{"id":4632,"date":"2019-06-19T15:00:53","date_gmt":"2019-06-19T13:00:53","guid":{"rendered":"https:\/\/qwertz.robin-data.io\/?p=4632"},"modified":"2025-01-22T10:13:08","modified_gmt":"2025-01-22T09:13:08","slug":"data-protection-breach-hacker-capture-customer-data","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-hacker-capture-customer-data","title":{"rendered":"Hackers steal customer data in medium-sized businesses"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3lfhzq-d8a88d342e55a3b19801ffa26e41f8cc\">\n.flex_column.av-3lfhzq-d8a88d342e55a3b19801ffa26e41f8cc{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-3lfhzq-d8a88d342e55a3b19801ffa26e41f8cc av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-krf3me2q-be6a212d9123766998d394eabaeb39b3'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\">Data Protection News<\/a> \u00bb <strong>Hackers steal customer data in medium-sized businesses<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ke41jx3q-ce14b617113bf43c578fab342f6136d2\">\n.avia-image-container.av-ke41jx3q-ce14b617113bf43c578fab342f6136d2 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-ke41jx3q-ce14b617113bf43c578fab342f6136d2 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-ke41jx3q-ce14b617113bf43c578fab342f6136d2 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  avia-builder-el-last'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14081 avia-img-lazy-loading-not-14081 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg\" alt='Hackers steal customer data in medium-sized businesses' title=''  height=\"343\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne-300x150.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7icqe-6e82a5c552625b1cbcff3354a906a6b2\">\n.flex_column.av-7icqe-6e82a5c552625b1cbcff3354a906a6b2{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-7icqe-6e82a5c552625b1cbcff3354a906a6b2 av_one_full  avia-builder-el-3  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-32vfug-15c1dab288045298eb1b5d84656dce1b\">\n#top .av-special-heading.av-32vfug-15c1dab288045298eb1b5d84656dce1b{\npadding-bottom:10px;\ncolor:#303440;\n}\nbody .av-special-heading.av-32vfug-15c1dab288045298eb1b5d84656dce1b .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-32vfug-15c1dab288045298eb1b5d84656dce1b .special-heading-inner-border{\nborder-color:#303440;\n}\n.av-special-heading.av-32vfug-15c1dab288045298eb1b5d84656dce1b .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-32vfug-15c1dab288045298eb1b5d84656dce1b av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-4  el_before_av_textblock  avia-builder-el-first'><h1 class='av-special-heading-tag'  itemprop=\"headline\"  >Hackers steal customer data in medium-sized businesses<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-ke41kypj-357d8f01b446243a282fc38f9ce94263'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><strong>Responsible body:<\/strong>\u00a0IPC Computer, Seelbach<\/p>\n<h2>Type of data breach: Automated hacker attack presumably from abroad, hackers capture 221,000 customer data in medium-sized businesses<\/h2>\n<p><strong>Categories of data concerned:\u00a0<\/strong>Name, e-mail addresses, encrypted passwords, 1% additional address data<\/p>\n<p><strong>Legal classification:\u00a0<\/strong>Reportable data range<\/p>\n<p><strong>Practical tip:\u00a0<\/strong>The safety of the processing is in <a href=\"https:\/\/help.robin-data.io\/artikel-32-dsgvo\">Article 32 GDPR<\/a> anchored. This shows that the encrypted storage of customer passwords was able to prevent greater damage. In principle, mobile data carriers (laptops, mobile phones, USB sticks, etc.) should be encrypted to protect data in the event of loss.<\/p>\n<p><strong>Help for those affected:<\/strong>\u00a0<a href=\"http:\/\/www.ipc-computer.de\/content\/datenschutz-faq\" target=\"_blank\" rel=\"nofollow noopener\">FAQ IPC Computer<\/a><\/p>\n<p><strong>Country:\u00a0<\/strong>Germany, BW<\/p>\n<p><strong>Fines:\u00a0<\/strong>not reported<\/p>\n<p><strong>Source<\/strong>:\u00a0<a href=\"https:\/\/www.lahrer-zeitung.de\/inhalt.seelbach-hacker-erbeuten-kundendaten.c50d8207-0836-4a88-b2d2-4d8823a6c04b.html\" target=\"_blank\" rel=\"nofollow noopener\">Lahrer newspaper<\/a><\/p>\n<p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/examples-for-gdpr-data-breaches\" rel=\" noopener\">Back to the overview of the data breaches<\/a><\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-k9chhpx2-ae90dc8239abe94f83aa23d18c5ebb00-wrap avia-button-left  avia-builder-el-6  el_after_av_textblock  avia-builder-el-last'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-k9chhpx2-ae90dc8239abe94f83aa23d18c5ebb00\">\n#top #wrap_all .avia-button.av-k9chhpx2-ae90dc8239abe94f83aa23d18c5ebb00{\nbackground-color:#127db3;\nborder-color:#127db3;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-k9chhpx2-ae90dc8239abe94f83aa23d18c5ebb00 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.robin-data.io\/en\/events\/demo'  class='avia-button av-k9chhpx2-ae90dc8239abe94f83aa23d18c5ebb00 av-link-btn avia-icon_select-no avia-size-medium avia-position-left'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Book demo\"><span class='avia_iconbox_title' >Book demo<\/span><\/a><\/div><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-7  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-9  