{"id":7034,"date":"2024-04-02T10:10:00","date_gmt":"2024-04-02T08:10:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=7034"},"modified":"2025-08-14T10:39:26","modified_gmt":"2025-08-14T08:39:26","slug":"cybersecurity-as-a-factor-for-the-future","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/zukunftsfaktor-cybersecurity\/","title":{"rendered":"Cybersecurity as a factor for the future"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"7034\" class=\"elementor elementor-7034\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f4a5576 e-con-full e-flex e-con e-parent\" data-id=\"6f4a5576\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33739d0c elementor-widget elementor-widget-text-editor\" data-id=\"33739d0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t\n<div class=\"wp-block-group alignwide has-background-background-color has-background is-content-justification-left is-layout-constrained wp-container-core-group-is-layout-12dd3699 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns has-background-background-color has-background is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis: 100%;\">\n<h2 class=\"wp-block-heading\">What is the threat of a successful hacker attack?<\/h2>\n\n<p>Often operational inability to act - for days, weeks or months, not to mention the loss of reputation.\u00a0<\/p>\n\n<p>This makes IT security one of, if not the <strong>Future factor<\/strong> for companies of all sizes. Cyber attacks can quickly become an existential risk, especially for small and medium-sized enterprises (SMEs).\u00a0<\/p>\n\n<p>The threat situation is constantly increasing and the consequences are serious. This makes the results of a system house study conducted in cooperation with forsa Gesellschaft f\u00fcr Sozialforschung und statistische Analysen mbH all the more surprising:\u00a0<\/p>\n\n<p>This suggests that SMEs in particular continue to underestimate the dangers posed by cyber criminals - despite constant media coverage. Only 36% of companies with fewer than 500 IT workstations consider the risk of falling victim to a cyberattack in the next twelve months to be high. By comparison, the figure is 47% for companies with 500 to 5,000 workstations.<\/p>\n\n<p>When it comes to prevention, it is important to ensure that up-to-date or new security technologies are used, in terms of <a href=\"https:\/\/defenderbox.de\/en\/product\/\">Detection<\/a> introduce permanent or at least regular monitoring and have an appropriate concept in place for emergencies.<\/p>\n\n<p>How can you protect yourself as an SME without investing huge sums of money? Use the <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a>to check the security of your IT infrastructure. Our \"Find &amp; Fix\" introductory offer gives you the opportunity to identify vulnerabilities and security gaps. The corresponding reports and evaluations after weekly or monthly pentests contain recommendations for action to protect your network from hacker attacks.\u00a0<\/p>\n\n<p><a href=\"https:\/\/defenderbox.de\/en\/contact\/\">Contact us<\/a> us or book one directly <a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\">Test installation<\/a>. Your existence is at stake.<\/p>\n\n<div class=\"wp-block-button has-custom-font-size is-style-fill is-layout-flex wp-block-buttons-is-layout-flex\" style=\"font-size: 15px;\">\u00a0<\/div>\n<ul class=\"wp-block-latest-posts__list has-dates wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/defenderbox.de\/en\/it-ot\/\">When the IT network meets production<\/a><time datetime=\"2026-04-23T10:00:00+02:00\" class=\"wp-block-latest-posts__post-date\">April 23, 2026<\/time><div class=\"wp-block-latest-posts__post-excerpt\">As IT departments strengthen their firewalls, interconnected production facilities (OT) often remain blind spots \u2013 with fatal consequences. We show how attackers can infiltrate specifically through the connection from office IT to machine controls and why purely software-based protection is no longer sufficient here. <\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/defenderbox.de\/en\/iso27001\/\">ISO 27001 Certification<\/a><time datetime=\"2026-04-16T09:00:00+02:00\" class=\"wp-block-latest-posts__post-date\">April 16, 2026<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Security should no longer be just a promise, but become visible, measurable, and verifiable. We are starting our ISO 27001 certification.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/defenderbox.de\/en\/zero-trust\/\">Zero Trust in Practice<\/a><time datetime=\"2026-04-09T09:30:00+02:00\" class=\"wp-block-latest-posts__post-date\">April 9, 2026<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Zero Trust is more than just a buzzword \u2013 it's a central component of modern IT security concepts. Learn how to effectively protect your systems with continuous pentesting, clear IT security policies, and an intelligent cybersecurity strategy.