{"id":9763,"date":"2024-05-16T09:21:24","date_gmt":"2024-05-16T07:21:24","guid":{"rendered":"https:\/\/defenderbox.de\/?p=9763"},"modified":"2025-08-13T19:16:03","modified_gmt":"2025-08-13T17:16:03","slug":"cyber-security-car-2","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/cybersicherheit-auto-2\/","title":{"rendered":"Production facilities targeted by cyber criminals"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"9763\" class=\"elementor elementor-9763\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4feff9 e-con-full e-flex e-con e-parent\" data-id=\"2d4feff9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61993960 elementor-widget elementor-widget-text-editor\" data-id=\"61993960\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">A production system must not fail under any circumstances!<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Not even by installing security updates. However, this often means that they are put on the back burner or not installed at all. But it is precisely because of this that companies risk a successful cyberattack and thus their availability.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Until a few years ago, cyber security for production facilities was still a marginal topic. The threats seemed too abstract and theoretical, so manufacturers didn't bother with them. This changed abruptly when several hacker attacks became known. These now also focused on automation systems and production facilities, which can ultimately result in high losses. In addition, production systems are increasingly networked (MDA) and therefore vulnerable to attack.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\">Prevent in good time<\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Increasing digital networking increases efficiency, but also the attack surface for cyber criminals. What can you as an industrial company do about this?<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph {\"style\":{\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|vivid-cyan-blue\"}}}},\"textColor\":\"vivid-cyan-blue\"} -->\n<p class=\"has-vivid-cyan-blue-color has-text-color has-link-color\">Make IT security a top priority!<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>The final responsibility for IT security should lie with the management. Otherwise, the IT manager will lack the necessary backing in an emergency. IT security objectives and responsibilities must be clearly and unambiguously defined in a security concept. This applies to both the office and production areas. Important: This is a \"living\" concept that is regularly reviewed, tested and updated.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Implement emergency management: A well thought-out IT emergency management system is essential in order to respond quickly to incidents The emergency plan defines both technical and organizational measures: for example, which incidents are to be reported to whom and who has to do what in the event of a cyber attack. You should also create restart plans and investigate the causes and evaluate the incident once operations have been restored.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Technical protective measures in production: Technical protective measures are particularly important in a production environment. To secure the machines and systems, you should divide the entire production IT network into separate security cells and protect each of these separately. Such well thought-out network segmentation prevents the entire production from being affected in the event of a hacker attack.\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Access protection and employee sensitization: Most IT security incidents are still caused by employees. It is therefore essential that you ensure meticulous authorization and password management and secure all access and interfaces. All users should only have the rights they absolutely need.\u00a0<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Control remote maintenance: External access to production IT is a critical process. All remote maintenance access should therefore be technically and organizationally secured (e.g. with regular checks by an external, proactive security tool). Access should only take place via secure connections (VPN) and protocols. Avoid access to larger network areas and only allow targeted access to selected components within fixed time windows.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:paragraph -->\n<p>\u00a0<\/p>\n<p>The threat situation in the area of cybercrime particularly affects machine and plant manufacturers due to increasing networking. Companies should invest in their IT\/OT security on an ongoing basis wherever possible - and comprehensively safeguard against residual risks.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Our proactive security tools <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> scans and pentests all detectable devices in your IT infrastructure, including production systems and VPN access, to identify any security gaps and vulnerabilities.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>What does IT security look like at your production facilities? <strong><a href=\"https:\/\/defenderbox.de\/en\/test-installation\/\">Use our test installation and find out!<\/a><\/strong><\/p>\n<!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>A production system must not fail under any circumstances - not even when security updates are installed. This often means that they are put on the back burner or not installed at all. But this is precisely what puts companies at risk of a successful cyberattack.<\/p>","protected":false},"author":3,"featured_media":9765,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29],"tags":[41,39,38,40,49,37,36],"class_list":["post-9763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-netzwerksicherheit-mit-defenderbox","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-industrie-4-0","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Produktionsanlagen im Visier von Cyberkriminellen - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/cyber-security-car-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Produktionsanlagen im Visier von Cyberkriminellen - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/cyber-security-car-2\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-16T07:21:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T17:16:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/web-2496193_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Produktionsanlagen im Visier von Cyberkriminellen\",\"datePublished\":\"2024-05-16T07:21:24+00:00\",\"dateModified\":\"2025-08-13T17:16:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/\"},\"wordCount\":534,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/web-2496193_1280.jpg\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Industrie 4.0\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"Netzwerksicherheit\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/\",\"name\":\"Produktionsanlagen im Visier von Cyberkriminellen - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/web-2496193_1280.jpg\",\"datePublished\":\"2024-05-16T07:21:24+00:00\",\"dateModified\":\"2025-08-13T17:16:03+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/web-2496193_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/web-2496193_1280.jpg\",\"width\":1280,\"height\":853,\"caption\":\"Auch Produktionsanlagen stehen im Visier von Cyberkriminellen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/cybersicherheit-auto-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produktionsanlagen im Visier von Cyberkriminellen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Production facilities targeted by cyber criminals - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/cyber-security-car-2\/","og_locale":"en_US","og_type":"article","og_title":"Produktionsanlagen im Visier von Cyberkriminellen - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/cyber-security-car-2\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2024-05-16T07:21:24+00:00","article_modified_time":"2025-08-13T17:16:03+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/web-2496193_1280.jpg","type":"image\/jpeg"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Produktionsanlagen im Visier von Cyberkriminellen","datePublished":"2024-05-16T07:21:24+00:00","dateModified":"2025-08-13T17:16:03+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/"},"wordCount":534,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/web-2496193_1280.jpg","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Industrie 4.0","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["Netzwerksicherheit"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/","url":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/","name":"Production facilities targeted by cyber criminals - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/web-2496193_1280.jpg","datePublished":"2024-05-16T07:21:24+00:00","dateModified":"2025-08-13T17:16:03+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/cybersicherheit-auto-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/web-2496193_1280.jpg","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/05\/web-2496193_1280.jpg","width":1280,"height":853,"caption":"Auch Produktionsanlagen stehen im Visier von Cyberkriminellen."},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/cybersicherheit-auto-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Produktionsanlagen im Visier von Cyberkriminellen"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/9763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=9763"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/9763\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/9765"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=9763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=9763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=9763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}