{"id":4249,"date":"2020-04-15T16:29:33","date_gmt":"2020-04-15T15:29:33","guid":{"rendered":"https:\/\/www.voelkl-partners.at\/cyber-security-response-team-cert\/"},"modified":"2023-06-20T05:34:18","modified_gmt":"2023-06-20T04:34:18","slug":"cyber-security-response-team-cert","status":"publish","type":"post","link":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/","title":{"rendered":"Cyber Security Response Team (CERT)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4249\" class=\"elementor elementor-4249 elementor-475\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-704682f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"704682f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-126c1a5\" data-id=\"126c1a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37a9d438 elementor-widget elementor-widget-heading\" data-id=\"37a9d438\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Security Response Team (CERT)<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a510bac elementor-widget elementor-widget-text-editor\" data-id=\"4a510bac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber crime has become one of the biggest risks for businesses. New cases of extortion become known almost daily, often involving demands for sums in the millions and the threat of far greater damage for those affected.<\/p>\n<p>Business managers are obliged to adequately protect the company against such risks and to prepare for emergencies.<\/p>\n<p>Then decisions must be made immediately, e.g.: Is the IT recoverable? Does the company pay ransom and is that allowed? What are the obligations towards third parties (insurers, capital market, data protection authority)? What are the liability risks and how can they be limited?<\/p>\n<p>Such crisis situations require specific know-how and a well-coordinated team that, together with the affected parties, enables the systems to be cleaned up, the business processes to be restored and the damage to be limited under the greatest possible time pressure. At the same time, management decisions must be legally supported, sound and well documented to avoid personal liability risks.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-70ce5f75 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"70ce5f75\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c0a6241\" data-id=\"6c0a6241\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64854f9e elementor-widget elementor-widget-heading\" data-id=\"64854f9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What does management need to do?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6125916b elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6125916b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ensure physical security - securing office space, servers, storage media, network components, and access points.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Managing IT properly - are all IT systems in use in the company known at all and are they maintained according to requirements?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Logically secure systems - access control, 2-factor authentication, introduction of a need-to-know principle, encryption of data carriers<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Secure networks and communication channels -Network segmentation, malicious email filtering, and Internet communication monitoring.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Set personnel measures - awareness and security training, guidelines and directives for employees on the secure handling of information and IT<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Monitor IT systems - Implement the appropriate tools and use them correctly<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Create backups and plan for system failure - Requirement-based backups reduce the risk of data loss due to failure, theft, or encryption Trojans<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Business continuity management - Ensuring business continuity even in the event of system or service failure<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Consider security as early as the design stage of new systems and programs<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Have a contingency plan - together with external specialists, put together an internal cyber response team - usually consisting of management, CISO, internal IT, external IT security specialist, internal and external legal, internal and external communications, finance, auditor.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Set legal measures to minimize risk - e.g., cyber risk insurance, liability and risk-minimizing provisions in supply contracts.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b971889 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b971889\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f2acdbd\" data-id=\"f2acdbd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-038a282 elementor-widget elementor-widget-heading\" data-id=\"038a282\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How we can support you:\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffdb19b elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ffdb19b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Definition of internal company procedures, escalation and decision-making processes, risk-consequence assessments, review of insurance contracts, labor law and the other legal corporate environment<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Independent safety review to measure safety levels<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Penetration tests to simulate hacker attacks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Secure conceptual design of IT infrastructures and applications<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">IT manuals and organizational guidelines tailored to the company's risk situation<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Awareness training for all employees or technical training for IT managers, administrators and software developers<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Support in the implementation of security processes and policies<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Consulting in the area of failure safety and business continuity management<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9ea7e22 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9ea7e22\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1295936\" data-id=\"1295936\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e86e8d1 