{"id":1980,"date":"2021-09-05T23:40:18","date_gmt":"2021-09-05T23:40:18","guid":{"rendered":"https:\/\/lockthemes.com\/micron\/?page_id=1980"},"modified":"2023-04-18T13:33:03","modified_gmt":"2023-04-18T13:33:03","slug":"faqs","status":"publish","type":"page","link":"https:\/\/nguard.swiss\/en\/faqs\/","title":{"rendered":"FAQs"},"content":{"rendered":"<style>.elementor-1980 .elementor-element.elementor-element-b2251bf:not(.elementor-motion-effects-element-type-background), .elementor-1980 .elementor-element.elementor-element-b2251bf > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:transparent;background-image:radial-gradient(at center center, var( --e-global-color-4e0a737 ) 0%, var( --e-global-color-16936c0 ) 100%);}.elementor-1980 .elementor-element.elementor-element-b2251bf{transition:background 0.3s, border 0.3s, border-radius 0.3s, box-shadow 0.3s;padding:25px 0px 25px 0px;}.elementor-1980 .elementor-element.elementor-element-b2251bf > .elementor-background-overlay{transition:background 0.3s, border-radius 0.3s, opacity 0.3s;}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );color:var( --e-global-color-primary );}.elementor-1980 .elementor-element.elementor-element-0b2019e .elementor-heading-title{font-family:\"Roboto\", Sans-serif;font-size:2em;font-weight:400;letter-spacing:-0.5px;color:#FFFFFF;}.elementor-1980 .elementor-element.elementor-element-d49afb2 > .elementor-container{max-width:1170px;}.elementor-1980 .elementor-element.elementor-element-d49afb2 > .elementor-background-overlay{opacity:0.41;}.elementor-1980 .elementor-element.elementor-element-d49afb2{margin-top:10px;margin-bottom:0px;padding:30px 0px 30px 0px;}.elementor-1980 .elementor-element.elementor-element-ec552d9 > .elementor-container{max-width:1170px;}.elementor-1980 .elementor-element.elementor-element-352fc02{text-align:center;}.elementor-1980 .elementor-element.elementor-element-352fc02 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;font-size:16px;font-weight:600;text-transform:uppercase;color:var( --e-global-color-4e0a737 );}.elementor-1980 .elementor-element.elementor-element-352fc02 > .elementor-widget-container{margin:0px 0px 11px 0px;}.elementor-widget-text-editor{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );color:var( --e-global-color-text );}.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:var( --e-global-color-primary );}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap, .elementor-widget-text-editor.elementor-drop-cap-view-default .elementor-drop-cap{color:var( --e-global-color-primary );border-color:var( --e-global-color-primary );}.elementor-1980 .elementor-element.elementor-element-998be8c{text-align:center;font-family:\"Hind\", Sans-serif;font-size:52px;font-weight:700;line-height:1em;color:var( --e-global-color-66d36bc );}.elementor-1980 .elementor-element.elementor-element-998be8c > .elementor-widget-container{margin:0px 0px 0px 0px;padding:0px 0px 0px 0px;}.elementor-widget-divider{--divider-color:var( --e-global-color-secondary );}.elementor-widget-divider .elementor-divider__text{color:var( --e-global-color-secondary );font-family:var( --e-global-typography-secondary-font-family ), Sans-serif;font-weight:var( --e-global-typography-secondary-font-weight );}.elementor-widget-divider.elementor-view-stacked .elementor-icon{background-color:var( --e-global-color-secondary );}.elementor-widget-divider.elementor-view-framed .elementor-icon, .elementor-widget-divider.elementor-view-default .elementor-icon{color:var( --e-global-color-secondary );border-color:var( --e-global-color-secondary );}.elementor-widget-divider.elementor-view-framed .elementor-icon, .elementor-widget-divider.elementor-view-default .elementor-icon svg{fill:var( --e-global-color-secondary );}.elementor-1980 .elementor-element.elementor-element-7b290da{--divider-border-style:solid;--divider-color:#CCCCCC;--divider-border-width:1px;}.elementor-1980 .elementor-element.elementor-element-7b290da .elementor-divider-separator{width:10%;margin:0 auto;margin-center:0;}.elementor-1980 .elementor-element.elementor-element-7b290da .elementor-divider{text-align:center;padding-block-start:15px;padding-block-end:15px;}.elementor-1980 .elementor-element.elementor-element-a7f3067{margin-top:0px;margin-bottom:0px;padding:0px 0px 0px 0px;}.elementor-1980 .elementor-element.elementor-element-1f14441.elementor-column > .elementor-widget-wrap{justify-content:flex-start;}.elementor-widget-accordion .elementor-accordion-icon, .elementor-widget-accordion .elementor-accordion-title{color:var( --e-global-color-primary );}.elementor-widget-accordion .elementor-accordion-icon svg{fill:var( --e-global-color-primary );}.elementor-widget-accordion .elementor-active .elementor-accordion-icon, .elementor-widget-accordion .elementor-active .elementor-accordion-title{color:var( --e-global-color-accent );}.elementor-widget-accordion .elementor-active .elementor-accordion-icon svg{fill:var( --e-global-color-accent );}.elementor-widget-accordion .elementor-accordion-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );}.elementor-widget-accordion .elementor-tab-content{color:var( --e-global-color-text );font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-accordion-item{border-width:0px;}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-accordion-item .elementor-tab-content{border-width:0px;}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-accordion-item .elementor-tab-title.elementor-active{border-width:0px;}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-tab-title{background-color:#FFFFFF;padding:25px 25px 25px 