{"id":70274,"date":"2021-10-04T15:24:48","modified":"2024-04-17T16:34:36","slug":"iot-security","status":"publish","type":"post","link":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/","title":{"rendered":"IoT Security"},"content":{"rendered":"        <div\n            id=\"block_e95c8c66dee17cfa364bd1eb8b168f82\"\n            class=\"acf-block is-edit is-category-text\"\n            data-highlight=\"https:\/\/www.tele-online.com\/news\/iot-sicherheit\/#highlightblock=block_e95c8c66dee17cfa364bd1eb8b168f82\"\n            data-block=\"textblock\"\n        >\n                            <h2 class=\"acf-block-title\">\n                    <svg  xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  width=\"24\"  height=\"24\"  viewBox=\"0 0 24 24\"  fill=\"none\"  stroke=\"currentColor\"  stroke-width=\"2\"  stroke-linecap=\"round\"  stroke-linejoin=\"round\"  class=\"icon icon-tabler icons-tabler-outline icon-tabler-align-left\"><path stroke=\"none\" d=\"M0 0h24v24H0z\" fill=\"none\"\/><path d=\"M4 6l16 0\" \/><path d=\"M4 12l10 0\" \/><path d=\"M4 18l14 0\" \/><\/svg>                    <span class=\"name\">Textblock <\/span>\n                <\/h2>\n\n                                    <\/div>\n    ","protected":false},"excerpt":{"rendered":"","protected":false},"author":48,"featured_media":70266,"sticky":false,"template":"","format":"standard","categories":[7487,177],"tags":[7436,1090],"acf":{"footer_link_block":false,"webblocks":[{"acf_fc_layout":"textblock","acf_fc_id":"acf-block-69a23cb5649ee","acf_fc_style":"","flexible":false,"text":"<h2>Why IoT security is so important<\/h2>\n<p>Most of the information used in IoT products is not located behind thick firewalls on protected company servers or databases, but on the Internet. This is why the topic of IT or IoT security is so important. The risk and impact of security breaches can be fatal. Weak security handling not only causes costs, but can also result in massive image losses.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3>The flow of information<\/h3>\n<p>Before we get into the topic, let&#8217;s briefly look at the flow of information in IoT products. The information here is usually generated based on a sensor or through a user interaction. The data is then stored and transmitted to the Internet via a mobile network, for example. Here, it is stored in a cloud and transferred to a smartphone app as needed. The reverse direction is also possible. At every point in this process, the information must be protected.<\/p>\n<p>&nbsp;<\/p>\n<h3>The goal of IT or IoT security<\/h3>\n<p>IoT security therefore means protecting the information used by users in the products or in the business processes. In IT security in general, the most important three protection goals are referred to as the protection triad and also apply to IoT systems.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li>\n<h3><strong> Vertraulichkeit<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>The first dimension of the protection triad is confidentiality. Information must be protected from unauthorised access and must never end up in the hands of the wrong people. Typical mechanisms to prevent this is the encryption of information. With IoT devices, the information is encrypted on the device so that the information can be &#8220;overheard&#8221; during transmission, but the information is not understood. Decryption only takes place at the other end of the transmission chain, e.g. in the cloud. Only at the end of the chain (e.g.: in the cloud interface) is the information decrypted and clearly readable. This is also referred to as end-to-end encryption or security.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li>\n<h3><strong> Integrity<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>The second dimension is integrity. Ensuring integrity means that it must not be possible to change information. In the case of IoT products, for example, this concerns information transmitted the distance from the product to the mobile app. The physical nature of \u00a0radio connections or the transmission of information via cables can underlie interference from external influences, so that changes to the information can occur during transmission. A known mechanism to prevent this and to correct it if necessary is, for example: Checksums. Here, the sum of the information is compared before it is sent and after it is received. If they are different, something has been changed. Another mechanism is the use of signatures for example with software which has to be installed on the device.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>\n<h3><strong> Availabilty<\/strong><\/h3>\n<\/li>\n<\/ol>\n<p>The third dimension of information security is availability. This means that &#8220;the system&#8221;, in our case all components of the IoT system, should be available at all times and information should be retrievable. The availability is specified as the ratio between the time in which the system was actually available and the agreed time in which the system should be available.\u00a0 These values are usually contractually defined as a service level agreement. 100% availability is, for example, difficult and &#8220;expensive&#8221; to achieve in mobile networks. It is therefore important, especially with IoT products, to consider which functions and mechanisms must still function without a mobile network.<\/p>\n<p>&nbsp;<\/p>\n<h3>Human risk factor<\/h3>\n<p>However, IT security must not only take technical aspects into account. The greatest danger comes from people. The company cleaner who cleans the cloud-computer from dust or the angry employee who did not take away the access data to the company network can cause massive problems and costs. IT and IoT security is largely an organisational and process issue. Furthermore security is not a one-off task. As reports in the media show, security gaps are constantly being discovered. Security needs to be monitored and improved upon on an ongoing basis. Last but not least, the IoT systems have to have the possibility to automatically update the \u201cunsecure\u201d software with for example over the air updates.