elementor-widget elementor-widget-text-editor\" data-id=\"e86e8d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the event of an emergency, your <strong>Cyber Emergency Response Team<\/strong> from <strong>V\u00f6lkl <\/strong>and <strong>Certitude<\/strong> is at your disposal, already familiar with the framework conditions and key people in the company:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53ccf23 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"53ccf23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Deployment of the Cyber Emergency Response Team together with your already defined key functionaries<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Assessment of the risk situation technically and legally<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Advising the management and the supervisory board<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implementation of legal measures, e.g. insurance law obligations, information of the organs, ...<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Development of solution strategies<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Immediate mitigating measures<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Coordinate and assist with IT cleanup and recovery.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-caret-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Advice on reporting obligations (data protection, capital market, contractual partners, ...), support with further measures, e.g. vis-\u00e0-vis authorities<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7850fcc elementor-widget elementor-widget-text-editor\" data-id=\"7850fcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><main id=\"page-main\"><\/p>\n<p>After the crisis, we advise you on the adaptation of your IT security concept to meet requirements, negotiations with contractual partners, assertion of recourse claims, etc. Our prevention work minimizes the risk of successful cyber attacks. In a crisis, you have reliable contacts who support you in protecting the company against damages and also the management against personal liability risks.<\/p>\n<p><\/main><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a35443e elementor-widget elementor-widget-text-editor\" data-id=\"a35443e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Voelkl Rechtsanwaelte on April 15, 2020<\/em><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-77caa90 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"77caa90\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-55870cb\" data-id=\"55870cb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5610b9d elementor-widget elementor-widget-image\" data-id=\"5610b9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"424\" src=\"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-768x424.jpg\" class=\"attachment-medium_large size-medium_large wp-image-3845\" alt=\"\" srcset=\"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-768x424.jpg 768w, https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-300x166.jpg 300w, https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-1024x566.jpg 1024w, https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-1536x848.jpg 1536w, https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-2048x1131.jpg 2048w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber crime has become one of the biggest risks for businesses. New cases of extortion become known almost daily, often involving demands for sums in the millions and the threat of far greater damage for those affected. Business managers are obliged to adequately protect the company against such risks and to prepare for emergencies. Then&hellip;&nbsp;<\/p>\n","protected":false},"author":2,"featured_media":3845,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","neve_meta_reading_time":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-4249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-unkategorisiert"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security Response Team (CERT) - V\u00f6lkl Rechtsanw\u00e4lte<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Response Team (CERT) - V\u00f6lkl Rechtsanw\u00e4lte\" \/>\n<meta property=\"og:description\" content=\"Cyber crime has become one of the biggest risks for businesses. New cases of extortion become known almost daily, often involving demands for sums in the millions and the threat of far greater damage for those affected. Business managers are obliged to adequately protect the company against such risks and to prepare for emergencies. Then&hellip;&nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/\" \/>\n<meta property=\"og:site_name\" content=\"V\u00f6lkl Rechtsanw\u00e4lte\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-15T15:29:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-20T04:34:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefanie Unger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefanie Unger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/\"},\"author\":{\"name\":\"Stefanie Unger\",\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/#\\\/schema\\\/person\\\/9ef8a37fb17032cd96e1e79d5d325bfe\"},\"headline\":\"Cyber Security Response Team (CERT)\",\"datePublished\":\"2020-04-15T15:29:33+00:00\",\"dateModified\":\"2023-06-20T04:34:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/\"},\"wordCount\":649,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.voelkl-partners.at\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Cyber-Security-scaled.jpg\",\"articleSection\":[\"Unkategorisiert\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/\",\"url\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/\",\"name\":\"Cyber Security Response Team (CERT) - V\u00f6lkl Rechtsanw\u00e4lte\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.voelkl-partners.at\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Cyber-Security-scaled.jpg\",\"datePublished\":\"2020-04-15T15:29:33+00:00\",\"dateModified\":\"2023-06-20T04:34:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.voelkl-partners.at\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Cyber-Security-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.voelkl-partners.at\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Cyber-Security-scaled.jpg\",\"width\":2560,\"height\":1414},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/cyber-security-response-team-cert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Response Team (CERT)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/\",\"name\":\"V\u00f6lkl Rechtsanw\u00e4lte\",\"description\":\"Wir unterst\u00fctzen Sie in allen wirtschaftsrechtlichen Belangen!