{"id":3213,"date":"2025-10-28T14:53:07","date_gmt":"2025-10-28T14:53:07","guid":{"rendered":"https:\/\/phishia.fr\/?p=3213"},"modified":"2025-10-31T08:08:40","modified_gmt":"2025-10-31T08:08:40","slug":"iso-27001","status":"publish","type":"post","link":"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/iso-27001\/","title":{"rendered":"Alles \u00fcber ISO 27001"},"content":{"rendered":"<h2>Warum ISO 27001 (noch) f\u00fcr jeden von Interesse ist<\/h2>\n<p>Ihre Kunden wollen Beweise, keine Versprechungen. ISO 27001 bietet einen Rahmen <strong data-start=\"279\" data-end=\"309\">international anerkannt<\/strong> um die Informationssicherheit zu organisieren, Risiken zu priorisieren und mithilfe von Audits zu zeigen, dass das System im Alltag funktioniert. Bonus: Bei guter Durchf\u00fchrung ist dieser Sockel <strong data-start=\"480\" data-end=\"498\">ausrichten 80-90 %<\/strong> was NIS2\/DORA von Ihnen in Bezug auf Governance, Risikomanagement und Nachweise verlangen werden.<\/p>\n<h2>In zwei S\u00e4tzen: Was ist ISO27001?<\/h2>\n<p>ISO 27001 ist die Einrichtung eines\u00a0<strong style=\"caret-color: #000000; color: #000000;\" data-start=\"750\" data-end=\"814\">Managementsystem f\u00fcr Informationssicherheit (ISMS)<\/strong>\u00a0: klare Rollen, Risikoanalyse, wesentliche Regeln (Zugang, Backups, Vorf\u00e4lle...) und\u00a0<strong style=\"caret-color: #000000; color: #000000;\" data-start=\"907\" data-end=\"932\">kontinuierliche Verbesserung<\/strong>\u00a0durch Indikatoren gemessen wird. Man \u201clegt kein Papier aus\u201d: Man demonstriert eine\u00a0<strong style=\"caret-color: #000000; color: #000000;\" data-start=\"1007\" data-end=\"1034\">operative Kontrolle<\/strong>\u00a0und man kann sie einem Zuh\u00f6rer erkl\u00e4ren.<\/p>\n<h2>Die Bausteine des WSIS<\/h2>\n<ul>\n<li data-start=\"1119\" data-end=\"1236\">\n<p data-start=\"1121\" data-end=\"1236\"><strong data-start=\"1121\" data-end=\"1137\">Regierungsf\u00fchrung.<\/strong> Wer entscheidet, wor\u00fcber und mit welchen Nachweisen (Management Reviews, Protokolle, Schlichtungen).<\/p>\n<\/li>\n<li data-start=\"1237\" data-end=\"1333\">\n<p data-start=\"1239\" data-end=\"1333\"><strong data-start=\"1239\" data-end=\"1262\">Risikoanalyse.<\/strong> Bedrohungen, gesch\u00e4ftliche Auswirkungen, Entscheidungen \u00fcber Akzeptanz\/Behandlung, Folgema\u00dfnahmen.<\/p>\n<\/li>\n<li data-start=\"1334\" data-end=\"1518\">\n<p data-start=\"1336\" data-end=\"1518\"><strong data-start=\"1336\" data-end=\"1356\">SoA &amp; Kontrollen.<\/strong> Erkl\u00e4rung der Anwendbarkeit und Kontrollen von Anhang A (Ausgabe 2022: 93 Kontrollen, gruppiert in 4 Themen: organisatorisch, menschlich, physisch, technologisch).<\/p>\n<\/li>\n<li data-start=\"1519\" data-end=\"1632\">\n<p data-start=\"1521\" data-end=\"1632\"><strong data-start=\"1521\" data-end=\"1540\">Schl\u00fcsselprozesse.<\/strong> Zugang\/JML, Datensicherung &amp; Wiederherstellung, Schwachstellenmanagement, Vorf\u00e4lle, Kontinuit\u00e4t.<\/p>\n<\/li>\n<li data-start=\"1633\" data-end=\"1730\">\n<p data-start=\"1635\" data-end=\"1730\"><strong data-start=\"1635\" data-end=\"1661\">Messen &amp; Verbessern.<\/strong> KPIs, interne Audits, Aktionspl\u00e4ne, Lehren aus Vorf\u00e4llen.<\/p>\n<\/li>\n<\/ul>\n<h2>Warum jetzt?<\/h2>\n<ol>\n<li data-start=\"1850\" data-end=\"1958\">\n<p data-start=\"1853\" data-end=\"1958\"><strong data-start=\"1853\" data-end=\"1885\">B2B-Verk\u00e4ufe und Due Diligence.<\/strong> Ihre potenziellen Kunden verlangen Beweise; ISO 27001 beschleunigt die Zyklen.