<\/p>\n<p>So security is a sensitive topic that costs a lot of money and nerves. But ignoring the topic becomes even more expensive. That&#8217;s why we at TELE in IoT rely on competent IoT partners who offer managed security.<\/p>\n<p>More Information about IoT Security:\u00a0<a href=\"https:\/\/iot.microtronics.com\/security-whitepaper\" target=\"_blank\" rel=\"noopener\">https:\/\/iot.microtronics.com\/security-whitepaper<\/a><\/p>\n","id":"","linie_oben_einblenden":false,"linie_unten_einblenden":false,"container":"normal","hintergrund":"weis","box":false,"abstand_oben":"","abstand_unten":""}],"seo":[{"googleAuthor":"","googlePublisher":"","schemaName":"","schemaDescription":"","schemaImage":false}],"news_title":"IoT Security","news_image":false,"news_max_hohe":"70vh","news_teaser":"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important.","news_standardlayout_hinzufugen":"ja","news_mitarbeiter_headline":"","news_mitarbeiter_text":"","type":"automatisch","news_mitarbeiter":false,"footer":{"footer_headline_powerd_by":"Powered By TELE","footer_text_powered_by":"","footer_logos":null,"footer_mylayout_logos":"normal","footer_text_oben":"<p><strong>TELE Haase Steuerger\u00e4te Ges.m.b.H.<\/strong> | Vorarlberger Allee 38 (direct access via Slamastra\u00dfe 37), 1230 Vienna | Austria<\/p>\n<p><strong>Opening Hours<\/strong>: Monday-Thursday 08:00 a.m. to 04:00 p.m. &amp; Friday 08:00 a.m. to 01:00 p.m.<\/p>\n<p><strong><a href=\"https:\/\/www.tele-online.com\/en\/contact\/\">Contact Details<\/a><\/strong><\/p>\n","footer_headline_social_media":"","footer_social_media":[{"icon":"<i class=\"icon-facebook\"><\/i>","link":"https:\/\/www.facebook.com\/TELE-Haase-Steuerger%C3%A4te-GesmbH-212293998940265\/?rf=195551397135836"},{"icon":"<i class=\"icon-linkedin\"><\/i>","link":"https:\/\/www.linkedin.com\/company\/tele-worldwide\/"},{"icon":"<i class=\"icon-youtube\"><\/i>","link":"https:\/\/www.youtube.com\/user\/telehaase\/featured"},{"icon":"<i class=\"icon-instagram\"><\/i>","link":"https:\/\/www.instagram.com\/tele_haase\/"}]},"nav_data":{"link":"","text":""},"wpmlurl":{"de":"\/","en":"\/en\/","us":"\/us\/","fr":"\/fr\/","es":"\/es\/"}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IoT Security - Tele Haase<\/title>\n<meta name=\"description\" content=\"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT Security - Tele Haase\" \/>\n<meta property=\"og:description\" content=\"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Tele Haase\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-04T13:24:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-17T14:34:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"barbara.reininger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"barbara.reininger\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/\",\"url\":\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/\",\"name\":\"IoT Security - Tele Haase\",\"isPartOf\":{\"@id\":\"https:\/\/www.tele-online.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg\",\"datePublished\":\"2021-10-04T13:24:48+00:00\",\"dateModified\":\"2024-04-17T14:34:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.tele-online.com\/en\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0\"},\"description\":\"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#primaryimage\",\"url\":\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg\",\"contentUrl\":\"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg\",\"width\":2048,\"height\":1365,\"caption\":\"Internet of things (IoT) concept. Businessman offer IoT products and solutions. Abstract chip with text IoT connected with abstract devices represented by points.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.tele-online.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tele-online.com\/en\/#website\",\"url\":\"https:\/\/www.tele-online.com\/en\/\",\"name\":\"Tele Haase\",\"description\":\"Your Smart Factory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tele-online.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tele-online.com\/en\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0\",\"name\":\"barbara.reininger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.tele-online.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g\",\"caption\":\"barbara.reininger\"},\"url\":\"https:\/\/www.tele-online.com\/en\/author\/barbara-reininger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT Security - Tele Haase","description":"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/","og_locale":"en_GB","og_type":"article","og_title":"IoT Security - Tele Haase","og_description":"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important.","og_url":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/","og_site_name":"Tele Haase","article_published_time":"2021-10-04T13:24:48+00:00","article_modified_time":"2024-04-17T14:34:36+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","type":"image\/jpeg"}],"author":"barbara.reininger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"barbara.reininger"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/","url":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/","name":"IoT Security - Tele Haase","isPartOf":{"@id":"https:\/\/www.tele-online.