25px;}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-accordion-icon, .elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-accordion-title{color:var( --e-global-color-ba5fa0f );}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-accordion-icon svg{fill:var( --e-global-color-ba5fa0f );}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-active .elementor-accordion-icon, .elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-active .elementor-accordion-title{color:var( --e-global-color-4e0a737 );}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-active .elementor-accordion-icon svg{fill:var( --e-global-color-4e0a737 );}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-accordion-title{font-family:\"Hind\", Sans-serif;font-weight:600;}.elementor-1980 .elementor-element.elementor-element-dd64ecc .elementor-tab-content{background-color:#FFFFFF;color:#9E9DA4;font-family:\"Hind\", Sans-serif;font-weight:400;line-height:1.4em;padding:1px 25px 25px 25px;}.elementor-1980 .elementor-element.elementor-element-2f64e5e.elementor-column > .elementor-widget-wrap{justify-content:flex-start;}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-accordion-item{border-width:0px;}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-accordion-item .elementor-tab-content{border-width:0px;}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-accordion-item .elementor-tab-title.elementor-active{border-width:0px;}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-tab-title{background-color:#FFFFFF;padding:25px 25px 25px 25px;}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-accordion-icon, .elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-accordion-title{color:var( --e-global-color-ba5fa0f );}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-accordion-icon svg{fill:var( --e-global-color-ba5fa0f );}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-active .elementor-accordion-icon, .elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-active .elementor-accordion-title{color:var( --e-global-color-4e0a737 );}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-active .elementor-accordion-icon svg{fill:var( --e-global-color-4e0a737 );}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-accordion-title{font-family:\"Hind\", Sans-serif;font-weight:600;}.elementor-1980 .elementor-element.elementor-element-a9a15be .elementor-tab-content{background-color:#FFFFFF;color:#9E9DA4;font-family:\"Hind\", Sans-serif;font-weight:400;line-height:1.4em;padding:1px 25px 25px 25px;}.elementor-1980 .elementor-element.elementor-element-41c61f4{padding:50px 0px 100px 0px;}.elementor-1980 .elementor-element.elementor-element-df8edbb{text-align:center;}.elementor-1980 .elementor-element.elementor-element-df8edbb .elementor-heading-title{color:var( --e-global-color-4e0a737 );}.elementor-1980 .elementor-element.elementor-element-807e623{padding:0px 200px 0px 200px;}.elementor-widget-button .elementor-button{font-family:var( --e-global-typography-accent-font-family ), Sans-serif;font-weight:var( --e-global-typography-accent-font-weight );background-color:var( --e-global-color-accent );}.elementor-1980 .elementor-element.elementor-element-fb2a68e .elementor-button{font-family:\"Hind\", Sans-serif;font-weight:700;fill:#FFFFFF;color:#FFFFFF;background-color:var( --e-global-color-4e0a737 );border-radius:5px 5px 5px 5px;padding:15px 25px 15px 25px;}.elementor-1980 .elementor-element.elementor-element-fb2a68e .elementor-button:hover, .elementor-1980 .elementor-element.elementor-element-fb2a68e .elementor-button:focus{background-color:var( --e-global-color-16936c0 );}.elementor-1980 .elementor-element.elementor-element-7f339a1 .elementor-button{font-family:\"Hind\", Sans-serif;font-weight:700;fill:#FFFFFF;color:#FFFFFF;background-color:var( --e-global-color-4e0a737 );border-radius:5px 5px 5px 5px;padding:15px 25px 15px 25px;}.elementor-1980 .elementor-element.elementor-element-7f339a1 .elementor-button:hover, .elementor-1980 .elementor-element.elementor-element-7f339a1 .elementor-button:focus{background-color:var( --e-global-color-16936c0 );}@media(max-width:767px){.elementor-1980 .elementor-element.elementor-element-d49afb2{padding:40px 0px 0px 0px;}.elementor-1980 .elementor-element.elementor-element-352fc02 > .elementor-widget-container{margin:0px 0px 0px 0px;}.elementor-1980 .elementor-element.elementor-element-998be8c{font-size:30px;}.elementor-1980 .elementor-element.elementor-element-807e623{padding:0px 0px 0px 0px;}}<\/style>\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1980\" class=\"elementor elementor-1980\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2251bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2251bf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e5c81a\" data-id=\"4e5c81a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b2019e elementor-widget elementor-widget-heading\" data-id=\"0b2019e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d49afb2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d49afb2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f38be3d\" data-id=\"f38be3d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ec552d9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec552d9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ce1097a\" data-id=\"ce1097a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-352fc02 elementor-widget elementor-widget-heading\" data-id=\"352fc02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">FAQ<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-998be8c elementor-widget elementor-widget-text-editor\" data-id=\"998be8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tPopular questions\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b290da elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7b290da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a7f3067 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a7f3067\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1f14441\" data-id=\"1f14441\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd64ecc mc-faq-01 shadow-on elementor-widget elementor-widget-accordion\" data-id=\"dd64ecc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2321\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2321\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What does the Cyber Security Protection Concept mean and what does my company have to do ?