{"id":5057,"date":"2024-12-04T12:59:03","date_gmt":"2024-12-04T12:59:03","guid":{"rendered":"https:\/\/second-it.de\/?p=5057"},"modified":"2024-12-09T22:21:58","modified_gmt":"2024-12-09T22:21:58","slug":"data-protection-hard-disk-security-dsgvo","status":"publish","type":"post","link":"https:\/\/www.second-it.de\/en\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/","title":{"rendered":"Corporate DNA on hard disks: a data protection thriller"},"content":{"rendered":"<h4 class=\"wp-block-heading\">Introduction: The forgotten risk in your IT<\/h4>\n\n\n\n<p>Every company carries its DNA within it - not only in the form of strategies and cultures, but also on its hard drives. From confidential customer data and sensitive business plans to communication histories that are not intended for the public: Old hardware can become a real security risk. But what happens if these digital traces fall into the wrong hands?<\/p>\n\n\n\n<p>A spectacular case from the IT industry shows how a simple mistake in data deletion turned into a data protection scandal - and why your IT deserves more attention than you think.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1. digital DNA: more than just data<\/strong><\/h4>\n\n\n\n<p>Hard disks store more than just facts and figures. They are the key to corporate values and identities. One example: a medium-sized company from the financial sector had resold old laptops without first deleting them in accordance with BSI regulations. The consequences? An ex-employee used the recovered data to influence negotiations with competitors.<\/p>\n\n\n\n<p>Why does this happen? Many people underestimate the effort required to irretrievably delete data. Simple formatting is not enough - the digital traces remain.<\/p>\n\n\n\n<p><strong>Tip:<\/strong>&nbsp;To ensure that your data cannot be recovered, certified data erasure services should be used. (\ud83d\udc49 More about&nbsp;<a href=\"#\">BSI-compliant data erasure<\/a>&nbsp;experienced).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2. what happens to your hard disks when they are resold?<\/strong><\/h4>\n\n\n\n<p>Remarketing old IT hardware is economical and sustainable - but only if it is done securely. Without professional erasure, old devices often end up in unofficial channels or are resold on online marketplaces. Hobby hackers and criminals can use tools there to restore freely accessible data.<\/p>\n\n\n\n<p><strong>The nightmare:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access to sensitive project data.<\/li>\n\n\n\n<li>Disclosure of customer data - a clear violation of the GDPR.<\/li>\n\n\n\n<li>Damage to reputation and legal consequences.<\/li>\n<\/ul>\n\n\n\n<p><strong>Solution:<\/strong>&nbsp;Companies that sell used IT hardware should rely on professional partners who guarantee certified processes.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>3. prevention: the art of correct data deletion<\/strong><\/h4>\n\n\n\n<p>How do you protect yourself from a data protection thriller? The answer lies in clear processes and the right technology:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Delete certified hard disks:<\/strong>&nbsp;Methods such as physical destruction or multiple overwriting with special software make data permanently unreadable.<\/li>\n\n\n\n<li><strong>Audit and documentation:<\/strong>&nbsp;Have proof of every deletion so that you are legally protected in the event of an emergency.<\/li>\n\n\n\n<li><strong>Lifecycle management:<\/strong>&nbsp;Integrate data erasure as an integral part of your IT lifecycle.<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>4. looking to the future: data protection in a digital world<\/strong><\/h4>\n\n\n\n<p>As digitalization and new technologies increase, so do the risks. Cybercrime is becoming more sophisticated and data protection expectations are becoming stricter. Proactive data management is therefore not only a legal necessity, but also a competitive advantage. Companies that handle their IT responsibly gain the trust of customers and partners.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Conclusion: Protect data - and think ahead<\/h4>\n\n\n\n<p>Your hard disks are more than just technology. They are the digital fingerprint of your company. To avoid data protection nightmares, you need clearly defined processes, modern technologies and cooperation with reliable partners.<\/p>\n\n\n\n<p>If you want to know how to safely recycle used IT hardware while ensuring data protection, now is the time to rethink your strategy.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sensitive company data on old hard disks is a ticking time bomb. Find out how professional data erasure protects your digital DNA and eliminates security risks.