{"id":1898,"date":"2017-05-08T15:51:30","date_gmt":"2017-05-08T13:51:30","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=1898"},"modified":"2017-05-08T15:51:30","modified_gmt":"2017-05-08T13:51:30","slug":"identitaeten-klau-durch-phishing-eine-checkliste","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/en\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/","title":{"rendered":"Identity theft through phishing - a checklist"},"content":{"rendered":"<figure id=\"attachment_1899\" aria-describedby=\"caption-attachment-1899\" style=\"width: 564px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1899\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png\" alt=\"\" width=\"564\" height=\"443\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png 564w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg-16x12.png 16w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg-223x175.png 223w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg-446x350.png 446w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg-300x236.png 300w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" \/><figcaption id=\"caption-attachment-1899\" class=\"wp-caption-text\">Attention Fake: about tax refunds the tax administration would only inform by mail \u00a9 MELANI<\/figcaption><\/figure>\n<p>According to the Reporting and Analysis Center for Information Security (MELANIE), there have never been as many phishing e-mails or identity thefts as in 2017. However, cyber criminals are using increasingly perfidious methods to harm private consumers and companies. For example, they pose as tax or government officials in order to obtain sensitive data.<\/p>\n<p>A \"brazen\" e-mail purporting to come from the Federal Tax Administration recently made the rounds. The scammers wrote something about a fictitious tax refund and asked recipients to fill out an attached document. When the file was opened, malware was automatically installed - both on Windows computers and on Macs! Of course, there was no tax refund.<\/p>\n<p><strong>Swiss addresses in our sights <\/strong><\/p>\n<p>In February, a mail - at first glance from Swisscom - was circulating in which cyber criminals used a similar tactic. The fake bill was marked with the button \"View bill\", which referred to a prepared website. On this website, the victims were subsequently infected with malware.<\/p>\n<p>According to MELANI, invitations to court hearings or messages from the cantonal police are also used as bait. \"The aim of the attackers is to take the user by surprise, arouse his curiosity or scare him, in order to then tempt him into an ill-considered action,\" the federal agency said.<\/p>\n<p><strong>Checklist against viruses, worms and Trojan horses<\/strong><\/p>\n<p>E-mail is one of the most popular means of communication. How to protect yourself when it comes to e-mailing and what affected companies should do can be answered by means of this checklist. However, most electronic malware gets onto your computer via e-mail attachments. Careful handling of e-mails contributes significantly to the security of your data and your computer.<\/p>\n<p><strong>The following measures protect you against viruses, worms, Trojan horses, spam and hoaxes:<\/strong><\/p>\n<p><em><strong>Beware of e-mails with unknown sender<\/strong><\/em><\/p>\n<p><em>Do not trust e-mails whose sender's address you do not know. In this case, do not open any attached documents or programs and do not select any links specified in them.<\/em><\/p>\n<p><em><strong>Pay attention to the trustworthiness of the sources<\/strong><\/em><\/p>\n<p><em>Only open files or programs from trusted sources and only after first checking them with up-to-date antivirus software.<\/em><\/p>\n<p><em><strong>Be careful with file names with two endings<\/strong><\/em><\/p>\n<p><em>Do not open email attachments that have two extensions (e.g. picture.bmp.vbs). Do not be fooled by the icon of such a file. In Windows Explorer, deactivate the option \"Hide extensions for known file types\" or \"Hide file extensions for known file types\".<\/em><\/p>\n<p><em><strong>Software update of the e-mail program<\/strong><\/em><\/p>\n<p><em>E-mail programs can also have security vulnerabilities. Regularly check whether there is a software update for your e-mail program and install it.<\/em><\/p>\n<p><strong><em>Do not reply to spam<\/em> <\/strong><\/p>\n<p>General: Maintain cautious use of email address. Share your email address with as few people as necessary and use it only for important correspondence.<\/p>\n<p><em><strong>Create a second e-mail address<\/strong><\/em><\/p>\n<p><em>For filling out web forms, subscribing to newsletters, entries in guest books, etc., it is recommended to use a second e-mail address. This can be requested free of charge from various providers. If this address is affected by spam, it can be deleted and replaced.<\/em><\/p>\n<p><em><strong>Careful, careful, careful ... <\/strong><\/em><\/p>\n<p><em>If spam is replied to, the sender knows that the email address is valid and will continue to send spam. Spam with an \"unsubscribe\" option should also be treated with caution. This promises that by sending an e-mail with certain content, you will be removed from the distribution list.<\/em><\/p>\n<p>In this context, automatic reply emails in case of vacation absence should also be considered. They should only be activated for known addresses.<\/p>\n<p><strong>Checklist of companies whose names have been misused as senders: <\/strong><\/p>\n<p>If your company name is misused for fraud e-mails, point out clearly on the home page that your company is misused as a sender for malware e-mails. Give customers your recommendation on how they should behave.<\/p>\n<ul>\n<li><em>Alert your customers to the fraud attempts by means of a regular newsletter or directly.<\/em><\/li>\n<li><em>Adhere to the following basic rules when communicating with customers via e-mail and communicate them to them:<\/em><\/li>\n<li><em>Use links sparingly in e-mails and link only to your own domain. If possible, use links to pages secured by encryption (https) and inform the recipient of this.<\/em><\/li>\n<li><em>Do not use hidden links, always make the links visible to the user.<\/em><\/li>\n<li><em>Do not link to websites that require username and password or other input.<\/em><\/li>\n<li><em>Address customers by first and last name, if this information is available.<\/em><\/li>\n<li><em>Sending important account information in writing by letter - especially in the financial sector<\/em>.