<\/p>\n<\/li>\n<li data-start=\"1959\" data-end=\"2089\">\n<p data-start=\"1962\" data-end=\"2089\"><strong data-start=\"1962\" data-end=\"1992\">Konvergenz der Rechtsvorschriften.<\/strong> NIS2\/DORA fordern Governance, Risiken, Meldungen und Nachweise: Das ISMS bereitet den Boden.<\/p>\n<\/li>\n<li data-start=\"2090\" data-end=\"2188\">\n<p data-start=\"2093\" data-end=\"2188\"><strong data-start=\"2093\" data-end=\"2116\">Interne Effektivit\u00e4t.<\/strong> Wir halten vergessene Dokumente an und behalten <strong data-start=\"2165\" data-end=\"2187\">wiederspielbare Beweise<\/strong>.<\/p>\n<\/li>\n<\/ol>\n<h2>Wie ein \u201cgutes\u201d ISO 27001 Deliverable aussieht<\/h2>\n<ul>\n<li data-start=\"3937\" data-end=\"3986\">\n<p data-start=\"3939\" data-end=\"3986\"><strong data-start=\"3939\" data-end=\"3952\">Politik<\/strong> kurz und verstanden von den Teams.<\/p>\n<\/li>\n<li data-start=\"3987\" data-end=\"4049\">\n<p data-start=\"3989\" data-end=\"4049\"><strong data-start=\"3989\" data-end=\"4013\">Risikoregister<\/strong> lebendig, verbunden mit Aktionspl\u00e4nen.<\/p>\n<\/li>\n<li data-start=\"4050\" data-end=\"4103\">\n<p data-start=\"4052\" data-end=\"4103\"><strong data-start=\"4052\" data-end=\"4059\">SoA<\/strong> argumentiert, mit echten Ma\u00dfnahmen verbunden.<\/p>\n<\/li>\n<li data-start=\"4104\" data-end=\"4174\">\n<p data-start=\"4106\" data-end=\"4174\"><strong data-start=\"4106\" data-end=\"4120\">Verfahren<\/strong> die auf 1-3 Seiten passen und bereits getestet wurden.<\/p>\n<\/li>\n<li data-start=\"4175\" data-end=\"4285\">\n<p data-start=\"4177\" data-end=\"4285\"><strong data-start=\"4177\" data-end=\"4199\">Beweismappe<\/strong> : Exporte, Protokolle, Berichte, Tickets, F\u00e4nge - geordnet, datiert, wiederauffindbar.<\/p>\n<\/li>\n<\/ul>\n<h2>Schlussfolgerung<\/h2>\n<p>ISO 27001 ist keine Sammlung von Dokumenten: Es ist ein Weg, um <strong data-start=\"4829\" data-end=\"4852\">die Sicherheit steuern<\/strong> zu bringen und die <strong data-start=\"4873\" data-end=\"4883\">Beweis<\/strong>. Bei richtiger Durchf\u00fchrung vereinfacht der Ansatz den Verkauf, bereitet auf die NIS2\/DORA-Verpflichtungen vor und macht die Organisation widerstandsf\u00e4higer. Und das alles, ohne den Alltag zu belasten - vorausgesetzt, man bleibt pragmatisch.<\/p>\n<p>Sie wollen einen <strong data-start=\"5105\" data-end=\"5129\">ISO 27001-Diagnose<\/strong> in 2-3 Wochen, um das ISMS zu rahmen und die Zertifizierung zu planen? Lassen Sie uns dar\u00fcber sprechen.<\/p>","protected":false},"excerpt":{"rendered":"<p>Pourquoi l\u2019ISO 27001 int\u00e9resse (encore) tout le monde Vos clients veulent des preuves, pas des promesses. L\u2019ISO 27001 fournit un cadre reconnu internationalement pour organiser la s\u00e9curit\u00e9 de l\u2019information, prioriser les risques, et montrer \u2014 audit \u00e0 l\u2019appui \u2014 que le dispositif fonctionne au quotidien. Bonus : bien men\u00e9, ce socle aligne 80\u201390 % de [&hellip;]<\/p>","protected":false},"author":3,"featured_media":3218,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-3213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tout savoir sur l&#039;ISO 27001 - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/iso-27001\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tout savoir sur l&#039;ISO 27001 - Phishia\" \/>\n<meta property=\"og:description\" content=\"Pourquoi l\u2019ISO 27001 int\u00e9resse (encore) tout le monde Vos clients veulent des preuves, pas des promesses. L\u2019ISO 27001 fournit un cadre reconnu internationalement pour organiser la s\u00e9curit\u00e9 de l\u2019information, prioriser les risques, et montrer \u2014 audit \u00e0 l\u2019appui \u2014 que le dispositif