<\/p>","protected":false},"author":2,"featured_media":5197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Datensicherheit: Schutz der digitalen Unternehmens-DNA auf Festplatten<\/title>\n<meta name=\"description\" content=\"Sch\u00fctzen Sie sensible Unternehmensdaten auf alten Festplatten! Wie professionelle BSI-konforme Datenl\u00f6schung Ihre digitale DNA sichert. Jetzt informieren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.second-it.de\/en\/blog\/data-protection-hard-disk-security-dsgvo\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Datensicherheit: Schutz der digitalen Unternehmens-DNA auf Festplatten\" \/>\n<meta property=\"og:description\" content=\"Sch\u00fctzen Sie sensible Unternehmensdaten auf alten Festplatten! Wie professionelle BSI-konforme Datenl\u00f6schung Ihre digitale DNA sichert. Jetzt informieren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.second-it.de\/en\/blog\/data-protection-hard-disk-security-dsgvo\/\" \/>\n<meta property=\"og:site_name\" content=\"Second IT Remarketing\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-04T12:59:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-09T22:21:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.second-it.de\/wp-content\/uploads\/2024\/12\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"785\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arash Ekhlasi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arash Ekhlasi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/\"},\"author\":{\"name\":\"Arash Ekhlasi\",\"@id\":\"https:\\\/\\\/www.second-it.de\\\/#\\\/schema\\\/person\\\/cd5e1374fd1e7628d89a2c9ed8295aa3\"},\"headline\":\"Unternehmens-DNA auf Festplatten: Ein Datenschutz-Thriller\",\"datePublished\":\"2024-12-04T12:59:03+00:00\",\"dateModified\":\"2024-12-09T22:21:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/\"},\"wordCount\":509,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.second-it.de\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/\",\"url\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/\",\"name\":\"Datensicherheit: Schutz der digitalen Unternehmens-DNA auf Festplatten\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.second-it.de\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg\",\"datePublished\":\"2024-12-04T12:59:03+00:00\",\"dateModified\":\"2024-12-09T22:21:58+00:00\",\"description\":\"Sch\u00fctzen Sie sensible Unternehmensdaten auf alten Festplatten! Wie professionelle BSI-konforme Datenl\u00f6schung Ihre digitale DNA sichert. Jetzt informieren.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.second-it.de\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg\",\"contentUrl\":\"https:\\\/\\\/www.second-it.de\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg\",\"width\":1400,\"height\":785,\"caption\":\"Experten von Second IT f\u00fchren zertifizierte Datenl\u00f6schung und nachhaltiges IT-Hardware Recycling f\u00fcr Unternehmen in Schw\u00e4bisch Hall durch.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.second-it.de\\\/blog\\\/datenschutz-festplatten-sicherheit-dsgvo\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.second-it.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unternehmens-DNA auf Festplatten: Ein Datenschutz-Thriller\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.second-it.de\\\/#website\",\"url\":\"https:\\\/\\\/www.second-it.de\\\/\",\"name\":\"www.second-it.de\",\"description\":\"IT-Ankauf, Refurbishing und DSGVO-konforme Datenl\u00f6schung.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.second-it.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.second-it.de\\\/#organization\",\"name\":\"Second IT Store GmbH\",\"url\":\"https:\\\/\\\/www.second-it.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.second-it.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.second-it.de\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/secondit-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.second-it.de\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/secondit-logo.svg\",\"width\":212,\"height\":24,\"caption\":\"Second IT Store GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.second-it.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.second-it.de\\\/#\\\/schema\\\/person\\\/cd5e1374fd1e7628d89a2c9ed8295aa3\",\"name\":\"Arash Ekhlasi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/68ea88e0b026eb113aa171cc6041b41efc01017df641aa90420140291a08675d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/68ea88e0b026eb113aa171cc6041b41efc01017df641aa90420140291a08675d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/68ea88e0b026eb113aa171cc6041b41efc01017df641aa90420140291a08675d?s=96&d=mm&r=g\",\"caption\":\"Arash Ekhlasi\"},\"sameAs\":[\"https:\\\/\\\/www.cubemedia.de\"],\"url\":\"https:\\\/\\\/www.second-it.de\\\/en\\\/blog\\\/author\\\/cubemedia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data security: protecting the company's digital DNA on hard disks","description":"Protect sensitive company data on old hard disks! How professional BSI-compliant data erasure secures your digital DNA. Find out more now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.second-it.de\/en\/blog\/data-protection-hard-disk-security-dsgvo\/","og_locale":"en_US","og_type":"article","og_title":"Datensicherheit: Schutz der digitalen Unternehmens-DNA auf Festplatten","og_description":"Sch\u00fctzen Sie sensible