{"id":249,"date":"2020-11-20T14:35:55","date_gmt":"2020-11-20T20:35:55","guid":{"rendered":"https:\/\/idsinc.com\/?p=249"},"modified":"2021-11-30T14:21:07","modified_gmt":"2021-11-30T20:21:07","slug":"sicherheit-im-zeitalter-einer-pandemie","status":"publish","type":"post","link":"https:\/\/idsinc.com\/de\/security-in-the-age-of-a-pandemic\/","title":{"rendered":"Sicherheit im Zeitalter der Pandemie"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">Durch: <a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/author\/idiscovery-solutions\">iDiscovery-L\u00f6sungen<\/a> am 20.11.2020<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Wenn Sie Leute nach den notwendigen Elementen f\u00fcr gute Informationssicherheit fragen, sprechen sie oft \u00fcber Technologie \u2013 Firewalls, sichere Server, Identit\u00e4ts- und Zugriffsverwaltung, Netzwerksegmentierung und andere technische Dimensionen. Die h\u00e4ufigsten Probleme, mit denen wir konfrontiert sind, beziehen sich jedoch auf Dinge, die Menschen tun, und nicht auf ein Versagen unserer technischen Kontrollen.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\">Ein Hauptaugenmerk muss darauf liegen, sicherzustellen, dass wir uns auf die Sensibilisierung f\u00fcr Informationssicherheit konzentrieren. Die \u00fcberwiegende Mehrheit der Probleme, mit denen wir t\u00e4glich konfrontiert sind, sind:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Kompromittierung gesch\u00e4ftlicher E-Mails<\/li><li>Ransomware<\/li><li>Malware<\/li><li>Datenleck<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Die h\u00e4ufigste Ursache f\u00fcr praktisch alle vier ist auf den Menschen zur\u00fcckzuf\u00fchren. Personen, die auf fehlerhafte Links klicken oder verd\u00e4chtige Anh\u00e4nge \u00f6ffnen. Personen, die schwache Passw\u00f6rter verwenden (oder wiederverwenden). Personen, die \u00c4nderungen an Zahlungszielen und -prozessen auf der Grundlage offensichtlich betr\u00fcgerischer E-Mails oder betr\u00fcgerischer Telefonanrufe genehmigen.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Es gibt eine Reihe technischer L\u00f6sungen, die jedes dieser Risiken mindern k\u00f6nnen, z. B. Tools, die externe Links scannen oder Anh\u00e4nge kennzeichnen, die von einer externen Adresse stammen. Das ist nicht genug. W\u00e4hrend Technologie eingesetzt werden kann, um die Erfolgswahrscheinlichkeit eines Angreifers zu verringern, k\u00f6nnen schlechte Praktiken letztendlich gute Technologie \u00fcberwinden.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Was ist die Antwort? Trainings- und Kompensationskontrollen. Ihre Mitarbeiter m\u00fcssen verstehen, wie B\u00f6sewichte vorgehen, und m\u00fcssen Social Engineering verstehen. Sie werden gezielt angegriffen \u2013 sie m\u00fcssen nur verstehen, wie das aussieht. Trainieren Sie Ihr Team, aber testen Sie es auch. Belohnen Sie Teammitglieder, die verd\u00e4chtige Aktivit\u00e4ten melden, und verwenden Sie diese Berichte als Grundlage f\u00fcr die Schulung des restlichen Teams.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In der Welt der Heimarbeit m\u00fcssen m\u00f6glicherweise die Kontrollen angepasst werden. Wenn Mitarbeiter im B\u00fcro normalerweise ein zweites Paar Augen haben w\u00fcrden, um etwas zu \u00fcberpr\u00fcfen, bevor sie mit der Genehmigung einer Transaktion fortfahren, \u00fcbersetzen Sie diese sekund\u00e4re \u00dcberpr\u00fcfung in einen Prozess, der auch bei der Remote-Arbeit funktioniert. Bringen Sie ihnen bei, dass B\u00f6sewichte oft versuchen, Mitarbeiter dazu zu bringen, die Regeln im Namen der Dringlichkeit zu umgehen. Es ist wichtig sicherzustellen, dass sie verstehen, dass die Einhaltung interner Kontrollen nicht zu Disziplinarma\u00dfnahmen f\u00fchrt.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u00dcberpr\u00fcfen Sie schlie\u00dflich sowohl Ihre Schulung als auch Ihre Kontrollprozesse und vergewissern Sie sich, dass sie sich in der neuen Arbeitsweise niederschlagen. Wenn Sie die Zugriffskontrolle nicht bereits durch die Verwendung von Multi-Faktor-Authentifizierung verbessert haben, sollten Sie dies als zus\u00e4tzliche Schutzebene hinzuf\u00fcgen. Aber denken Sie vor allem daran, mit Ihren Mitarbeitern in Verbindung zu bleiben, damit sie verstehen, dass Sicherheit die Aufgabe aller ist und dass wir alle wachsam sein m\u00fcssen, selbst wenn wir unsere Jogginghosen tragen.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDiscovery Solutions ist ein strategisches Beratungs-, Technologie- und Expertendienstleistungsunternehmen, das ma\u00dfgeschneiderte eDiscovery-L\u00f6sungen von digitaler Forensik bis hin zu Expertenaussagen f\u00fcr Anwaltskanzleien und Unternehmen in den Vereinigten Staaten und Europa anbietet.