<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/defenderbox.de\/en\/partnerschaft-radiflow\/\">Partnership with Radiflow<\/a><time datetime=\"2026-03-31T10:00:00+02:00\" class=\"wp-block-latest-posts__post-date\">March 31, 2026<\/time><div class=\"wp-block-latest-posts__post-excerpt\">DEFENDERBOX partners with Radiflow \u2013 this means more OT protection for industry &amp; production!<\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/defenderbox.de\/en\/schwachstellen-scanner\/\">Why traditional vulnerability scanners are no longer sufficient<\/a><time datetime=\"2026-03-26T11:30:00+01:00\" class=\"wp-block-latest-posts__post-date\">March 26, 2026<\/time><div class=\"wp-block-latest-posts__post-excerpt\">Many companies still rely on traditional vulnerability management tools, overlooking real attack risks. In this article, we'll show you why automated pentesting with DEFENDERBOX makes a crucial difference and how you can elevate your cybersecurity to a new level.<\/div><\/li>\n<\/ul><\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>What is the threat of a successful hacker attack? Often operational inability to act for days, weeks or months...<\/p>","protected":false},"author":3,"featured_media":7036,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[33,29],"tags":[41,39,38,40,37,36],"class_list":["post-7034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche","category-netzwerksicherheit-mit-defenderbox","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zukunftsfaktor Cybersecurity - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/cybersecurity-as-a-factor-for-the-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zukunftsfaktor Cybersecurity - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/cybersecurity-as-a-factor-for-the-future\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-02T08:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T08:39:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/crime-1862312_1920.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"855\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Zukunftsfaktor Cybersecurity\",\"datePublished\":\"2024-04-02T08:10:00+00:00\",\"dateModified\":\"2025-08-14T08:39:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/\"},\"wordCount\":260,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/crime-1862312_1920.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"Branche\",\"Netzwerksicherheit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/\",\"name\":\"Zukunftsfaktor Cybersecurity - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/crime-1862312_1920.png\",\"datePublished\":\"2024-04-02T08:10:00+00:00\",\"dateModified\":\"2025-08-14T08:39:26+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/crime-1862312_1920.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/crime-1862312_1920.png\",\"width\":1280,\"height\":855,\"caption\":\"Cybersicherheit wird immer wichtiger, dennoch m\u00f6chten einige das Problem nicht wahrhaben.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/zukunftsfaktor-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zukunftsfaktor Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity as a factor for the future - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/cybersecurity-as-a-factor-for-the-future\/","og_locale":"en_US","og_type":"article","og_title":"Zukunftsfaktor Cybersecurity - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/cybersecurity-as-a-factor-for-the-future\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2024-04-02T08:10:00+00:00","article_modified_time":"2025-08-14T08:39:26+00:00","og_image":[{"width":1280,"height":855,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/crime-1862312_1920.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Zukunftsfaktor Cybersecurity","datePublished":"2024-04-02T08:10:00+00:00","dateModified":"2025-08-14T08:39:26+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/"},"wordCount":260,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/crime-1862312_1920.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["Branche","Netzwerksicherheit"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/","url":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/","name":"Cybersecurity as a factor for the future - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/crime-1862312_1920.png","datePublished":"2024-04-02T08:10:00+00:00","dateModified":"2025-08-14T08:39:26+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/crime-1862312_1920.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/04\/crime-1862312_1920.png","width":1280,"height":855,"caption":"Cybersicherheit wird immer wichtiger, dennoch m\u00f6chten einige das Problem nicht wahrhaben."},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/zukunftsfaktor-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Zukunftsfaktor Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/7034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=7034"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/7034\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/7036"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=7034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=7034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=7034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}