; Beispiele\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/\",\"name\":\"Beispiele &amp; Tricks f\u00fcr eine erh\u00f6hte Cybersicherheit - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Security.png\",\"datePublished\":\"2024-03-27T09:10:00+00:00\",\"dateModified\":\"2025-08-13T17:31:19+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Security.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Security.png\",\"width\":1280,\"height\":853,\"caption\":\"Beispiele & Tricks Ihr Unternehmen zu sch\u00fctzen!\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/tipps_tricks-zur-cybersicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beispiele &amp; Tricks f\u00fcr eine erh\u00f6hte Cybersicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Examples &amp; tricks for increased cyber security - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/tips_tricks-for-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Beispiele &amp; Tricks f\u00fcr eine erh\u00f6hte Cybersicherheit - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/tips_tricks-for-cyber-security\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2024-03-27T09:10:00+00:00","article_modified_time":"2025-08-13T17:31:19+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Security.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Beispiele &amp; Tricks f\u00fcr eine erh\u00f6hte Cybersicherheit","datePublished":"2024-03-27T09:10:00+00:00","dateModified":"2025-08-13T17:31:19+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/"},"wordCount":444,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Security.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["Netzwerksicherheit","Tipps &amp; Beispiele"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/","url":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/","name":"Examples &amp; tricks for increased cyber security - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Security.png","datePublished":"2024-03-27T09:10:00+00:00","dateModified":"2025-08-13T17:31:19+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Security.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/Security.png","width":1280,"height":853,"caption":"Beispiele & Tricks Ihr Unternehmen zu sch\u00fctzen!"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/tipps_tricks-zur-cybersicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Beispiele &amp; Tricks f\u00fcr eine erh\u00f6hte Cybersicherheit"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/7031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=7031"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/7031\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/7032"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=7031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=7031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=7031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}