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2321\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2321\"><p>The concept of Cyber Security Protection refers to measures and strategies developed to protect digital systems, networks and data from cyber threats such as hacker attacks, malware, phishing attacks and data theft. Here are some important aspects of the concept of Cyber Security Protection:<\/p><p>1. Access Control: rules and procedures to monitor and manage access permissions to digital systems and data.<\/p><p>2. Encryption: procedures for converting information into an unreadable form to ensure that only authorised persons have access to it.<\/p><p>3. Firewalls: Hardware or software systems that protect the network from unwanted access.<\/p><p>4. Malware protection: Technologies and procedures to detect and remove malware such as viruses, spyware and ransomware.<\/p><p>5. Phishing protection: Measures to prevent phishing attacks that trick users into sharing confidential information.<\/p><p>6. Threat monitoring and response: Monitoring systems and networks to detect threats and responding to those threats to combat them.<\/p><p>7. Awareness and training: Raising user awareness of cyber threats and training users to prevent security breaches.<\/p><p>These and other measures are important to ensure Cyber Security Protection and that digital systems, networks and data are protected from threats.<\/p><p>We would be happy to advise you on what you can do in detail.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2322\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2322\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What means a concept of Cyber Security Protection and what do I have to do?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2322\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2322\"><p>I need to protec all Endpoints, like Laptop, Servers, Firewall, WLAN Router and Mobile Devices and monitor them by a SOC plattform. I need a plan of my network and branches with all devices to be aware and then I start to make a risk analyses to get out, what is to be proteced and how.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2323\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2323\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Don't only large companies need cyber security protection?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2323\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2323\"><p>No, small and medium-sized enterprises (SMEs) are welcome targets for cyber threats. This is because attack requirements are often less complex and employees are more vulnerable to social engineering attacks.<\/p><p>Here are some common threats SMEs face:<\/p><p>1.Phishing attacks: Phishing attacks use fake emails to trick users into revealing confidential information.<\/p><p>2. Ransomware attacks: Ransomware attacks encrypt data and demand a ransom to restore access.<\/p><p>3. Malware attacks: Malware attacks install malware on computer systems that can steal data or cripple systems.<\/p><p>4. Social engineering attacks: Social engineering attacks use human persuasion to get users to share confidential information.<\/p><p>5. Network attacks: Network attacks use vulnerabilities in networks to gain access to confidential information.<\/p><p>It is important that SMEs protect their systems and data against these and other cyber threats by implementing measures such as firewalls, antivirus software, regular backups and training for their employees. This can help prevent data loss and downtime and minimise the risk of a successful attack.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2324\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2324\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What should I protect?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2324\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2324\"><p>All devices with internet access, such as laptops, servers, firewalls, WLAN routers and mobile devices.<\/p><p>Furthermore, the protection goes beyond the hardware to the people who can best react to cyber threats with our awareness trainings.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2325\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2325\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is a SOC?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2325\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2325\"><p>A Security Operations Centre (SOC) is a department or unit in a company that focuses on monitoring and managing information security. The goal of a SOC is to detect, analyse and combat threats to the IT infrastructure to prevent data loss, theft of sensitive information and other security threats.