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-hacker-capture-customer-data&#038;t=Hacker%20erbeuten%20Kundendaten%20im%20Mittelstand' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Hacker%20erbeuten%20Kundendaten%20im%20Mittelstand&#038;url=https:\/\/www.robin-data.io\/en\/?p=4632' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Hacker%20erbeuten%20Kundendaten%20im%20Mittelstand&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-hacker-capture-customer-data' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Hacker%20erbeuten%20Kundendaten%20im%20Mittelstand&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-hacker-capture-customer-data' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-10  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: center;\">This might interest you too:<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-12  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-13  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-2811 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-klarna-autofill' data-rel='slide-1' class='slide-image' title='Data breach at Klarna: Third party data visible'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne-495x343.jpg\" class=\"wp-image-14081 avia-img-lazy-loading-not-14081 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Data breach at Klarna: Third-party data accessible\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-klarna-autofill' title='Data breach at Klarna: Third party data visible'>Data breach at Klarna: Third party data visible<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Entering a postcode and e-mail was sufficient to view third party data. The autofill function is to blame.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-klarna-autofill\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2020-02-19T10:55:12+01:00\" >19 February 2020<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-klarna-autofill#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-19T15:00:53+02:00\" >2020-02-19 10:55:12<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:37:48<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Data breach at Klarna: Third party data visible<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-2827 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed' data-rel='slide-1' class='slide-image' title='Data breach Microsoft customer records leaked'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne-495x343.jpg\" class=\"wp-image-14081 avia-img-lazy-loading-not-14081 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Data breach Microsoft customer data records leaked\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed' title='Data breach Microsoft customer records leaked'>Data breach Microsoft customer records leaked<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >In December 2019, 250 million support requests to Microsoft were available online for two days. Security researchers reported the data breach to Microsoft.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2020-01-24T14:20:26+01:00\" >January 24, 2020<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-breach-microsoft-customer-records-exposed#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-19T15:00:53+02:00\" >2020-01-24 14:20:26<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-22 09:17:35<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Data breach Microsoft customer records leaked<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-2617 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-british-government-exposes-private-addresses' data-rel='slide-1' class='slide-image' title='British government published private addresses of stars'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne-495x343.jpg\" class=\"wp-image-14081 avia-img-lazy-loading-not-14081 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: British government makes private addresses of stars public\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-british-government-exposes-private-addresses' title='British government published private addresses of stars'>British government published private addresses of stars<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/news\" rel=\"tag\">News<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >The British government publishes the addresses of around 1000 celebrities, politicians and private individuals who receive the traditional New Year's honours.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-british-government-exposes-private-addresses\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2019-12-30T09:37:46+01:00\" >December 30, 2019<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-british-government-exposes-private-addresses#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2019-06-19T15:00:53+02:00\" >2019-12-30 09:37:46<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-22 09:18:56<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>British government published private addresses of stars<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Automated hacker attack presumably from abroad, 221,000 captured customer data.<\/p>","protected":false},"author":3,"featured_media":14081,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[104],"class_list":["post-4632","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-datenpanne"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hacker erbeuten Kundendaten im Mittelstand | News<\/title>\n<meta name=\"description\" content=\"Automatisierter Hackerangriff vermutlich aus dem Ausland, 221.000 erbeutete Kundendaten. Erfahren Sie jetzt mehr!