{"id":8707,"date":"2026-02-16T21:05:22","date_gmt":"2026-02-16T19:05:22","guid":{"rendered":"https:\/\/techbiz.global\/?page_id=8707"},"modified":"2026-02-19T00:19:50","modified_gmt":"2026-02-18T22:19:50","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/techbiz.global\/de\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"8707\" class=\"elementor elementor-8707\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e3e9e1e e-flex e-con-boxed e-con e-parent\" data-id=\"e3e9e1e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3085b6c e-con-full e-flex e-con e-child\" data-id=\"3085b6c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e229176 elementor-widget elementor-widget-text-editor\" data-id=\"e229176\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Proaktiver Schutz f\u00fcr Ihre digitale Welt!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20253d2 elementor-widget elementor-widget-heading\" data-id=\"20253d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber<\/br>\nSecurity<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f541d09 elementor-widget elementor-widget-text-editor\" data-id=\"f541d09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unsere umfassende Cyber-Sicherheitsberatung hilft Ihnen, Ihre Systeme, Netzwerke und Informationen proaktiv zu sch\u00fctzen.\n Durch Risikoanalysen und robuste Schutzma\u00dfnahmen helfen wir Unternehmen, Vertrauen, Compliance und operative Kontinuit\u00e4t zu wahren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a01715 elementor-widget elementor-widget-button\" data-id=\"3a01715\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/techbiz.global\/de\/customer-contact-form\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Buchen Sie einen Anruf<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-751d6aa e-con-full e-flex e-con e-child\" data-id=\"751d6aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08a9165 elementor-widget elementor-widget-image\" data-id=\"08a9165\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"504\" src=\"https:\/\/techbiz.global\/wp-content\/uploads\/2026\/02\/Tech_Recruitment_Face.svg-fill-8.png\" class=\"attachment-full size-full wp-image-8710\" alt=\"\" srcset=\"https:\/\/techbiz.global\/wp-content\/uploads\/2026\/02\/Tech_Recruitment_Face.svg-fill-8.png 640w, https:\/\/techbiz.global\/wp-content\/uploads\/2026\/02\/Tech_Recruitment_Face.svg-fill-8-300x236.png 300w, https:\/\/techbiz.global\/wp-content\/uploads\/2026\/02\/Tech_Recruitment_Face.svg-fill-8-15x12.png 15w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71e1826 e-flex e-con-boxed e-con e-parent\" data-id=\"71e1826\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8c38343 e-con-full e-flex e-con e-child\" data-id=\"8c38343\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cb86f8 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4cb86f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vorteile der Tech-Rekrutierungsdienstleistungen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6aedfd elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"d6aedfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"12\" viewbox=\"0 0 9 12\" fill=\"none\"><path d=\"M8.48528 5.65685L2.82842 11.3137L0 8.48528L2.82842 5.65685L0 2.82843L2.82842 0L8.48528 5.65685Z\" fill=\"#FF7900\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Umfassender Schutz von Daten, Systemen und digitalen Assets.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"12\" viewbox=\"0 0 9 12\" fill=\"none\"><path d=\"M8.48528 5.65685L2.82842 11.3137L0 8.48528L2.82842 5.65685L0 2.82843L2.82842 0L8.48528 5.65685Z\" fill=\"#FF7900\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Proaktives Risikomanagement und Strategien zur Bedrohungsabwehr.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"12\" viewbox=\"0 0 9 12\" fill=\"none\"><path d=\"M8.48528 5.65685L2.82842 11.3137L0 8.48528L2.82842 5.65685L0 2.82843L2.82842 0L8.48528 5.65685Z\" fill=\"#FF7900\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Einhaltung internationaler Sicherheitsstandards und Vorschriften.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"12\" viewbox=\"0 0 9 12\" fill=\"none\"><path d=\"M8.48528 5.65685L2.82842 11.3137L0 8.48528L2.82842 5.65685L0 2.82843L2.82842 0L8.48528 5.65685Z\" fill=\"#FF7900\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fachkundige Beratung zu Pr\u00e4vention und Reaktion bei Sicherheitsvorf\u00e4llen.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"9\" height=\"12\" viewbox=\"0 0 9 12\" fill=\"none\"><path d=\"M8.48528 5.65685L2.82842 11.3137L0 8.48528L2.82842 5.65685L0 2.82843L2.82842 0L8.48528 5.65685Z\" fill=\"#FF7900\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">St\u00e4rkung des Kundenvertrauens und langfristige betriebliche Stabilit\u00e4t.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5cd51dc e-flex e-con-boxed e-con e-parent\" data-id=\"5cd51dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-df716fb e-con-full e-flex e-con e-child\" data-id=\"df716fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04624af elementor-widget elementor-widget-text-editor\" data-id=\"04624af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tKontaktieren Sie uns\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11c24a2 elementor-widget elementor-widget-text-editor\" data-id=\"11c24a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLassen Sie uns Ihr Projekt besprechen!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dda359a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"dda359a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSie haben eine vielversprechende Idee und suchen einen kompetenten Partner, der Ihnen bei der Realisierung hilft? Wir stehen Ihnen zur Seite, um Ihre Visionen erfolgreich umzusetzen.