fonctionne au quotidien. Bonus : bien men\u00e9, ce socle aligne 80\u201390 % de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/iso-27001\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T14:53:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-31T08:08:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\"},\"author\":{\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\"},\"headline\":\"Tout savoir sur l&rsquo;ISO 27001\",\"datePublished\":\"2025-10-28T14:53:07+00:00\",\"dateModified\":\"2025-10-31T08:08:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/iso27001.png\",\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\",\"name\":\"Tout savoir sur l'ISO 27001 - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/iso27001.png\",\"datePublished\":\"2025-10-28T14:53:07+00:00\",\"dateModified\":\"2025-10-31T08:08:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/iso27001.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/iso27001.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tout savoir sur l&rsquo;ISO 27001\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\",\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Alles \u00fcber ISO 27001 - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/iso-27001\/","og_locale":"de_DE","og_type":"article","og_title":"Tout savoir sur l'ISO 27001 - Phishia","og_description":"Pourquoi l\u2019ISO 27001 int\u00e9resse (encore) tout le monde Vos clients veulent des preuves, pas des promesses. L\u2019ISO 27001 fournit un cadre reconnu internationalement pour organiser la s\u00e9curit\u00e9 de l\u2019information, prioriser les risques, et montrer \u2014 audit \u00e0 l\u2019appui \u2014 que le dispositif fonctionne au quotidien. Bonus : bien men\u00e9, ce socle aligne 80\u201390 % de [&hellip;]","og_url":"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/iso-27001\/","og_site_name":"Phishia","article_published_time":"2025-10-28T14:53:07+00:00","article_modified_time":"2025-10-31T08:08:40+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","type":"image\/png"}],"author":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/"},"author":{"name":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528"},"headline":"Tout savoir sur l&rsquo;ISO 27001","datePublished":"2025-10-28T14:53:07+00:00","dateModified":"2025-10-31T08:08:40+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/"},"wordCount":422,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/","name":"Alles \u00fcber ISO 27001 - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","datePublished":"2025-10-28T14:53:07+00:00","dateModified":"2025-10-31T08:08:40+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"Tout savoir sur l&rsquo;ISO 27001"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT-Beratung, Cybersicherheit, Nachhaltigkeit","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528","name":"Enzo Debosque, Juniorberater f\u00fcr Cybersicherheit"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/posts\/3213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/comments?post=3213"}],"version-history":[{"count":5,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/posts\/3213\/revisions"}],"predecessor-version":[{"id":3343,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/posts\/3213\/revisions\/3343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/media\/3218"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/media?parent=3213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/categories?post=3213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/tags?post=3213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}