<\/em><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>By: iDiscovery Solutions on 11\/20\/2020 When you ask people the necessary elements for good information security, they will often talk about technology \u2013 firewalls, secure servers, identify and access management, network segmentation and other technical dimensions. However, the most common problems we face relate to things that people do as opposed to any lapse in [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":2375,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security in the age of the pandemic - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/de\/sicherheit-im-zeitalter-einer-pandemie\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security in the age of the pandemic\" \/>\n<meta property=\"og:description\" content=\"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/de\/sicherheit-im-zeitalter-einer-pandemie\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-20T20:35:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-30T20:21:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Security in the age of the pandemic\",\"datePublished\":\"2020-11-20T20:35:55+00:00\",\"dateModified\":\"2021-11-30T20:21:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\"},\"wordCount\":463,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\",\"name\":\"Security in the age of the pandemic - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"datePublished\":\"2020-11-20T20:35:55+00:00\",\"dateModified\":\"2021-11-30T20:21:07+00:00\",\"description\":\"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/iDS-NewLogoBlogImages-202015.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"Information security is vital to any business especially when working remotely. Employee security awareness training is important as using firewalls.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/es\\\/security-in-the-age-of-a-pandemic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security in the age of the pandemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/de\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sicherheit im Zeitalter der Pandemie \u2013 iDiscovery Solutions","description":"Informationssicherheit ist f\u00fcr jedes Unternehmen, das remote arbeitet, von entscheidender Bedeutung. Ebenso wichtig wie die Verwendung von Firewalls ist die Schulung des Mitarbeitersicherheitsbewusstseins.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/de\/sicherheit-im-zeitalter-einer-pandemie\/","og_locale":"de_DE","og_type":"article","og_title":"Security in the age of the pandemic","og_description":"Information security is vital to any business working remotely. Employee security awareness training is important as using firewalls.","og_url":"https:\/\/idsinc.com\/de\/sicherheit-im-zeitalter-einer-pandemie\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-11-20T20:35:55+00:00","article_modified_time":"2021-11-30T20:21:07+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"iDiscovery Solutions","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Security in the age of the pandemic","datePublished":"2020-11-20T20:35:55+00:00","dateModified":"2021-11-30T20:21:07+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/"},"wordCount":463,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","articleSection":["Blog"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/","url":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/","name":"Sicherheit im Zeitalter der Pandemie \u2013 iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","datePublished":"2020-11-20T20:35:55+00:00","dateModified":"2021-11-30T20:21:07+00:00","description":"Informationssicherheit ist f\u00fcr jedes Unternehmen, das remote arbeitet, von entscheidender Bedeutung. Ebenso wichtig wie die Verwendung von Firewalls ist die Schulung des Mitarbeitersicherheitsbewusstseins.","breadcrumb":{"@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/11\/iDS-NewLogoBlogImages-202015.jpg","width":2500,"height":1250,"caption":"Information security is vital to any business especially when working remotely. Employee security awareness training is important as using firewalls."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/es\/security-in-the-age-of-a-pandemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Security in the age of the pandemic"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery-L\u00f6sungen","description":"Nutzen Sie Daten im Gerichtssaal zu Ihrem Vorteil","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery-L\u00f6sungen","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS bietet Unternehmen und Anwaltskanzleien weltweit beratende Datenl\u00f6sungen und verschafft ihnen damit einen entscheidenden Vorteil \u2013 sowohl vor als auch au\u00dferhalb des Gerichtssaals. Die Fachexperten und Datenstrategen von iDS sind auf die L\u00f6sung komplexer Datenprobleme spezialisiert und stellen sicher, dass Daten als Vorteil und nicht als Belastung genutzt werden.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"iDiscovery-L\u00f6sungen","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/de\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/posts\/249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/posts\/249\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/media\/2375"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/media?parent=249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/categories?post=249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/de\/wp-json\/wp\/v2\/tags?post=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}