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#primaryimage"},"image":{"@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","datePublished":"2021-10-04T13:24:48+00:00","dateModified":"2024-04-17T14:34:36+00:00","author":{"@id":"https:\/\/www.tele-online.com\/en\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0"},"description":"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important.","breadcrumb":{"@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tele-online.com\/en\/news\/iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#primaryimage","url":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","contentUrl":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","width":2048,"height":1365,"caption":"Internet of things (IoT) concept. Businessman offer IoT products and solutions. Abstract chip with text IoT connected with abstract devices represented by points."},{"@type":"BreadcrumbList","@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tele-online.com\/en\/"},{"@type":"ListItem","position":2,"name":"IoT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.tele-online.com\/en\/#website","url":"https:\/\/www.tele-online.com\/en\/","name":"Tele Haase","description":"Your Smart Factory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tele-online.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.tele-online.com\/en\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0","name":"barbara.reininger","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.tele-online.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g","caption":"barbara.reininger"},"url":"https:\/\/www.tele-online.com\/en\/author\/barbara-reininger\/"}]}},"yoast_data":{"yoast_wpseo_canonical":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/","yoast_wpseo_opengraph_image":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","yoast_wpseo_metadesc":"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important.","yoast_wpseo_meta_robots_noindex":"","yoast_wpseo_meta_robots_nofollow":""},"footer_links":null,"yoasttitle":"IoT Security - Tele Haase","yoast_title":"IoT Security - Tele Haase","yoast_meta":[{"name":"description","content":"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important."},{"name":"robots","content":"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1"},{"property":"og:locale","content":"en_GB"},{"property":"og:type","content":"article"},{"property":"og:title","content":"IoT Security - Tele Haase"},{"property":"og:description","content":"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important."},{"property":"og:url","content":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/"},{"property":"og:site_name","content":"Tele Haase"},{"property":"article:published_time","content":"2021-10-04T13:24:48+00:00"},{"property":"article:modified_time","content":"2024-04-17T14:34:36+00:00"},{"property":"og:image","content":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg"},{"property":"og:image:width","content":"2048"},{"property":"og:image:height","content":"1365"},{"property":"og:image:type","content":"image\/jpeg"},{"name":"author","content":"barbara.reininger"},{"name":"twitter:card","content":"summary_large_image"},{"name":"twitter:label1","content":"Written by"},{"name":"twitter:data1","content":"barbara.reininger"},{"name":"robots","content":"index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1"}],"yoast_json_ld":[{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/","url":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/","name":"IoT Security - Tele Haase","isPartOf":{"@id":"https:\/\/www.tele-online.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#primaryimage"},"image":{"@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","datePublished":"2021-10-04T13:24:48+00:00","dateModified":"2024-04-17T14:34:36+00:00","author":{"@id":"https:\/\/www.tele-online.com\/en\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0"},"description":"Most of the information in the IoT is on the Internet. That is why the topic of IT or IoT security is so important.","breadcrumb":{"@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tele-online.com\/en\/news\/iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#primaryimage","url":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","contentUrl":"https:\/\/www.tele-online.com\/wp-content\/uploads\/2021\/10\/IoT-Security-scaled.jpg","width":2048,"height":1365,"caption":"Internet of things (IoT) concept. Businessman offer IoT products and solutions. Abstract chip with text IoT connected with abstract devices represented by points."},{"@type":"BreadcrumbList","@id":"https:\/\/www.tele-online.com\/en\/news\/iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tele-online.com\/en\/"},{"@type":"ListItem","position":2,"name":"IoT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.tele-online.com\/en\/#website","url":"https:\/\/www.tele-online.com\/en\/","name":"Tele Haase","description":"Your Smart Factory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tele-online.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.tele-online.com\/en\/#\/schema\/person\/b4ae272cd5e5bc1e2052e26149de1ac0","name":"barbara.reininger","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.tele-online.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/00f0cf5ff01431d666b84bb7bc267428?s=96&d=mm&r=g","caption":"barbara.reininger"},"url":"https:\/\/www.tele-online.com\/en\/author\/barbara-reininger\/"}]}],"_links":{"self":[{"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/posts\/70274"}],"collection":[{"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/comments?post=70274"}],"version-history":[{"count":6,"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/posts\/70274\/revisions"}],"predecessor-version":[{"id":756699,"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/posts\/70274\/revisions\/756699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/media\/70266"}],"wp:attachment":[{"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/media?parent=70274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/categories?post=70274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tele-online.com\/en\/wp-json\/wp\/v2\/tags?post=70274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}