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fab1e19 elementor-align-center BookCallButton elementor-widget elementor-widget-button\" data-id=\"fab1e19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjMwMDAiLCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt Anruf buchen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Protecting your digital world with proactive, robust security! Cyber Security Our comprehensive cyber security consulting helps you protect your systems, networks, and information proactively. By assessing risks and implementing robust safeguards, we help businesses maintain trust, compliance, and operational continuity. Book a Call Benefits of the Tech Recruitment Services Comprehensive protection of data, systems, and [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"nf_dc_page":"","content-type":"","footnotes":""},"class_list":["post-8707","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security - TechBiz Global<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techbiz.global\/de\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - TechBiz Global\" \/>\n<meta property=\"og:description\" content=\"Protecting your digital world with proactive, robust security! Cyber Security Our comprehensive cyber security consulting helps you protect your systems, networks, and information proactively. By assessing risks and implementing robust safeguards, we help businesses maintain trust, compliance, and operational continuity. Book a Call Benefits of the Tech Recruitment Services Comprehensive protection of data, systems, and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techbiz.global\/de\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"TechBiz Global\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-18T22:19:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techbiz.global\/wp-content\/uploads\/2026\/02\/Tech_Recruitment_Face.svg-fill-8.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"504\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/techbiz.global\\\/cyber-security\\\/\",\"url\":\"https:\\\/\\\/techbiz.global\\\/cyber-security\\\/\",\"name\":\"Cyber Security - TechBiz Global\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/techbiz.global\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/techbiz.global\\\/cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/techbiz.global\\\/cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/techbiz.global\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Tech_Recruitment_Face.svg-fill-8.png\",\"datePublished\":\"2026-02-16T19:05:22+00:00\",\"dateModified\":\"2026-02-18T22:19:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/techbiz.global\\\/cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/techbiz.global\\\/cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/techbiz.global\\\/cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/techbiz.global\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Tech_Recruitment_Face.svg-fill-8.png\",\"contentUrl\":\"https:\\\/\\\/techbiz.global\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Tech_Recruitment_Face.svg-fill-8.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/techbiz.global\\\/cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/techbiz.global\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/techbiz.global\\\/#website\",\"url\":\"https:\\\/\\\/techbiz.global\\\/\",\"name\":\"TechBiz Global\",\"description\":\"Powering Teams with Best IT Talents and Software Solutions!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/techbiz.global\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - TechBiz Global","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/techbiz.global\/de\/cyber-security\/","og_locale":"de_DE","og_type":"article","og_title":"Cyber Security - TechBiz Global","og_description":"Protecting your digital world with proactive, robust security! Cyber Security Our comprehensive cyber security consulting helps you protect your systems, networks, and information proactively. By assessing risks and implementing robust safeguards, we help businesses maintain trust, compliance, and operational continuity. Book a Call Benefits of the Tech Recruitment Services Comprehensive protection of data, systems, and [&hellip;]","og_url":"https:\/\/techbiz.global\/de\/cyber-security\/","og_site_name":"TechBiz Global","article_modified_time":"2026-02-18T22:19:50+00:00","og_image":[{"width":640,"height":504,"url":"https:\/\/techbiz.global\/wp-content\/uploads\/2026\/02\/Tech_Recruitment_Face.svg-fill-8.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/techbiz.global\/cyber-security\/","url":"https:\/\/techbiz.global\/cyber-security\/","name":"Cyber Security - TechBiz Global","isPartOf":{"@id":"https:\/\/techbiz.global\/#website"},"primaryImageOfPage":{"@id":"https:\/\/techbiz.global\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/techbiz.global\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/techbiz.global\/wp-content\/uploads\/2026\/02\/Tech_Recruitment_Face.svg-fill-8.png","datePublished":"2026-02-16T19:05:22+00:00","dateModified":"2026-02-18T22:19:50+00:00","breadcrumb":{"@id":"https:\/\/techbiz.global\/cyber-security\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/techbiz.global\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/techbiz.global\/cyber-security\/#primaryimage","url":"https:\/\/techbiz.global\/wp-content\/uploads\/2026\/02\/Tech_Recruitment_Face.svg-fill-8.png","contentUrl":"https:\/\/techbiz.global\/wp-content\/uploads\/2026\/02\/Tech_Recruitment_Face.svg-fill-8.png"},{"@type":"BreadcrumbList","@id":"https:\/\/techbiz.global\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techbiz.global\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/techbiz.global\/#website","url":"https:\/\/techbiz.global\/","name":"TechBiz Global","description":"Powering Teams with Best IT Talents and Software Solutions!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techbiz.global\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/techbiz.global\/de\/wp-json\/wp\/v2\/pages\/8707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techbiz.global\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/techbiz.global\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/techbiz.global\/de\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/techbiz.global\/de\/wp-json\/wp\/v2\/comments?post=8707"}],"version-history":[{"count":5,"href":"https:\/\/techbiz.global\/de\/wp-json\/wp\/v2\/pages\/8707\/revisions"}],"predecessor-version":[{"id":8774,"href":"https:\/\/techbiz.global\/de\/wp-json\/wp\/v2\/pages\/8707\/revisions\/8774"}],"wp:attachment":[{"href":"https:\/\/techbiz.global\/de\/wp-json\/wp\/v2\/media?parent=8707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}