{"id":8195,"date":"2024-09-30T12:55:16","date_gmt":"2024-09-30T10:55:16","guid":{"rendered":"https:\/\/geissler-legal.de\/allgemein\/wenndann-todo-bei-cyber-angriff\/"},"modified":"2026-04-08T11:06:57","modified_gmt":"2026-04-08T09:06:57","slug":"seallora-cosa-fare-in-attacco-informatico","status":"publish","type":"post","link":"https:\/\/geissler-legal.de\/it\/rechtsbeitraege\/wenndann-todo-bei-cyber-angriff\/","title":{"rendered":"WennDann \u2013 Cosa fare in caso di attacco informatico"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<div>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div data-message-author-role=\"assistant\" data-message-id=\"406cf449-6a98-4712-929d-abb9f6a2d302\" dir=\"auto\" class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Cyberangriffe sind eine wachsende Bedrohung f\u00fcr KMU. Angesichts geopolitischer Spannungen ist es entscheidend, vorbereitet zu sein. Bei einem Angriff sollten sofort Ma\u00dfnahmen ergriffen werden: Angreifer stoppen, den Vorfall untersuchen und das Risiko f\u00fcr Betroffene bewerten. Langfristige Sicherheitsstrategien helfen, zuk\u00fcnftige Angriffe zu verhindern. Schnelles Handeln minimiert den Schaden und st\u00e4rkt die Sicherheit.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"author":2,"featured_media":8174,"menu_order":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[4],"tags":[1074,1099],"class_list":["post-8195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-rechtsbeitraege","tag-datenschutzrecht-ki-fuer-arbeitgeber","tag-roman-bosco-geissler"],"acf":{"header_address.Content":"","header_opening_hours.Content":"","header_phone_number.Content":"","child_entity.Value":"","001_page_meta.page_image10.Id":11,"001_page_meta.page_image9.Id":11,"001_page_meta.page_image8.Id":11,"001_page_meta.page_image7.Id":11,"001_page_meta.page_image6.Id":11,"001_page_meta.page_image5.Id":11,"001_page_meta.page_image4.Id":11,"001_page_meta.page_image3.Id":11,"001_page_meta.page_image2.Id":11,"001_page_meta.page_image1.Id":11,"0001_website_meta.site_logo.Id":5441,"galleries_enabled.Value":"true","multi_language_maps_enabled.Value":"false","001_page_meta.featured_image_mobile.Id":8174,"001_page_meta.featured_image.Id":8175,"001_page_meta.content_image_3.Id":null,"001_page_meta.content_image_2.Id":null,"001_page_meta.content_image_1.Id":null,"parent_entity.Value":"Roman Bosco Geissler","type_entity.Value":"rechtsbeitraege","0001_website_meta.site_logo_inverted.Id":null,"02_hero_content.hero_image3.Id":null,"02_hero_content.image_hero_content3.Id":null,"02_hero_content.image_hero_content2.Id":null,"02_hero_content.image_hero_content1.Id":null,"heading_hero_benefit3.Content":"","heading_hero_benefit2.Content":"","heading_hero_benefit1.Content":"","heading_hero_slider.Content":"","02_hero_content.hero_image8.Id":null,"02_hero_content.hero_image7.Id":null,"02_hero_content.hero_image6.Id":null,"02_hero_content.hero_image5.Id":null,"02_hero_content.hero_image4.Id":null,"top_heading_hero.Content":"Gei\u00dfler Legal - Kanzlei f\u00fcr Compliance & internationales Wirtschaftsrecht","02_hero_content.hero_image2.Id":null,"02_hero_content.hero_image1.Id":null,"hero_content_form_benefit2.Content":"","hero_content_form_benefit1.Content":"","hero_content_form_benefit3.Content":"","hero_content_form.Value":"","hero_gallery_enabled.Value":"false","main_heading_hero_cta.Value":"\/kontakt","main_heading_hero_cta.Attribute":"Kontakt","sub_heading_hero.Content":"Compliance optimierte Rechtsberatung f\u00fcr Ihre Gesch\u00e4ftst\u00e4tigkeit - ganzheitlich, l\u00e4nder\u00fcbergreifend, kosteneffizient.","main_heading_hero.Content":"WennDann - ToDo bei