{"id":11312,"date":"2025-02-19T11:09:54","date_gmt":"2025-02-19T10:09:54","guid":{"rendered":"https:\/\/www.kloepfel-magazin.com\/?p=11312"},"modified":"2025-02-19T11:09:54","modified_gmt":"2025-02-19T10:09:54","slug":"supply-chain-security-social-engineering","status":"publish","type":"post","link":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/","title":{"rendered":"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself"},"content":{"rendered":"<p><strong>Bitkom Research, on behalf of the digital association Bitkom, conducted a telephone survey of 1,003 companies in Germany with at least 10 employees and an annual revenue of at least 1 million euros. The results show that 8 out of 10 companies have been affected by data theft, espionage, or sabotage. The survey was conducted between calendar weeks 16 and 24 of 2024. Link to the results.<\/strong><\/p>\n<p><strong>One of the main risks is employees unknowingly clicking on a dangerous link. For this reason, Kloepfel Group, specializing in procurement and supply chains, has developed a checklist for buyers and supply chain managers to protect against social engineering.<\/strong><\/p>\n<h2><strong>The ABCs of Social Engineering Techniques and How to Identify Them<\/strong><\/h2>\n<h3><strong>Baiting<\/strong><\/h3>\n<p>The attacker lures the victim with an attractive offer, often in the form of a free download or a USB stick infected with malware.<br \/>\nExample: A malicious USB stick is placed in a parking lot, hoping that someone will pick it up and insert it into their computer. Be cautious of unknown USB sticks or unusually attractive offers without a clear source.<\/p>\n<h3><strong>Impersonation<\/strong><\/h3>\n<p>The attacker pretends to be someone else, often a trusted person such as a colleague or supervisor, to gain access to information or secure areas.<br \/>\nExample: A stranger claims to be a new employee and requests access to the building.<\/p>\n<h3><strong>Phishing<\/strong><\/h3>\n<p>Phishing involves using fake emails or websites to steal personal data such as passwords.<br \/>\nExample: An email that appears to be from a bank asks the recipient to enter their account details.<br \/>\nPhishing emails can often be identified by unusual sender addresses, spelling errors, or unexpected requests for personal information.<\/p>\n<h3><strong>Pretexting<\/strong><\/h3>\n<p>In pretexting, the attacker fabricates a false identity to obtain confidential information.<br \/>\nExample: Someone calls and pretends to be an IT employee to ask for your password.<br \/>\nPretexting can be recognized when the caller asks unusual questions or requests information that is not typically shared over the phone.<\/p>\n<h3><strong>Quid Pro Quo<\/strong><\/h3>\n<p>This method involves offering something in return for information or access rights.<br \/>\nExample: A caller offers &#8220;free technical support&#8221; to trick you into revealing login credentials.<br \/>\nQuid Pro Quo attacks can be identified when someone requests personal or security-related information in exchange for a supposed service.<\/p>\n<h3><strong>Spear Phishing<\/strong><\/h3>\n<p>A targeted form of phishing where the attacker focuses on a specific person and uses a personalized message to gain the victim\u2019s trust.<br \/>\nExample: An email appearing to be from the CEO instructs an employee to click on an attachment or share confidential information.<\/p>\n<h3><strong>Tailgating<\/strong><\/h3>\n<p>Tailgating occurs when someone attempts to enter a secure area without their own access card or authorization.<\/p>\n<h3><strong>Vishing<\/strong><\/h3>\n<p>Vishing (voice phishing) is a technique where fraudsters attempt to obtain sensitive information such as passwords or bank details over the phone.<br \/>\nExample: A scammer pretends to be a bank employee and asks for your account information.<br \/>\nSo-called &#8220;grandparent scams,&#8221; where fraudsters use shock calls to manipulate victims into transferring money, also fall into this category. If an unexpected caller requests confidential information or exerts strong pressure, it is best to hang up.<\/p>\n<h3><strong>Watering Hole<\/strong><\/h3>\n<p>In this technique, the attacker compromises a frequently visited website to spread malware or collect data.<br \/>\nExample: A popular industry website is infected so that visitors unknowingly download malicious software.<br \/>\nWatering Hole attacks can be detected by virus warnings or unusual behavior on trusted websites.<\/p>\n<h3><strong>Countermeasures Against Social Engineering<\/strong><\/h3>\n<p>To protect against social engineering attacks, clear communication rules should be in place to ensure that suspicious requests are always verified.<\/p>\n<p>Access to sensitive information should only be granted through strong security measures such as multi-factor authentication and secure passwords.<\/p>\n<p>A good monitoring system helps detect and report suspicious activities quickly.<\/p>\n<p>Regular security audits and training for all involved parties, including suppliers, ensure that everyone is aware of the risks and works together to prevent attacks.<\/p>\n<p>Companies should appoint IT security consultants or security officers to effectively implement these protective measures.