<\/li>\n<\/ul>\n<p>(Source: MELANI, May 2017)<\/p>\n<p>&nbsp;<\/p>\n<p>If you have further specific questions about phising, please contact the Reporting and Analysis Center for Information Assurance MELANI directly - <a href=\"https:\/\/www.melani.admin.ch\/melani\/de\/home.html\">Site<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Gem\u00e4ss der Melde- und Analysestelle f\u00fcr Informationssicherheit (MELANIE) gab es noch nie so viele Phishing-Mails, respektive Identit\u00e4ten-Klaubereien wie 2017. Cyber-Kriminelle nutzen jedoch immer perfidere Methoden, um Privatverbrauchen und Unternehmen zu sch\u00e4digen. So geben sie sich etwa als Steuer- oder Beh\u00f6rdenvertreter aus, um an sensible Daten zu gelangen. Eine &#8222;dreiste&#8220; E-Mail, die angeblich von der Eidgen\u00f6ssischen [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1899,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Identit\u00e4ten-Klau","_yoast_wpseo_metadesc":"Beim Versuch, sensible Daten oder Identit\u00e4ten zu klauen oder Malware unter zu schieben, greifen Cyber-Kriminelle zu immer perfideren Tricks.","articlekey":"","footnotes":""},"categories":[27],"tags":[115,142,344,383],"class_list":["post-1898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-checklisten","tag-cyber-crime","tag-melani","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identit\u00e4ten-Klau durch Phishing - eine Checkliste - Organisator<\/title>\n<meta name=\"description\" content=\"Beim Versuch, sensible Daten oder Identit\u00e4ten zu klauen oder Malware unter zu schieben, greifen Cyber-Kriminelle zu immer perfideren Tricks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/en\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identit\u00e4ten-Klau durch Phishing - eine Checkliste - Organisator\" \/>\n<meta property=\"og:description\" content=\"Beim Versuch, sensible Daten oder Identit\u00e4ten zu klauen oder Malware unter zu schieben, greifen Cyber-Kriminelle zu immer perfideren Tricks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/en\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-08T13:51:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png\" \/>\n\t<meta property=\"og:image:width\" content=\"564\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"michael.merz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/\"},\"author\":{\"name\":\"michael.merz\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/134708ca9321c57b0362cceb7948ffbd\"},\"headline\":\"Identit\u00e4ten-Klau durch Phishing &#8211; eine Checkliste\",\"datePublished\":\"2017-05-08T13:51:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/\"},\"wordCount\":799,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png\",\"keywords\":[\"Checklisten\",\"Cyber-Crime\",\"MELANI\",\"Phishing\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/\",\"name\":\"Identit\u00e4ten-Klau durch Phishing - eine Checkliste - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png\",\"datePublished\":\"2017-05-08T13:51:30+00:00\",\"description\":\"Beim Versuch, sensible Daten oder Identit\u00e4ten zu klauen oder Malware unter zu schieben, greifen Cyber-Kriminelle zu immer perfideren Tricks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png\",\"width\":564,\"height\":443,\"caption\":\"Achtung Fake: \u00fcber Steuerr\u00fcckerstattungen w\u00fcrde die Steuerverwaltung nur per Post informieren \u00a9 MELANI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/management\\\/it\\\/2017-05-08\\\/identitaeten-klau-durch-phishing-eine-checkliste\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identit\u00e4ten-Klau durch Phishing &#8211; eine Checkliste\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/134708ca9321c57b0362cceb7948ffbd\",\"name\":\"michael.merz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"caption\":\"michael.merz\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/en\\\/author\\\/michael-merz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identity theft through phishing - a checklist - Organizer","description":"Cyber criminals are resorting to ever more perfidious tricks in their attempts to steal sensitive data or identities or to plant malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/en\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/","og_locale":"en_US","og_type":"article","og_title":"Identit\u00e4ten-Klau durch Phishing - eine Checkliste - Organisator","og_description":"Beim Versuch, sensible Daten oder Identit\u00e4ten zu klauen oder Malware unter zu schieben, greifen Cyber-Kriminelle zu immer perfideren Tricks.","og_url":"https:\/\/www.organisator.ch\/en\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2017-05-08T13:51:30+00:00","og_image":[{"width":564,"height":443,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png","type":"image\/png"}],"author":"michael.merz","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/"},"author":{"name":"michael.merz","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/134708ca9321c57b0362cceb7948ffbd"},"headline":"Identit\u00e4ten-Klau durch Phishing &#8211; eine Checkliste","datePublished":"2017-05-08T13:51:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/"},"wordCount":799,"commentCount":0,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png","keywords":["Checklisten","Cyber-Crime","MELANI","Phishing"],"articleSection":["IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/","url":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/","name":"Identity theft through phishing - a checklist - Organizer","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png","datePublished":"2017-05-08T13:51:30+00:00","description":"Cyber criminals are resorting to ever more perfidious tricks in their attempts to steal sensitive data or identities or to plant malware.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2017\/05\/Identitaeten-Klau-durch-Phishing-org-organisator.jpg.png","width":564,"height":443,"caption":"Achtung Fake: \u00fcber Steuerr\u00fcckerstattungen w\u00fcrde die Steuerverwaltung nur per Post informieren \u00a9 MELANI"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/management\/it\/2017-05-08\/identitaeten-klau-durch-phishing-eine-checkliste\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Identit\u00e4ten-Klau durch Phishing &#8211; eine Checkliste"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organizer","description":"Competent. Practical. In 10 issues per year, ORGANISATOR presents the essential topics for managers of SMEs.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organizer","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/134708ca9321c57b0362cceb7948ffbd","name":"michael.merz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"michael.merz"},"url":"https:\/\/www.organisator.ch\/en\/author\/michael-merz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/1898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/comments?post=1898"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/1898\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media\/1899"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media?parent=1898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/categories?post=1898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/tags?post=1898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}