Cyber-Angriff","subheading_contact_form.Content":"","contact_area_contact_form_phone_text.Content":"","contact_area_contact_form_name_text.Content":"","contact_area_contact_form_message_text.Content":"","contact_area_contact_form_mail_text.Content":"","contact_area_contact_form_button_text.Content":"","contact_form.Value":"","contact_address.Content":"","opening_hours.Content":"","map.Value":"","heading_contact_form.Content":"","telephone.Value":"","e-mail.Value":"","e-mail.Attribute":"","calendly_enabled.Value":"false","contact_image_enabled.Value":"","contact_maps_enabled.Value":"","calendly_url.Value":"","calendly_url.Attribute":"","online_form_name.Content":"","online_form_source.Value":"","testimonial3_customer.Content":"","04_social_proof.testimonial1_image.Id":null,"04_social_proof.testimonial2_image.Id":null,"04_social_proof.testimonial3_image.Id":null,"04_social_proof.google_places_review_image.Id":null,"04_social_proof.social_proof_background_image.Id":null,"heading_social_proof.Content":"","google_places_id2.Value":"","google_places_id.Value":"","testimonial1_customer.Content":"","testimonial1_text.Content":"","testimonial2_customer.Content":"","testimonial3_text.Content":"","testimonial2_text.Content":"","custom_reviews_enabled.Value":"","anwalt_de_widgetcode.Value":"","anwalt_de_enabled.Value":"","google_places_enabled.Value":"","google_places_reviews_enabled2.Value":"","google_places_reviews_enabled.Value":"","google_places_review_url2.Value":"","subheading_social_proof.Content":"","google_places_review_url.Value":"","social_proof_enabled.Value":"true","social_proof_disclaimer.Content":"","benefit_1_text.Content":"","05a_benefit_area.benefit_3_image.Id":null,"05a_benefit_area.benefit_2_image.Id":null,"05a_benefit_area.benefit_1_image.Id":null,"05a_benefit_area_enabled.Value":"true","benefit_heading_enabled.value":"false","benefit_heading.Content":"","benefit_3_text.Content":"","benefit_3_heading.Content":"","benefit_3_icon.Id":"","benefit_2_text.Content":"","benefit_2_heading.Content":"","benefit_2_icon.Id":"","benefit_1_icon.Id":"","benefit_1_heading.Content":"","benefit_1_widgetcode.Content":"","benefit_2_widgetcode.Content":"","benefit_3_widgetcode.Content":"","intro_heading.Content":"Cyberangriffe: wie Sie als Unternehmer richtig reagieren","intro_text.Content":"<div>\n<p><span>Waren Cyberangriffe fr\u00fcher tendenziell ein Problem der gro\u00dfen Konzerne, w\u00e4chst die Gefahr auch f\u00fcr KMU angesichts der aufgeladenen politischen Lage insbesondere mit Russland, Nordkorea und L\u00e4ndern im Nahen Osten stetig. Cyberkriminelle agieren zunehmend breitfl\u00e4chig, professionell und nutzen Sicherheitsl\u00fccken in IT-Systemen ihrer sog. Targets rasch aus. Sie verwenden ausgekl\u00fcgelte Werkzeuge, um Schwachstellen zu identifizieren, und auch Betrugs- und Phishing-Versuche werden immer raffinierter. E-Learnings und zum Teil kostenintensive Trainings von globalen Compliance-Dienstleistern, die Arbeitgeber ihren Mitarbeitern angedeihen lassen, k\u00f6nnen nur noch begrenzt f\u00fcr die notwendige Sensibilisierung sorgen. Das macht es f\u00fcr Anwender in der Folge zunehmend schwerer, solche Bedrohungen fr\u00fchzeitig bzw. seismographisch zu erkennen. So besteht unter Experten aller Fachrichtungen (Legal, Compliance, IT etc.) Einigkeit dar\u00fcber, dass es nicht die Frage ist, <\/span><span>ob<\/span><span> eine Datenpanne bzw. ein Angriff passiert, sondern tendenziell nur <\/span><span><strong>wann<\/strong>. <\/span><span>Die folgenden Schritte sollen Ihnen einen Leitfaden an die Hand geben, was Sie im Falle des Falles tun k\u00f6nnen<\/span><\/p>\n<\/div>","intro_gallery_enabled.Value":"false","05a_content_intro_enabled.Value":"true","overview_heading.Content":"","overview_text.Content":"","overview_cta_lead_in.Content":"","overview_cta.Attribute":"","overview_cta.Value":"","05b_content_overview_enabled.Value":"true","detail_heading_opt2.Content":"Schritt-f\u00fcr-Schritt-Anleitung