\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacker erbeuten Kundendaten im Mittelstand\" \/>\n<meta property=\"og:description\" content=\"Automatisierter Hackerangriff vermutlich aus dem Ausland, 221.000 erbeutete Kundendaten. Erfahren Sie jetzt mehr!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-hacker-capture-customer-data\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-19T13:00:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-22T09:13:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Caroline Schwabe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Caroline Schwabe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand\"},\"author\":{\"name\":\"Caroline Schwabe\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"headline\":\"Hacker erbeuten Kundendaten im Mittelstand\",\"datePublished\":\"2019-06-19T13:00:53+00:00\",\"dateModified\":\"2025-01-22T09:13:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand\"},\"wordCount\":1082,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg\",\"keywords\":[\"Datenpanne\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand\",\"name\":\"Hacker erbeuten Kundendaten im Mittelstand | News\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg\",\"datePublished\":\"2019-06-19T13:00:53+00:00\",\"dateModified\":\"2025-01-22T09:13:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"description\":\"Automatisierter Hackerangriff vermutlich aus dem Ausland, 221.000 erbeutete Kundendaten. Erfahren Sie jetzt mehr!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg\",\"width\":685,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacker erbeuten Kundendaten im Mittelstand\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\",\"name\":\"Caroline Schwabe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"caption\":\"Caroline Schwabe\"},\"description\":\"Frau Schwabe ist Informationsdesignerin und Datenschutzbeauftragte. Der Schwerpunkt ihrer Arbeit liegt darin, Kunden und Interessenten mit Beitr\u00e4gen in der Robin Data Datenschutz-Akademie weiterzuhelfen.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/csc\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hackers steal customer data from mid-sized businesses | News","description":"Automated hacker attack presumably from abroad, 221,000 captured customer data. Learn more now!","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_GB","og_type":"article","og_title":"Hacker erbeuten Kundendaten im Mittelstand","og_description":"Automatisierter Hackerangriff vermutlich aus dem Ausland, 221.000 erbeutete Kundendaten. Erfahren Sie jetzt mehr!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/news\/data-protection-breach-hacker-capture-customer-data","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2019-06-19T13:00:53+00:00","article_modified_time":"2025-01-22T09:13:08+00:00","og_image":[{"width":685,"height":343,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg","type":"image\/jpeg"}],"author":"Caroline Schwabe","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Caroline Schwabe","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand"},"author":{"name":"Caroline Schwabe","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"headline":"Hacker erbeuten Kundendaten im Mittelstand","datePublished":"2019-06-19T13:00:53+00:00","dateModified":"2025-01-22T09:13:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand"},"wordCount":1082,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg","keywords":["Datenpanne"],"articleSection":["News"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand","name":"Hackers steal customer data from mid-sized businesses | News","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg","datePublished":"2019-06-19T13:00:53+00:00","dateModified":"2025-01-22T09:13:08+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"description":"Automated hacker attack presumably from abroad, 221,000 captured customer data. Learn more now!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150407\/Header-Datenpanne.jpg","width":685,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/news\/hacker-erbeuten-kundendaten-im-mittelstand#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Hacker erbeuten Kundendaten im Mittelstand"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5","name":"Caroline Schwabe","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","caption":"Caroline Schwabe"},"description":"Ms. Schwabe is an information designer and Data Protection Officer. The focus of her work is to help customers and interested parties with contributions to the Robin Data Privacy Academy.","url":"https:\/\/www.robin-data.io\/en\/author\/csc"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/4632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=4632"}],"version-history":[{"count":12,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/4632\/revisions"}],"predecessor-version":[{"id":9690,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/4632\/revisions\/9690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14081"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=4632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=4632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=4632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}