{"id":21,"count":67,"description":"Sensible Unternehmensdaten, auch in SAP-Systemen, sind ein attraktives Angriffsziel f\u00fcr Hacker.\u00a0 Wie k\u00f6nnen sich Unternehmen am wirksamsten vor den neuesten Methoden der Cyberkriminellen sch\u00fctzen?","link":"https:\/\/e3magpmp.greatsolution.dev\/de\/category\/meinung\/it-security\/","name":"IT-Security Kolumne","slug":"it-security","taxonomy":"category","parent":7,"meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/de\/wp-json\/wp\/v2\/categories\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/de\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/de\/wp-json\/wp\/v2\/taxonomies\/category"}],"up":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/de\/wp-json\/wp\/v2\/categories\/7"}],"wp:post_type":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/de\/wp-json\/wp\/v2\/posts?categories=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}