zur Reaktion auf einen Cyberangriff","05c_content_detail.image_product5.Id":null,"detail_text_opt2.Content":"<div>\n<p><strong>1. Angriff stoppen und Sch\u00e4den minimieren<\/strong><\/p>\n<p><span>Der erste Schritt ist, sofort zu pr\u00fcfen, welche Systeme betroffen sind, und diese vom Netzwerk zu isolieren. Ziel ist es, weiteren Schaden zu verhindern. Systeme, die nicht unmittelbar betroffen sind, sollten \u00fcberwacht werden, um m\u00f6gliche versteckte Hintert\u00fcren (Backdoors) zu entdecken.<\/span><\/p>\n<p><strong>2. Untersuchung des Vorfalls<\/strong><\/p>\n<p><span>Cybersecurity-Experten sollten hinzugezogen werden, um den Angriff genau zu analysieren. Dabei wird der chronologische Ablauf, die Ursache und das Ausma\u00df des Angriffs festgestellt. Insbesondere muss gepr\u00fcft werden, ob und wie viele personenbezogene Daten betroffen sind.<\/span><\/p>\n<p><strong>3. Risiko f\u00fcr betroffene Personen bewerten<\/strong><\/p>\n<p><span>Anhand der gesammelten Informationen wird das Risiko f\u00fcr die Betroffenen analysiert. Hierbei spielen sowohl die Schwere als auch die Eintrittswahrscheinlichkeit m\u00f6glicher Sch\u00e4den eine Rolle. Sch\u00e4den k\u00f6nnen Identit\u00e4tsdiebstahl, Rufsch\u00e4digung oder wirtschaftliche Nachteile umfassen.<\/span><\/p>\n<p><strong>4. Ma\u00dfnahmen zur Schadensbegrenzung<\/strong><\/p>\n<p><span>Zur Abmilderung m\u00f6glicher Auswirkungen geh\u00f6ren regelm\u00e4\u00dfig die Wiederherstellung der Daten sowie Dienste und die Pr\u00fcfung der Daten auf unbefugte Ver\u00e4nderungen. Die LDI NRW (Landesbeauftragte f\u00fcr Datenschutz und Informationsfreiheit Nordrhein-Westfalen) h\u00e4lt es grunds\u00e4tzlich f\u00fcr sinnvoll, betroffene Personen \u00fcber den Angriff zu informieren \u2013 selbst wenn keine Pflicht nach DSGVO dazu besteht.<\/span><\/p>\n<p><strong>5. Langfristige Sicherheitsma\u00dfnahmen<\/strong><\/p>\n<p><span>Nach einem Angriff muss das Sicherheitsniveau angepasst werden. Dies umfasst die Installation von Updates, regelm\u00e4\u00dfige \u00dcberpr\u00fcfungen und die Implementierung von sicheren Authentifizierungsverfahren wie der Multi-Faktor-Authentifizierung<\/span><\/p>\n<\/div>","detail_call_to_action_enabled.Value":"false","detail_slider_enabled.Value":"false","detail_heading.Content":"Wie verlaufen Cyberangriffe?","detail_text.Content":"<div>Ein typischer Cyberangriff kann unterschiedlich aussehen: Meist werden Systeme verschl\u00fcsselt, Daten als Geiseln genommen oder es droht deren Ver\u00f6ffentlichung. Oft werden auch Schadsoftware oder betr\u00fcgerische Mails \u00fcber infizierte Systeme verbreitet. Besonders gravierend ist, dass h\u00e4ufig personenbezogene Daten betroffen sind. Dies erfordert schnelles Handeln, um den Schaden f\u00fcr betroffene Personen m\u00f6glichst gering zu halten.<\/div>","detail_cta_lead_in.Content":"","detail_cta.Attribute":"Kontakt","detail_cta.Value":"\/kontakt","detail_heading_opt1.Content":"Sofortma\u00dfnahmen bei einem Cyberangriff","detail_text_opt1.Content":"<div>\n<ol>\n<li aria-level=\"1\">\n<p><span>Angriff stoppen oder eingrenzen: Identifizieren Sie die betroffenen Systeme und trennen Sie sie vom Netzwerk, um die Verbreitung zu verhindern.<\/span><\/p>\n<\/li>\n<li aria-level=\"1\">\n<p><span>Untersuchung starten: Analysieren Sie den Ablauf des Angriffs, den Angriffsvektor und das Ausma\u00df des Schadens. Auch externe Expertenteams wie CERT oder CSIRT sollten hinzugezogen werden.<\/span><\/p>\n<\/li>\n<li aria-level=\"1\">\n<p><span>Risiko f\u00fcr betroffene Personen bewerten: Stellen Sie fest, welche Daten betroffen sind und bewerten Sie das Risiko f\u00fcr die Rechte und Freiheiten der Betroffenen.