<\/p>\n<p><strong>Marc Kloepfel, CEO of Kloepfel Group, advises:<\/strong><br \/>\n&#8220;With a high number of suppliers, as is common in supply chains with numerous key suppliers, the risk of cyberattacks increases significantly. Therefore, it is essential that procurement is comprehensively secured against cyber threats. This includes implementing strict security protocols and regularly reviewing IT security at all suppliers to ensure the integrity of the entire supply chain and minimize the risk of cyberattacks.&#8221;<\/p>\n<p><strong>Contact:<\/strong><\/p>\n<p>Kloepfel Group<br \/>\nDamir Berberovic<br \/>\nTel.: +49 211 941 984 33 | Email: <a href=\"mailto:rendite@kloepfel-consulting.com\">rendite@kloepfel-consulting.com<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bitkom Research, on behalf of the digital association Bitkom, conducted a telephone survey of 1,003 companies in Germany with at least 10 employees and an annual revenue of at least 1 million euros. The results show that 8 out of 10 companies have been affected by data theft, espionage, or sabotage. The survey was conducted<\/p>\n","protected":false},"author":2,"featured_media":11313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":{"0":"post-11312","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-whitepaper"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself | Kloepfel Magazin<\/title>\n<meta name=\"description\" content=\"Social engineering threatens corporate security by exploiting human error. Learn how to protect yourself with targeted security measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Social engineering threatens corporate security by exploiting human error. Learn how to protect yourself with targeted security measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/\" \/>\n<meta property=\"og:site_name\" content=\"Kloepfel Magazin\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-19T10:09:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kloepfel-magazin.com\/wp-content\/uploads\/2025\/02\/Lieferketten-Social-Engineering-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kloepfel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself\" \/>\n<meta name=\"twitter:description\" content=\"Social engineering threatens corporate security by exploiting human error. Learn how to protect yourself with targeted security measures.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/kloepfel-magazin.com\/wp-content\/uploads\/2025\/02\/Lieferketten-Social-Engineering-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kloepfel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/\"},\"author\":{\"name\":\"Kloepfel\",\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/#\\\/schema\\\/person\\\/9e3a36d7d394f66eb9f2743103d9cc3f\"},\"headline\":\"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself\",\"datePublished\":\"2025-02-19T10:09:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/\"},\"wordCount\":737,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kloepfel-magazin.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Lieferketten-Social-Engineering-1.jpg\",\"articleSection\":[\"Whitepaper\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/\",\"url\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/\",\"name\":\"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself | Kloepfel Magazin\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kloepfel-magazin.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Lieferketten-Social-Engineering-1.jpg\",\"datePublished\":\"2025-02-19T10:09:54+00:00\",\"description\":\"Social engineering threatens corporate security by exploiting human error. Learn how to protect yourself with targeted security measures.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kloepfel-magazin.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Lieferketten-Social-Engineering-1.jpg\",\"contentUrl\":\"https:\\\/\\\/kloepfel-magazin.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Lieferketten-Social-Engineering-1.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/whitepaper\\\/supply-chain-security-social-engineering-11312\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/kloepfel-magazin.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/#website\",\"url\":\"https:\\\/\\\/kloepfel-magazin.com\\\/\",\"name\":\"Kloepfel Magazin\",\"description\":\"Das Magazin f\u00fcr den effektiveren Einkauf!\",\"publisher\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kloepfel-magazin.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/#organization\",\"name\":\"Kloepfel Magazin\",\"url\":\"https:\\\/\\\/kloepfel-magazin.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.kloepfel-magazin.com\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/kloepfel-magazin200@2x.png\",\"contentUrl\":\"https:\\\/\\\/www.kloepfel-magazin.com\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/kloepfel-magazin200@2x.png\",\"width\":400,\"height\":126,\"caption\":\"Kloepfel Magazin\"},\"image\":{\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/kloepfel-magazin.com\\\/#\\\/schema\\\/person\\\/9e3a36d7d394f66eb9f2743103d9cc3f\",\"name\":\"Kloepfel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8955c00d71697605255f7a539929f586cfb7a1d49194619267854f619473555c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8955c00d71697605255f7a539929f586cfb7a1d49194619267854f619473555c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8955c00d71697605255f7a539929f586cfb7a1d49194619267854f619473555c?s=96&d=mm&r=g\",\"caption\":\"Kloepfel\"},\"url\":\"https:\\\/\\\/kloepfel-magazin.com\\\/en\\\/author\\\/kloepfel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself | Kloepfel Magazin","description":"Social engineering threatens corporate security by exploiting