<\/p><p>A SOC uses technologies such as monitoring software, network and system analysis, threat detection and assessment to ensure that the organisation is protected against threats and attacks. The staff or service provider of a SOC works closely with the IT team and the information security team to ensure that security policies and procedures are effectively implemented.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2326\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2326\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is meant by the Zero Trust approach ?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2326\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2326\"><p>The zero trust approach is a concept for information security where every user and device on the network is considered insecure until their identity and integrity have been confirmed. It is about having no automatic trust in users, devices or networks and instead verifying every interaction and transmission of data in real time. This includes monitoring and protecting internal networks and resources, not just external threats. The zero trust approach helps prevent data loss, data theft and other threats to information security.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2327\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-2327\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Blue team, red team, what ?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2327\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-2327\"><p>Das \u201cblaue Team\u201d und das \u201crote Team\u201d sind Begriffe aus dem Bereich der Cybersicherheit, die sich auf unterschiedliche Rollen beziehen.<\/p><p>Das \u201cblaue Team\u201d bezeichnet das Verteidigungsteam, das die Netzwerke und Systeme eines Unternehmens sch\u00fctzt. Es ist verantwortlich f\u00fcr die \u00dcberwachung und \u00dcberpr\u00fcfung der Sicherheitssysteme und -prozesse, um Bedrohungen zu erkennen und zu bek\u00e4mpfen.<\/p><p>Das \u201crote Team\u201d bezeichnet das Angriffsteam, das simulierte Angriffe auf die Netzwerke und Systeme eines Unternehmens durchf\u00fchrt. Es ist verantwortlich f\u00fcr die Simulation von Bedrohungen, um das blaue Team zu testen und seine F\u00e4higkeiten im Umgang mit Bedrohungen zu verbessern.<\/p><p>Durch den Einsatz von blauen und roten Teams kann ein Unternehmen seine Cybersicherheit verbessern, indem es die Schwachstellen in seinen Systemen identifiziert und behebt. Au\u00dferdem kann es das Wissen und die F\u00e4higkeiten seiner IT-Sicherheitsteams verbessern, um zuk\u00fcnftigen Angriffen besser gewachsen zu sein.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2f64e5e\" data-id=\"2f64e5e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a9a15be mc-faq-01 shadow-on elementor-widget elementor-widget-accordion\" data-id=\"a9a15be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1771\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1771\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">What is n'guard.swiss ?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1771\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1771\"><p>The brand n&#8217;guard.swiss originally emerged as an idea from the cyber security division of n&#8217;cloud.swiss AG.<\/p><p>A cloud solution hosted entirely in one&#8217;s own data centre requires a high and complex security architecture simply because of the natural zero-trust approach (multi-tenancy) and the high requirement to secure customer data. This is usually more complex, stronger and more expensive than in an SME.<\/p><p>Therefore, in addition to the SME security requirement, all other security requirements had to be implemented correctly.<\/p><p>In the case of a backup solution, the backup solution is only considered to be correctly implemented if the recovery also functions cleanly and as expected.<\/p><p>The same principle applies here for cyber security. Only if the defensive security implementations such as endpoints, firewalls, but also BCM processes, among others, pass a simulated attack, or rather a stress test, is the defensive security considered to be correctly implemented.<\/p><p>In order to guarantee the security standards, these must of course also be constantly tested and &#8220;stressed&#8221; by a Red Team. We do this constantly for our cloud implementation and from this experience we have developed a business model that we can offer as a service to our cloud customers as well as customers with onpremise or AWS or Microsoft cloud implementations.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1772\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1772\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Does n'guard (n'cloud.swiss AG) offer a SOC?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1772\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1772\"><p>Yes, we work with WatchGuard&#8217;s platform and other SIEM tools and have a team that monitors all activities every day. This allows us to offer our clients a high standard of security.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1773\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1773\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Why are we working with WatchGuard?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1773\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1773\"><p>WatchGuard, in combination with our SIEM tools, offers the best security concept for small and medium-sized enterprises and this at fair prices.