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/#organization\",\"name\":\"V\u00f6lkl Rechtsanw\u00e4lte\",\"url\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.voelkl-partners.at\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/voelkl_logo_rgb_300dpi_neg.png\",\"contentUrl\":\"https:\\\/\\\/www.voelkl-partners.at\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/voelkl_logo_rgb_300dpi_neg.png\",\"width\":3695,\"height\":1500,\"caption\":\"V\u00f6lkl Rechtsanw\u00e4lte\"},\"image\":{\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/#\\\/schema\\\/person\\\/9ef8a37fb17032cd96e1e79d5d325bfe\",\"name\":\"Stefanie Unger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/11beec9e74331c712ae10e46c8c5680a4f5effba10c35e8a78d289a8afd7ab8a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/11beec9e74331c712ae10e46c8c5680a4f5effba10c35e8a78d289a8afd7ab8a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/11beec9e74331c712ae10e46c8c5680a4f5effba10c35e8a78d289a8afd7ab8a?s=96&d=mm&r=g\",\"caption\":\"Stefanie Unger\"},\"url\":\"https:\\\/\\\/www.voelkl-partners.at\\\/en\\\/author\\\/stefanie-unger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Response Team (CERT) - V\u00f6lkl Rechtsanw\u00e4lte","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Response Team (CERT) - V\u00f6lkl Rechtsanw\u00e4lte","og_description":"Cyber crime has become one of the biggest risks for businesses. New cases of extortion become known almost daily, often involving demands for sums in the millions and the threat of far greater damage for those affected. Business managers are obliged to adequately protect the company against such risks and to prepare for emergencies. Then&hellip;&nbsp;","og_url":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/","og_site_name":"V\u00f6lkl Rechtsanw\u00e4lte","article_published_time":"2020-04-15T15:29:33+00:00","article_modified_time":"2023-06-20T04:34:18+00:00","og_image":[{"width":2560,"height":1414,"url":"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-scaled.jpg","type":"image\/jpeg"}],"author":"Stefanie Unger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Stefanie Unger","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/#article","isPartOf":{"@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/"},"author":{"name":"Stefanie Unger","@id":"https:\/\/www.voelkl-partners.at\/en\/#\/schema\/person\/9ef8a37fb17032cd96e1e79d5d325bfe"},"headline":"Cyber Security Response Team (CERT)","datePublished":"2020-04-15T15:29:33+00:00","dateModified":"2023-06-20T04:34:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/"},"wordCount":649,"commentCount":0,"publisher":{"@id":"https:\/\/www.voelkl-partners.at\/en\/#organization"},"image":{"@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/#primaryimage"},"thumbnailUrl":"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-scaled.jpg","articleSection":["Unkategorisiert"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/","url":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/","name":"Cyber Security Response Team (CERT) - V\u00f6lkl Rechtsanw\u00e4lte","isPartOf":{"@id":"https:\/\/www.voelkl-partners.at\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/#primaryimage"},"image":{"@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/#primaryimage"},"thumbnailUrl":"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-scaled.jpg","datePublished":"2020-04-15T15:29:33+00:00","dateModified":"2023-06-20T04:34:18+00:00","breadcrumb":{"@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/#primaryimage","url":"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-scaled.jpg","contentUrl":"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2020\/04\/Cyber-Security-scaled.jpg","width":2560,"height":1414},{"@type":"BreadcrumbList","@id":"https:\/\/www.voelkl-partners.at\/en\/cyber-security-response-team-cert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.voelkl-partners.at\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Response Team (CERT)"}]},{"@type":"WebSite","@id":"https:\/\/www.voelkl-partners.at\/en\/#website","url":"https:\/\/www.voelkl-partners.at\/en\/","name":"V\u00f6lkl Rechtsanw\u00e4lte","description":"Wir unterst\u00fctzen Sie in allen wirtschaftsrechtlichen Belangen!","publisher":{"@id":"https:\/\/www.voelkl-partners.at\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.voelkl-partners.at\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.voelkl-partners.at\/en\/#organization","name":"V\u00f6lkl Rechtsanw\u00e4lte","url":"https:\/\/www.voelkl-partners.at\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.voelkl-partners.at\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2022\/08\/voelkl_logo_rgb_300dpi_neg.png","contentUrl":"https:\/\/www.voelkl-partners.at\/wp-content\/uploads\/2022\/08\/voelkl_logo_rgb_300dpi_neg.png","width":3695,"height":1500,"caption":"V\u00f6lkl Rechtsanw\u00e4lte"},"image":{"@id":"https:\/\/www.voelkl-partners.at\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.voelkl-partners.at\/en\/#\/schema\/person\/9ef8a37fb17032cd96e1e79d5d325bfe","name":"Stefanie Unger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/11beec9e74331c712ae10e46c8c5680a4f5effba10c35e8a78d289a8afd7ab8a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/11beec9e74331c712ae10e46c8c5680a4f5effba10c35e8a78d289a8afd7ab8a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11beec9e74331c712ae10e46c8c5680a4f5effba10c35e8a78d289a8afd7ab8a?s=96&d=mm&r=g","caption":"Stefanie Unger"},"url":"https:\/\/www.voelkl-partners.at\/en\/author\/stefanie-unger\/"}]}},"_links":{"self":[{"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/posts\/4249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/comments?post=4249"}],"version-history":[{"count":1,"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/posts\/4249\/revisions"}],"predecessor-version":[{"id":4250,"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/posts\/4249\/revisions\/4250"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/media\/3845"}],"wp:attachment":[{"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/media?parent=4249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/categories?post=4249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.voelkl-partners.at\/en\/wp-json\/wp\/v2\/tags?post=4249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}