human error. Learn how to protect yourself with targeted security measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/","og_locale":"en_US","og_type":"article","og_title":"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself","og_description":"Social engineering threatens corporate security by exploiting human error. Learn how to protect yourself with targeted security measures.","og_url":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/","og_site_name":"Kloepfel Magazin","article_published_time":"2025-02-19T10:09:54+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/kloepfel-magazin.com\/wp-content\/uploads\/2025\/02\/Lieferketten-Social-Engineering-1.jpg","type":"image\/jpeg"}],"author":"Kloepfel","twitter_card":"summary_large_image","twitter_title":"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself","twitter_description":"Social engineering threatens corporate security by exploiting human error. Learn how to protect yourself with targeted security measures.","twitter_image":"https:\/\/kloepfel-magazin.com\/wp-content\/uploads\/2025\/02\/Lieferketten-Social-Engineering-1.jpg","twitter_misc":{"Written by":"Kloepfel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/#article","isPartOf":{"@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/"},"author":{"name":"Kloepfel","@id":"https:\/\/kloepfel-magazin.com\/#\/schema\/person\/9e3a36d7d394f66eb9f2743103d9cc3f"},"headline":"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself","datePublished":"2025-02-19T10:09:54+00:00","mainEntityOfPage":{"@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/"},"wordCount":737,"commentCount":0,"publisher":{"@id":"https:\/\/kloepfel-magazin.com\/#organization"},"image":{"@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/#primaryimage"},"thumbnailUrl":"https:\/\/kloepfel-magazin.com\/wp-content\/uploads\/2025\/02\/Lieferketten-Social-Engineering-1.jpg","articleSection":["Whitepaper"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/","url":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/","name":"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself | Kloepfel Magazin","isPartOf":{"@id":"https:\/\/kloepfel-magazin.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/#primaryimage"},"image":{"@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/#primaryimage"},"thumbnailUrl":"https:\/\/kloepfel-magazin.com\/wp-content\/uploads\/2025\/02\/Lieferketten-Social-Engineering-1.jpg","datePublished":"2025-02-19T10:09:54+00:00","description":"Social engineering threatens corporate security by exploiting human error. Learn how to protect yourself with targeted security measures.","breadcrumb":{"@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/#primaryimage","url":"https:\/\/kloepfel-magazin.com\/wp-content\/uploads\/2025\/02\/Lieferketten-Social-Engineering-1.jpg","contentUrl":"https:\/\/kloepfel-magazin.com\/wp-content\/uploads\/2025\/02\/Lieferketten-Social-Engineering-1.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/kloepfel-magazin.com\/en\/whitepaper\/supply-chain-security-social-engineering-11312\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/kloepfel-magazin.com\/"},{"@type":"ListItem","position":2,"name":"Supply Chain Security: The ABCs of Social Engineering and How to Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/kloepfel-magazin.com\/#website","url":"https:\/\/kloepfel-magazin.com\/","name":"Kloepfel Magazin","description":"Das Magazin f\u00fcr den effektiveren Einkauf!","publisher":{"@id":"https:\/\/kloepfel-magazin.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kloepfel-magazin.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kloepfel-magazin.com\/#organization","name":"Kloepfel Magazin","url":"https:\/\/kloepfel-magazin.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kloepfel-magazin.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.kloepfel-magazin.com\/wp-content\/uploads\/2019\/02\/kloepfel-magazin200@2x.png","contentUrl":"https:\/\/www.kloepfel-magazin.com\/wp-content\/uploads\/2019\/02\/kloepfel-magazin200@2x.png","width":400,"height":126,"caption":"Kloepfel Magazin"},"image":{"@id":"https:\/\/kloepfel-magazin.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kloepfel-magazin.com\/#\/schema\/person\/9e3a36d7d394f66eb9f2743103d9cc3f","name":"Kloepfel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8955c00d71697605255f7a539929f586cfb7a1d49194619267854f619473555c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8955c00d71697605255f7a539929f586cfb7a1d49194619267854f619473555c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8955c00d71697605255f7a539929f586cfb7a1d49194619267854f619473555c?s=96&d=mm&r=g","caption":"Kloepfel"},"url":"https:\/\/kloepfel-magazin.com\/en\/author\/kloepfel\/"}]}},"_links":{"self":[{"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/posts\/11312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/comments?post=11312"}],"version-history":[{"count":2,"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/posts\/11312\/revisions"}],"predecessor-version":[{"id":11315,"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/posts\/11312\/revisions\/11315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/media\/11313"}],"wp:attachment":[{"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/media?parent=11312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/categories?post=11312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kloepfel-magazin.com\/en\/wp-json\/wp\/v2\/tags?post=11312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}