{"id":476,"date":"2025-11-15T22:02:12","date_gmt":"2025-11-15T22:02:12","guid":{"rendered":"https:\/\/family-office-advisory.com\/wiki\/cybersecurity-datenschutzkontrollen-2\/"},"modified":"2025-11-16T22:16:50","modified_gmt":"2025-11-16T22:16:50","password":"","slug":"cybersecurity-datenschutzkontrollen-2","status":"publish","type":"docs","link":"https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/","title":{"rendered":"Cybersecurity &amp; Datenschutzkontrollen"},"content":{"rendered":"\n<h2 class=\"wp-block-heading highlight\" id=\"h-cybersecurity-amp-data-privacy-controls\"><span class=\"highlight\">Cybersecurity &amp; Datenschutzkontrollen<\/span><\/h2>\n\n<p><span class=\"highlight\">Cybersicherheit und Datenschutz<\/span> sind entscheidende S\u00e4ulen des operativen Risikomanagements in einem Family Office. Angesichts der Sensibilit\u00e4t von Finanzdaten, pers\u00f6nlichen Aufzeichnungen, Anlagestrukturen und Nachfolgeinformationen sind Family Offices ein bevorzugtes Ziel f\u00fcr Cyberkriminelle. Die Implementierung eines robusten Sicherheitsrahmens sch\u00fctzt vor Datenschutzverletzungen, Identit\u00e4tsdiebstahl, \u00dcberweisungsbetrug und unbefugtem Zugriff und gew\u00e4hrleistet gleichzeitig die Einhaltung der globalen Datenschutzbestimmungen.  <\/p>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-context-amp-importance\"><span class=\"highlight\">Kontext &amp; Wichtigkeit<\/span><\/h2>\n\n<p>Im Gegensatz zu gro\u00dfen Finanzinstituten arbeiten Family Offices oft mit schlanken Teams, was sie anf\u00e4llig f\u00fcr raffinierte Angriffe wie Phishing, Ransomware, Konto\u00fcbernahmen und Social Engineering macht. Da Family Offices Bank-, Investment- und Rechtsstrukturen koordinieren, kann ein erfolgreicher Angriff pers\u00f6nliche Finanzen, Steuerunterlagen, Gesch\u00e4ftsverm\u00f6gen und vertrauliche Familienangelegenheiten betreffen. Ein proaktives, mehrstufiges Cybersicherheitsmodell ist daher unerl\u00e4sslich.  <\/p>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-core-components-of-cybersecurity\"><span class=\"highlight\">Kernkomponenten der Cybersicherheit<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong class=\"highlight\">Identit\u00e4ts- und Zugriffsverwaltung (IAM):<\/strong> Multi-Faktor-Authentifizierung, rollenbasierter Zugriff und regelm\u00e4\u00dfige Zugriffs\u00fcberpr\u00fcfungen.<\/li>\n\n\n\n<li><strong class=\"highlight\">Schutz f\u00fcr Endger\u00e4te:<\/strong> Antivirus, Ger\u00e4teverschl\u00fcsselung, sichere Verwaltung mobiler Ger\u00e4te (MDM).<\/li>\n\n\n\n<li><strong class=\"highlight\">Netzwerksicherheit:<\/strong> Firewalls, Intrusion Detection, reiner VPN-Zugang und Zero-Trust-Kontrollen.<\/li>\n\n\n\n<li><strong class=\"highlight\">Sichere Kommunikation:<\/strong> Verschl\u00fcsselte E-Mails, sichere Portale und Tools f\u00fcr digitale Signaturen.<\/li>\n\n\n\n<li><strong class=\"highlight\">Sicherheit bei Anbietern und in der Cloud:<\/strong> Due Diligence bei externen Anbietern, einschlie\u00dflich Datenresidenz und Sicherheitszertifizierungen.<\/li>\n\n\n\n<li><strong class=\"highlight\">\u00dcberwachung und Erkennung:<\/strong> Protokollanalyse, Erkennung von Anomalien und 24\/7-\u00dcberwachung der Sicherheitsabl\u00e4ufe (intern oder ausgelagert).