<\/span><\/p>\n<\/li>\n<li aria-level=\"1\">\n<p><span>Ma\u00dfnahmen zur Schadensbegrenzung: Pr\u00fcfen Sie, was m\u00f6gliche Auswirkungen abmildern kann und informieren Sie ggfls. die betroffenen Personen \u00fcber den Vorfall.<\/span><\/p>\n<\/li>\n<li aria-level=\"1\">\n<p><span>Schutzma\u00dfnahmen verst\u00e4rken: Passen Sie die Sicherheitssysteme an, um k\u00fcnftige Angriffe zu verhindern, und dokumentieren Sie alle getroffenen Ma\u00dfnahmen.<\/span><\/p>\n<\/li>\n<\/ol>\n<\/div>","detail_cta_lead_in_opt1.Content":"NO_SHOW","detail_cta_opt1.Attribute":"Kontakt","detail_cta_opt1.Value":"\/kontakt","05c_content_detail.image_person_slider3.Id":null,"05c_content_detail_enabled.Value":"true","detail_cta_lead_in_opt2.Content":"NO_SHOW","detail_cta_opt2.Attribute":"Kontakt","detail_cta_opt2.Value":"\/kontakt","detail_heading_opt3.Content":"Externe Unterst\u00fctzung und Dokumentation","detail_text_opt3.Content":"<div>\n<p><span>Zus\u00e4tzlich zur eigenen Reaktion auf den Angriff ist es ratsam, externe Dienstleister einzubeziehen. Das Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) bietet Listen von IT-Sicherheitsdienstleistern sowie Anlaufstellen f\u00fcr die Meldung von Cybervorf\u00e4llen an.<\/span><\/p>\n<p><span>Nach jedem Vorfall ist eine detaillierte Dokumentation notwendig. Diese sollte den gesamten Ablauf des Angriffs, die ergriffenen Ma\u00dfnahmen und die Einsch\u00e4tzung des Schadens umfassen. Die Dokumentation dient nicht nur der internen Nachbereitung, sondern auch der Berichterstattung an die Datenschutzbeh\u00f6rden.<\/span><\/p>\n<\/div>","detail_cta_lead_in_opt3.Content":"NO_SHOW","05c_content_detail.image_product1.Id":null,"detail_cta_opt3.Attribute":"NO_SHOW","05c_content_detail.image_product2.Id":null,"detail_cta_opt3.Value":"NO_SHOW","05c_content_detail.image_product3.Id":null,"detail_heading_opt4.Content":"Fazit: Pr\u00e4vention und Reaktionsbereitschaft","05c_content_detail.image_product4.Id":null,"detail_cta_opt6.Attribute":"NO_SHOW","detail_cta_lead_in_opt4.Content":"NO_SHOW","detail_cta_opt4.Attribute":"NO_SHOW","05c_content_detail.image_product6.Id":null,"05c_content_detail.image_product7.Id":null,"detail_cta_opt4.Value":"NO_SHOW","05c_content_detail.image_product8.Id":null,"05c_content_detail.image_product9.Id":null,"detail_heading_opt5.Content":"NO_SHOW","detail_text_opt5.Content":"NO_SHOW","detail_cta_lead_in_opt5.Content":"NO_SHOW","detail_cta_opt5.Attribute":"NO_SHOW","detail_cta_opt5.Value":"NO_SHOW","detail_heading_opt6.Content":"NO_SHOW","detail_text_opt6.Content":"NO_SHOW","detail_cta_opt6.Value":"NO_SHOW","detail_text_opt4.Content":"<div>\n<p><span>Cyberangriffe sind eine reale und immer h\u00e4ufiger auftretende Gefahr. Unternehmen und Organisationen m\u00fcssen nicht nur ihre Schutzma\u00dfnahmen st\u00e4ndig aktualisieren, sondern auch auf m\u00f6gliche Angriffe vorbereitet sein. Ein schnelles, koordiniertes Handeln kann den Schaden minimieren und k\u00fcnftige Angriffe verhindern.<\/span><\/p>\n<\/div>","05c_content_detail.image_staff_1.Id":null,"05c_content_detail.image_staff_2.Id":null,"05c_content_detail.image_staff_3.Id":null,"05c_content_detail.image_staff_4.Id":null,"05c_content_detail.image_staff_5.Id":null,"05c_content_detail.image_staff_6.Id":null,"05c_content_detail.image_person_slider1.Id":null,"05c_content_detail.image_office.Id":null,"detail_cta_lead_in_opt6.Content":"NO_SHOW","05c_content_detail.image_person_slider4.Id":null,"05c_content_detail.image_person.Id":null,"05c_content_detail.image_person_slider2.Id":null,"competence_heading.Content":"","competence_text.Content":"","competence_cta_lead_in.Content":"","competence_cta.Attribute":"","competence_cta.Value":