{"id":3779,"date":"2021-03-28T12:00:20","date_gmt":"2021-03-28T10:00:20","guid":{"rendered":"https:\/\/www.umweltperspektiven.ch\/?p=3779"},"modified":"2021-03-28T12:00:20","modified_gmt":"2021-03-28T10:00:20","slug":"tipps-zum-schutz-von-geistigem-eigentum","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/en\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/","title":{"rendered":"Intellectual property protection tips"},"content":{"rendered":"<figure id=\"attachment_3780\" aria-describedby=\"caption-attachment-3780\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3780 size-medium\" src=\"\/\/www.umweltperspektiven.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019.jpg\" alt=\"Intellectual property\" width=\"680\" height=\"454\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019.jpg 1000w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019-680x454.jpg 680w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019-768x512.jpg 768w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019-18x12.jpg 18w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019-262x175.jpg 262w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019-525x350.jpg 525w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019-920x614.jpg 920w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019-300x200.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-3780\" class=\"wp-caption-text\">Intellectual property must be well protected. \u00a9 Depositphotos, Jirsak<\/figcaption><\/figure>\n<p>Once attackers have penetrated a corporate network, they can sell mission-critical information to a competitor or nation-state with competitive global markets after successful exfiltration. <a href=\"\/\/digitalguardian.com\">Digital Guardian<\/a> therefore proposes ten measures that can be implemented immediately to ensure that companies of all sizes are better prepared to protect business-critical data.<\/p>\n<p><strong>1. encrypt sensitive data<\/strong><\/p>\n<p>Encrypting sensitive data is critical to protecting intellectual property. This allows companies to add another layer of protection that makes it more difficult to access data if it is stolen by an attacker. Encryption should be fully disk and file-based for endpoints, in addition to enforcing encryption for email and devices.<\/p>\n<p><strong>2. keep operating systems and software up to date<\/strong><\/p>\n<p>Operating system and software updates contain critical security updates that address vulnerabilities. Automatic software updates should therefore be enabled whenever possible to streamline the process and ensure that everything is always up to date.<\/p>\n<p><strong>3. deployment of data security solutions<\/strong><\/p>\n<p>Antivirus software does not protect against all types of threats, but only provides basic protection against common, known malware. Attackers targeting sensitive intellectual property typically use sophisticated methods to penetrate systems. Antivirus software can be bypassed in these attacks. Organizations should therefore consider deploying data security software that resides at the kernel level of endpoints and provides a complete view of all data being accessed and transmitted. The solution should be able to fully lock down both structured and unstructured confidential data and employ enforcement policies to prevent this data from leaving the enterprise IT environment.<\/p>\n<p><strong>4. accounts with unique, complex passwords<\/strong><\/p>\n<p>Reusing the same or slightly modified passwords across different accounts is one of the biggest security risks in a data breach. If employees use their passwords more than once, compromising a non-sensitive account can give hackers access to the corporate network. From there, attackers can move to privileged accounts and access sensitive data stored in databases, directories and other IT resources.<\/p>\n<p><strong>5. archive data promptly and securely<\/strong><\/p>\n<p>Minimizing the amount of data stored by organizations on devices reduces the amount of information available to an attacker who has gained access to those devices. When data is no longer needed, it should be encrypted and moved to an offline storage device for long-term archiving.<\/p>\n<p><strong>6. regular activity monitoring across user accounts.<\/strong><\/p>\n<p>Monitoring user behavior for anomalous or suspicious activity is one of the fastest ways to detect a security breach before it can cause damage. When suspicious activity is detected, all parties involved should be notified immediately. Even if other safeguards are in place, monitoring is often the fastest way to detect a security breach. Common warning signs include credentials used on multiple computers, employees accessing databases or directories they have never accessed before, or logins outside of working hours.<\/p>\n<p><strong>7. change all passwords after possible data breach.<\/strong><\/p>\n<p>After a security breach becomes known, the most important first step is to change all associated passwords. This ensures that the credentials are useless, even if they have been stolen.<\/p>\n<p><strong>8. data security settings of mobile applications and online accounts<\/strong><\/p>\n<p>It is also critical to keep up with data security settings for various accounts and applications, especially with the popularity of BYOD in the workplace. This ensures that unauthorized users do not have access to private, sensitive information or company intellectual property.<\/p>\n<p><strong>9. device controls for removable media<\/strong><\/p>\n<p>Although most IT security focuses on protecting against external attackers, insider threats should not be ignored. Organizations should ensure they have controls in place for removable devices to prevent employees from accessing and exfiltrating sensitive intellectual property within the network. Device control security software that automates the process with policy-based usage controls for removable media, including alerts or blocking when risky behavior is detected, is very effective in preventing insider threats.<\/p>\n<p><strong>10. employee training against phishing attacks<\/strong><\/p>\n<p>Attackers often find it more effective to use social engineering to trick a target into a desired action than to conduct complex, manual hacking attacks. Phishing attacks usually have telltale signs such as unknown senders, foreign domain names, fake websites, or emails with malicious links or attachments. Regular employee training and simulation training are therefore recommended to strengthen employee vigilance.<\/p>\n<p>Intellectual property is among a company's most valuable assets. That's why it's important to implement a comprehensive data security strategy, including basic best practices such as password hygiene and solid patch management in all internal departments and with third-party vendors that work with intellectual property. This can significantly reduce the risk of intellectual property theft.