Unternehmensdaten auf alten Festplatten! Wie professionelle BSI-konforme Datenl\u00f6schung Ihre digitale DNA sichert. Jetzt informieren.","og_url":"https:\/\/www.second-it.de\/en\/blog\/data-protection-hard-disk-security-dsgvo\/","og_site_name":"Second IT Remarketing","article_published_time":"2024-12-04T12:59:03+00:00","article_modified_time":"2024-12-09T22:21:58+00:00","og_image":[{"width":1400,"height":785,"url":"https:\/\/www.second-it.de\/wp-content\/uploads\/2024\/12\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg","type":"image\/jpeg"}],"author":"Arash Ekhlasi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Arash Ekhlasi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/#article","isPartOf":{"@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/"},"author":{"name":"Arash Ekhlasi","@id":"https:\/\/www.second-it.de\/#\/schema\/person\/cd5e1374fd1e7628d89a2c9ed8295aa3"},"headline":"Unternehmens-DNA auf Festplatten: Ein Datenschutz-Thriller","datePublished":"2024-12-04T12:59:03+00:00","dateModified":"2024-12-09T22:21:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/"},"wordCount":509,"commentCount":0,"publisher":{"@id":"https:\/\/www.second-it.de\/#organization"},"image":{"@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.second-it.de\/wp-content\/uploads\/2024\/12\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/","url":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/","name":"Data security: protecting the company's digital DNA on hard disks","isPartOf":{"@id":"https:\/\/www.second-it.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/#primaryimage"},"image":{"@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.second-it.de\/wp-content\/uploads\/2024\/12\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg","datePublished":"2024-12-04T12:59:03+00:00","dateModified":"2024-12-09T22:21:58+00:00","description":"Protect sensitive company data on old hard disks! How professional BSI-compliant data erasure secures your digital DNA. Find out more now.","breadcrumb":{"@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/#primaryimage","url":"https:\/\/www.second-it.de\/wp-content\/uploads\/2024\/12\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg","contentUrl":"https:\/\/www.second-it.de\/wp-content\/uploads\/2024\/12\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg","width":1400,"height":785,"caption":"Experten von Second IT f\u00fchren zertifizierte Datenl\u00f6schung und nachhaltiges IT-Hardware Recycling f\u00fcr Unternehmen in Schw\u00e4bisch Hall durch."},{"@type":"BreadcrumbList","@id":"https:\/\/www.second-it.de\/blog\/datenschutz-festplatten-sicherheit-dsgvo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.second-it.de\/"},{"@type":"ListItem","position":2,"name":"Unternehmens-DNA auf Festplatten: Ein Datenschutz-Thriller"}]},{"@type":"WebSite","@id":"https:\/\/www.second-it.de\/#website","url":"https:\/\/www.second-it.de\/","name":"www.second-it.de","description":"IT purchase, refurbishing and GDPR-compliant data erasure.","publisher":{"@id":"https:\/\/www.second-it.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.second-it.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.second-it.de\/#organization","name":"Second IT Store GmbH","url":"https:\/\/www.second-it.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.second-it.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.second-it.de\/wp-content\/uploads\/2024\/07\/secondit-logo.svg","contentUrl":"https:\/\/www.second-it.de\/wp-content\/uploads\/2024\/07\/secondit-logo.svg","width":212,"height":24,"caption":"Second IT Store GmbH"},"image":{"@id":"https:\/\/www.second-it.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.second-it.de\/#\/schema\/person\/cd5e1374fd1e7628d89a2c9ed8295aa3","name":"Arash Ekhlasi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/68ea88e0b026eb113aa171cc6041b41efc01017df641aa90420140291a08675d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/68ea88e0b026eb113aa171cc6041b41efc01017df641aa90420140291a08675d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68ea88e0b026eb113aa171cc6041b41efc01017df641aa90420140291a08675d?s=96&d=mm&r=g","caption":"Arash Ekhlasi"},"sameAs":["https:\/\/www.cubemedia.de"],"url":"https:\/\/www.second-it.de\/en\/blog\/author\/cubemedia\/"}]}},"jetpack_featured_media_url":"https:\/\/www.second-it.de\/wp-content\/uploads\/2024\/12\/it-datenloschung-bsi-konform-hardware-remarketing-second-it-sicherheit-zertifiziert.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/posts\/5057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/comments?post=5057"}],"version-history":[{"count":0,"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/posts\/5057\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/media\/5197"}],"wp:attachment":[{"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/media?parent=5057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/categories?post=5057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.second-it.de\/en\/wp-json\/wp\/v2\/tags?post=5057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}