"","05d_content_competence_enabled.Value":"true","05d_content_competence.competence_image1.Id":null,"05d_content_competence.competence_image2.Id":null,"services_heading.Content":"","services_text.Content":"","services_cta_lead_in.Content":"","services_cta.Attribute":"","services_cta.Value":"","05e_content_services_enabled.Value":"true","faq_heading.Content":"","question2.Content":"","question3.Content":"","question4.Content":"","question5.Content":"","question6.Content":"","question7.Content":"","question8.Content":"","question9.Content":"","question10.Content":"","question1.Content":"","answer10.Content":"","answer3.Content":"","answer4.Content":"","answer5.Content":"","answer6.Content":"","answer7.Content":"","answer8.Content":"","answer9.Content":"","answer1.Content":"","answer2.Content":"","05f_questions_and_answers_enabled.Value":"true","seoarea1heading.Content":"","seoarea1text.Content":"","seoarea2heading.Content":"","seoarea2text.Content":"","seoarea3heading.Content":"","seoarea3text.Content":"","seoarea4heading.Content":"","seoarea4text.Content":"","05g_seoarea_enabled.Value":"true","06_gallery_related1.gallery_related.TypeEntityName":"rechtsanwaelte","06_gallery_related1.gallery_related.SubHeading":"Individuelle Beratung auf jedem Rechtsgebiet","06_gallery_related1.gallery_related.Heading":"Rechtsanwalt & zertifizierter Compliance Berater","06_gallery_related1.background_image.Id":349,"06_gallery_related1.gallery_related.ButtonCtaText":"Kontakt","06_gallery_related1.gallery_related.ButtonCtaUrl":"\/kanzlei\/kontakt","gallery_related1_filterable_tabs_enabled.Value":"false","06_gallery_related1_enabled.Value":"true","06_gallery_related2.gallery_related.TypeEntityName":"","06_gallery_related2.gallery_related.SubHeading":"","06_gallery_related2.gallery_related.Heading":"","06_gallery_related2.background_image.Id":349,"06_gallery_related2.gallery_related.ButtonCtaText":"","06_gallery_related2.gallery_related.ButtonCtaUrl":"","06_gallery_related2_enabled.Value":"false","06_gallery_related3.gallery_related.TypeEntityName":"","06_gallery_related3.gallery_related.SubHeading":"","06_gallery_related3.background_image.Id":349,"06_gallery_related3.gallery_related.ButtonCtaText":"","06_gallery_related3.gallery_related.ButtonCtaUrl":"","06_gallery_related3.gallery_related.Heading":"","06_gallery_related3_enabled.Value":"false","06_gallery_related4.gallery_related.EnityId":"","06_gallery_related4.gallery_related.SubHeading":"","06_gallery_related4.gallery_related.Heading":"","06_gallery_related4.background_image.Id":null,"06_gallery_related4.gallery_related.ButtonCtaText":"","06_gallery_related4.gallery_related.ButtonCtaUrl":"","06_gallery_related4_enabled.Value":"","06_gallery_related5.gallery_related.EnityId":"","06_gallery_related5.gallery_related.SubHeading":"","06_gallery_related5.gallery_related.Heading":"","06_gallery_related5.background_image.Id":null,"06_gallery_related5.gallery_related.ButtonCtaText":"","06_gallery_related5.gallery_related.ButtonCtaUrl":"","06_gallery_related5_enabled.Value":"","instagram_feed.Content":"","toc_heading.Content":"","heading_call_to_action.Content":"Jetzt Anfrage stellen","subheading_call_to_action.Content":"Wir beraten Sie gerne umfassend und pers\u00f6nlich bei Ihrem Anliegen.","cta_call_to_action.Attribute":"Kontakt","cta_call_to_action.Value":"\/kontakt","call_to_action_video_enabled.Value":"","video_call_to_action_youtube_url.Value":"","video_call_to_action_youtube_url2.Value":"","06a_home_call_to_action.image_call_to_action.Id":352,"06a_home_call_to_action_enabled.Value":"true","benefit1_call_to_action.Content":"true","benefit2_call_to_action.Content":"true","benefit3_call_to_action.Content":"true","benefit4_call_to_action.Content":"true","footer_contact_address.Content":"<div>Eupener