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Sind Angreifer in ein Firmennetzwerk eingedrungen, k\u00f6nnen sie nach erfolgreicher Exfiltrierung gesch\u00e4ftskritische Informationen an einen Wettbewerber oder Nationalstaat mit konkurrierenden globalen M\u00e4rkten verkaufen. Digital Guardian schl\u00e4gt deshalb zehn Massnahmen vor, die sich sofort umsetzen lassen, um sicherzustellen, dass Unternehmen aller Gr\u00f6ssenordnungen besser darauf vorbereitet sind, gesch\u00e4ftskritische Daten zu sch\u00fctzen. 1. Sensible Daten verschl\u00fcsseln Die Verschl\u00fcsselung [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":3780,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"geistiges Eigentum","_yoast_wpseo_metadesc":"","articlekey":"","footnotes":""},"categories":[1],"tags":[229,1344,1454],"class_list":["post-3779","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","tag-geistiges-eigentum","tag-hackerangriff","tag-it-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tipps zum Schutz von geistigem Eigentum - Organisator<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/en\/general\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tipps zum Schutz von geistigem Eigentum - Organisator\" \/>\n<meta property=\"og:description\" content=\"Sind Angreifer in ein Firmennetzwerk eingedrungen, k\u00f6nnen sie nach erfolgreicher Exfiltrierung gesch\u00e4ftskritische Informationen an einen Wettbewerber oder Nationalstaat mit konkurrierenden globalen M\u00e4rkten verkaufen. Digital Guardian schl\u00e4gt deshalb zehn Massnahmen vor, die sich sofort umsetzen lassen, um sicherzustellen, dass Unternehmen aller Gr\u00f6ssenordnungen besser darauf vorbereitet sind, gesch\u00e4ftskritische Daten zu sch\u00fctzen. 1. Sensible Daten verschl\u00fcsseln Die Verschl\u00fcsselung [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/en\/general\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-28T10:00:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"roger.straessle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/\"},\"author\":{\"name\":\"roger.straessle\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/a800b8c54e208b160517a7dcc323161d\"},\"headline\":\"Tipps zum Schutz von geistigem Eigentum\",\"datePublished\":\"2021-03-28T10:00:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/\"},\"wordCount\":831,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Depositphotos_66306093_s-2019.jpg\",\"keywords\":[\"Geistiges Eigentum\",\"Hackerangriff\",\"IT-Security\"],\"articleSection\":[\"Allgemein\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/\",\"name\":\"Tipps zum Schutz von geistigem Eigentum - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Depositphotos_66306093_s-2019.jpg\",\"datePublished\":\"2021-03-28T10:00:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Depositphotos_66306093_s-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Depositphotos_66306093_s-2019.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 Depositphotos, Jirsak\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/de\\\/allgemein\\\/2021-03-28\\\/tipps-zum-schutz-von-geistigem-eigentum\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tipps zum Schutz von geistigem Eigentum\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/a800b8c54e208b160517a7dcc323161d\",\"name\":\"roger.straessle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=mm&r=g\",\"caption\":\"roger.straessle\"},\"url\":\"https:\\\/\\\/www.organisator.ch\\\/en\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intellectual property protection tips - organizer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/en\/general\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/","og_locale":"en_US","og_type":"article","og_title":"Tipps zum Schutz von geistigem Eigentum - Organisator","og_description":"Sind Angreifer in ein Firmennetzwerk eingedrungen, k\u00f6nnen sie nach erfolgreicher Exfiltrierung gesch\u00e4ftskritische Informationen an einen Wettbewerber oder Nationalstaat mit konkurrierenden globalen M\u00e4rkten verkaufen. Digital Guardian schl\u00e4gt deshalb zehn Massnahmen vor, die sich sofort umsetzen lassen, um sicherzustellen, dass Unternehmen aller Gr\u00f6ssenordnungen besser darauf vorbereitet sind, gesch\u00e4ftskritische Daten zu sch\u00fctzen. 1. Sensible Daten verschl\u00fcsseln Die Verschl\u00fcsselung [&hellip;]","og_url":"https:\/\/www.organisator.ch\/en\/general\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2021-03-28T10:00:20+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019.jpg","type":"image\/jpeg"}],"author":"roger.straessle","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/"},"author":{"name":"roger.straessle","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/a800b8c54e208b160517a7dcc323161d"},"headline":"Tipps zum Schutz von geistigem Eigentum","datePublished":"2021-03-28T10:00:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/"},"wordCount":831,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019.jpg","keywords":["Geistiges Eigentum","Hackerangriff","IT-Security"],"articleSection":["Allgemein"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/","url":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/","name":"Intellectual property protection tips - organizer","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019.jpg","datePublished":"2021-03-28T10:00:20+00:00","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2021\/02\/Depositphotos_66306093_s-2019.jpg","width":1000,"height":667,"caption":"\u00a9 Depositphotos, Jirsak"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/de\/allgemein\/2021-03-28\/tipps-zum-schutz-von-geistigem-eigentum\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Tipps zum Schutz von geistigem Eigentum"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organizer","description":"Competent. Practical. In 10 issues per year, ORGANISATOR presents the essential topics for managers of SMEs.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organizer","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/a800b8c54e208b160517a7dcc323161d","name":"roger.straessle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"roger.straessle"},"url":"https:\/\/www.organisator.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/3779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/comments?post=3779"}],"version-history":[{"count":0,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/3779\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media\/3780"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media?parent=3779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/categories?post=3779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/tags?post=3779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}