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1774\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1774\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Does n'cloud.swiss AG also offer other services ?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1774\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1774\"><p>Yes, we have been a cloud computing pioneer since 2010 and offer various cloud services related to cyber security. Besides the CyberSecurity division, we offer secure mail solution, HomeOffice and encryption services. You can find more information on our website: https:\/\/ncloud.swiss<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1775\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1775\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Is a backup & system recovery strategy necessary if I use a Cyber Security Protection solution ?<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1775\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1775\"><p>A backup and disaster recovery strategy is an important part of a comprehensive cybersecurity plan, especially after a hacker attack. Here are some important points for such a strategy:<\/p><p>1. Regular backups: make sure you regularly back up your data so that you have an up-to-date copy of your data after an attack.<\/p><p>2. Offsite backups: Store backups in a secure location, ideally in our Swiss Made Backup Cloud outside your network, to ensure that you can access your data even if your network is attacked.<\/p><p>3. Test your backups: Check regularly that your backups are working and that you can access them.<\/p><p>4. Plan for the worst case scenario: Make sure you have a plan to recover your data and systems even if the worst happens.<\/p><p>5. Monitor your networks: Monitor your networks and systems regularly to detect and address threats early.<\/p><p>6. Rehearse your disaster recovery plans: Rehearse your disaster recovery plans regularly to ensure your team is ready to act quickly and effectively in the event of an attack.<\/p><p>We will be happy to advise you so that you are optimally prepared for a hacker attack and can quickly recover your data and systems should a breach occur.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41c61f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41c61f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40600e2\" data-id=\"40600e2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-df8edbb elementor-widget elementor-widget-heading\" data-id=\"df8edbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect your business today:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-807e623 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"807e623\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0ee0bea\" data-id=\"0ee0bea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb2a68e elementor-align-right elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"fb2a68e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/nguard.swiss\/en\/nguard-cyber-security\/#checkourprices\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request a Quote<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-89769ef\" data-id=\"89769ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f339a1 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"7f339a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/nguard.swiss\/en\/nguard-products\/watchguard-endpoint-management-demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get a Demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Frequently Asked Questions FAQ Popular questions What does the Cyber Security Protection Concept mean and what does my company have to do ? The concept of Cyber Security Protection refers to measures and strategies developed to protect digital systems, networks and data from cyber threats such as hacker attacks, malware, phishing attacks and data theft&#8230;.<\/p>\n","protected":false},"author":2,"featured_media":4482,"parent":0,"menu_order":26,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"%%post_title%% %%sep%% %%sitetitle%%","_seopress_titles_desc":"Get the answers to your FAQs (frequently asked questions). We hope you may have some customized queries to ask more. We appreciate your queries.","_seopress_robots_index":"","_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"class_list":["post-1980","page","type-page","status-publish","has-post-thumbnail","hentry"],"taxonomy_info":[],"featured_image_src_large":["https:\/\/nguard.swiss\/en\/wp-content\/uploads\/2022\/08\/nguard-faqs-1024x629.png",1024,629,true],"author_info":{"display_name":"Info Team","author_link":"https:\/\/nguard.swiss\/en\/author\/infoteam\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/nguard.swiss\/en\/wp-json\/wp\/v2\/pages\/1980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nguard.swiss\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nguard.swiss\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nguard.swiss\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nguard.swiss\/en\/wp-json\/wp\/v2\/comments?post=1980"}],"version-history":[{"count":69,"href":"https:\/\/nguard.swiss\/en\/wp-json\/wp\/v2\/pages\/1980\/revisions"}],"predecessor-version":[{"id":8203,"href":"https:\/\/nguard.swiss\/en\/wp-json\/wp\/v2\/pages\/1980\/revisions\/8203"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nguard.swiss\/en\/wp-json\/wp\/v2\/media\/4482"}],"wp:attachment":[{"href":"https:\/\/nguard.swiss\/en\/wp-json\/wp\/v2\/media?parent=1980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}