Stra\u00dfe 59<br>D-50933 K\u00f6ln<br><strong>Telefon:\u00a0<br><\/strong><a href=\"tel:+4922142482831\">0221-42482831<br><\/a><strong>Telefon:\u00a0<br><\/strong><a href=\"tel:+491712211612\">0171-2211612<\/a><\/div>\n<div><strong>E-Mail:<br><\/strong><a href=\"mailto:anwalt@geissler-legal.de\">anwalt@geissler-legal.de<\/a><strong><br><\/strong><\/div>","footer_e-mail.Value":"mailto:geissler@legaltrinity.de","footer_calendly_url.Value":"https:\/\/calendly.com\/geissler-legaltrinity\/30min?primary_color=0200ff","footer_contact_form_from_email.Attribute":"OMmatic","linkedin.Value":"https:\/\/www.linkedin.com\/in\/roman-bosco-geissler-800224143\/","linkedin_enabled.Value":"true","instagram_enabled.Value":"","whatsapp_enabled.Value":"false","whatsapp_number.Value":"https:\/\/wa.me\/","06_gallery_footer1.gallery_related.TypeEntityName":"rechtsgebiete","06_gallery_footer1.gallery_related.Heading":"Rechtsgebiete","06_gallery_footer2.gallery_related.TypeEntityName":"dienstleistungen","footer_subheading_contact_form.Content":"Ihre Kanzlei Gei\u00dfler Legal.","instagram_url.Value":"","footer_e-mail.Attribute":"","footer_telephone.Attribute":"+49 221 42482831","footer_telephone.Value":"tel:+4922142482831","footer_opening_hours.Content":"Mo-Sa: 10:00 \u2013 13:00 Uhr<br>Mo-Fr: 14:00 \u2013 20:00 Uhr\u00a0<br>und nach telefonischer Vereinbarung","footer_contact_form_enabled.Value":"true","footer_heading_contact_form.Content":"Kontakt","footer_contact_form_name_text.Content":"Ihr Name","footer_contact_form_message_text.Content":"Ihre Nachricht","footer_contact_form_mail_text.Content":"ihre@email.com","footer_contact_form_heading.Content":"Kontakt","footer_contact_form_button_text.Content":"Absenden","footer_contact_form_phone_text.Content":"Telefonnummer","06_gallery_footer3.gallery_related.TypeEntityName":"rechtsanwaelte","07_footer.fachanwalt_de_logo.Id":355,"07_footer.juraforum_de_logo.Id":353,"07_footer.experten_branchenbuch_de_logo.Id":354,"footer_opening_hours_heading.Content":"Gesch\u00e4ftszeiten","footer_contact_form_mailto.Value":"anwalt@geissler-legal.de","footer_contact_form_subject.Content":"Nachricht von der Webseite geissler-legal.de","footer_contact_form_bcc.Value":"","footer_contact_form.Value":"1","footer_contact_form_posturl.Value":"","experten_branchenbuch_de_url.Value":"","juraforum_de_url.Value":"","fachanwalt_de_url.Value":"","07_footer.background_image.Id":356,"footer_contact_form_from_email.Value":"marketing@ommatic.de","06_gallery_footer3.gallery_related.Heading":"Rechtsanwalt","06_gallery_footer2.gallery_related.Heading":"Dienstleistungen","footer_address_heading.Content":"Adresse","emergency_number_heading.Content":"Gerne f\u00fcr Sie erreichbar","emergency_number.Attribute":"0221 - 42482831","emergency_number.Value":"tel:+4922142482831","facebook.Value":"","facebook_enabled.Value":"false","einbock_eintraege_enabled.Value":"false","instagram_url.Attribute":"instagram_url","tb-uid":"5580"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/posts\/8195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/comments?post=8195"}],"version-history":[{"count":2,"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/posts\/8195\/revisions"}],"predecessor-version":[{"id":157761,"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/posts\/8195\/revisions\/157761"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/media\/8174"}],"wp:attachment":[{"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/media?parent=8195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/categories?post=8195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/geissler-legal.de\/it\/wp-json\/wp\/v2\/tags?post=8195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}