{"id":26492,"date":"2022-04-19T15:41:00","date_gmt":"2022-04-19T13:41:00","guid":{"rendered":"https:\/\/perseus.de\/cyber-risk\/"},"modified":"2026-03-30T09:48:27","modified_gmt":"2026-03-30T07:48:27","slug":"cyber-risk","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/cyber-risk\/","title":{"rendered":"Cyber risk"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26492\" class=\"elementor elementor-26492 elementor-22188\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-903eb1b e-con-full e-flex e-con e-child\" data-id=\"903eb1b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber risk\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25801\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26398665 e-flex e-con-boxed e-con e-parent\" data-id=\"26398665\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c02b1a e-con-full e-flex e-con e-child\" data-id=\"3c02b1a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Cyber risk is the possibility that something could happen to the information or IT components stored in your company that would cause significant damage to your company. Risk is measured at two levels: <\/p><p>How badly something could hurt your business and how likely it is.<\/p><h4> <\/h4><h4>What does the term cyber risk mean in detail?<\/h4><p>Typical examples of incidents that can harm businesses include:<\/p><ul><li>Loss of access to critical business or customer information<\/li><li>Unauthorized disclosure of business or customer information to third parties<\/li><li>Theft of money or other financial resources by technical means<\/li><\/ul><p>The likelihood of such a damaging incident depends on the steps your organization takes to ensure and protect the storage of information and access to IT resources. Since the damage scenarios are abstract and many of the assets at risk are intangible, cyber risks are often underestimated. This makes the potential of most companies to reduce or better manage these risks through appropriate measures. For example, raising awareness among employees can lead to a more critical approach to malicious emails and prevent incidents. And with frequent and regular backups, for example, after a server failure caused by force majeure, you can return to productive everyday work much faster.    <\/p><h4> <\/h4><h4>Where do I encounter cyber risks in my everyday work?<\/h4><p>Many everyday details of your day-to-day work affect your company&#8217;s cyber risk. For example, whether: <\/p><ul><li>Customer data is encrypted or stored freely accessible to all employees<\/li><li>Third-party USB sticks are checked for malware before connecting<\/li><li>user accounts of former employees still exist \u2013 all employees and departments work on the same network<\/li><li>Regular backups of all data are made and stored securely \u2013 employees connect their private smartphones to the company Wi-Fi<\/li><\/ul><h3> <\/h3><h4>What can I do to protect myself from cyber risks?<\/h4><p>Identify your organization&#8217;s cyber risk. Based on the results, you will know where your most important need for action is.<br>If you&#8217;re short on time, prioritize. Every measure reduces your cyber risk. Identify the biggest risk factors and start with them, e.g. raising awareness among your employees, updating your servers and creating regular backups.    <\/p><p>Use reliable sources of information such as the German Federal Office for Information Security (BSI) as a basis for decision-making<br>Consider insurance against cyber risks if, for example, production downtime could quickly put your business at risk<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1de57d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e1de57d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber risk Cyber risk is the possibility that something could happen to the information or IT components stored in your company that would cause significant damage to your company. Risk is measured at two levels: How badly something could hurt your business and how likely it is. What does the term cyber risk mean in [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[57],"tags":[],"class_list":["post-26492","post","type-post","status-publish","format-standard","hentry","category-cyber-glossary"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber risk - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/cyber-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber risk - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Cyber risk Cyber risk is the possibility that something could happen to the information or IT components stored in your company that would cause significant damage to your company. Risk is measured at two levels: How badly something could hurt your business and how likely it is. What does the term cyber risk mean in [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/cyber-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:41:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:48:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Cyber risk\",\"datePublished\":\"2022-04-19T13:41:00+00:00\",\"dateModified\":\"2026-03-30T07:48:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/\"},\"wordCount\":388,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyber Glossary\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/\",\"name\":\"Cyber risk - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:41:00+00:00\",\"dateModified\":\"2026-03-30T07:48:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/cyber-risk\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber risk - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/cyber-risk\/","og_locale":"en_US","og_type":"article","og_title":"Cyber risk - Perseus Technologies","og_description":"Cyber risk Cyber risk is the possibility that something could happen to the information or IT components stored in your company that would cause significant damage to your company. Risk is measured at two levels: How badly something could hurt your business and how likely it is. What does the term cyber risk mean in [&hellip;]","og_url":"https:\/\/perseus.de\/en\/cyber-risk\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:41:00+00:00","article_modified_time":"2026-03-30T07:48:27+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/cyber-risk\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/cyber-risk\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Cyber risk","datePublished":"2022-04-19T13:41:00+00:00","dateModified":"2026-03-30T07:48:27+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/cyber-risk\/"},"wordCount":388,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/cyber-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyber Glossary"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/cyber-risk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/cyber-risk\/","url":"https:\/\/perseus.de\/en\/cyber-risk\/","name":"Cyber risk - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/cyber-risk\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/cyber-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:41:00+00:00","dateModified":"2026-03-30T07:48:27+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/cyber-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/cyber-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/cyber-risk\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/cyber-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Cyber risk"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=26492"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26492\/revisions"}],"predecessor-version":[{"id":26493,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/26492\/revisions\/26493"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=26492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=26492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=26492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}