<\/li>\n\n\n\n<li><strong class=\"highlight\">Reaktion auf Vorf\u00e4lle:<\/strong> Definierte Verfahren f\u00fcr Verst\u00f6\u00dfe, einschlie\u00dflich Kommunikationspl\u00e4nen und Wiederherstellungsprotokollen.<\/li>\n\n\n\n<li><strong class=\"highlight\">Einhaltung des Datenschutzes:<\/strong> Anpassung an GDPR, Swiss DPA und andere relevante Vorschriften.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-data-privacy-controls\"><span class=\"highlight\">Datenschutz-Kontrollen<\/span><\/h2>\n\n<p>Der Datenschutz gew\u00e4hrleistet einen rechtm\u00e4\u00dfigen und ethischen Umgang mit pers\u00f6nlichen und finanziellen Informationen. Familien sind oft l\u00e4nder\u00fcbergreifend t\u00e4tig, was die Einhaltung von Gesetzen komplex macht. Wirksame Kontrollen mindern externe und interne Risiken und f\u00f6rdern das Vertrauen zwischen Familienmitgliedern und Beratern.  <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Datenklassifizierung:<\/strong> Kennzeichnen Sie sensible Daten wie P\u00e4sse, Treuhandurkunden, Kontoausz\u00fcge und medizinische Unterlagen.<\/li>\n\n\n\n<li><strong>Aufbewahrungs- und L\u00f6schungsrichtlinien:<\/strong> Speichern Sie Daten nur so lange wie n\u00f6tig und entsorgen Sie veraltete Datens\u00e4tze sicher.<\/li>\n\n\n\n<li><strong>Verschl\u00fcsselung:<\/strong> Ende-zu-Ende-Verschl\u00fcsselung f\u00fcr sensible Dateien sowohl im Ruhezustand als auch bei der \u00dcbertragung.<\/li>\n\n\n\n<li><strong>Zugriffsprotokolle:<\/strong> Verfolgen Sie, wer wann auf welche Daten zugegriffen hat.<\/li>\n\n\n\n<li><strong>Datenminimierung:<\/strong> Sammeln und teilen Sie nur die wichtigsten Informationen.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-implementation-amp-best-practices\"><span class=\"highlight\">Implementierung und bew\u00e4hrte Praktiken<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong>Setzen Sie auf ein Null-Vertrauens-Sicherheitsmodell:<\/strong> Gehen Sie niemals davon aus, dass interne Ger\u00e4te oder Benutzer standardm\u00e4\u00dfig sicher sind.<\/li>\n\n\n\n<li><strong>Regelm\u00e4\u00dfige Sicherheitsschulungen:<\/strong> Informieren Sie Mitarbeiter und Familienmitglieder \u00fcber Phishing, Social Engineering und Passworthygiene.<\/li>\n\n\n\n<li><strong>Sorgf\u00e4ltige Pr\u00fcfung des Anbieters:<\/strong> \u00dcberpr\u00fcfen Sie SOC 2-Berichte, ISO 27001-Zertifizierungen und Verpflichtungen zur Datenresidenz.<\/li>\n\n\n\n<li><strong>J\u00e4hrliche Penetrationstests:<\/strong> Identifizieren Sie Schwachstellen durch unabh\u00e4ngige Tests.<\/li>\n\n\n\n<li><strong>Segmentieren Sie Netzwerke:<\/strong> Trennen Sie Gast-, B\u00fcro- und Servernetzwerke.<\/li>\n\n\n\n<li><strong>Erh\u00f6hen Sie die E-Mail-Sicherheit:<\/strong> Verwenden Sie SPF, DKIM, DMARC und genehmigte Whitelists.<\/li>\n\n\n\n<li><strong>Sichere gemeinsame Nutzung von Dokumenten:<\/strong> Vermeiden Sie E-Mail-Anh\u00e4nge; verwenden Sie sichere Portale mit zeitlich begrenztem Zugang.<\/li>\n\n\n\n<li><strong>Sicherungs- und Wiederherstellungsplan:<\/strong> F\u00fchren Sie verschl\u00fcsselte Backups und testen Sie die Wiederherstellungsprozeduren regelm\u00e4\u00dfig.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-common-challenges\"><span class=\"highlight\">Gemeinsame Herausforderungen<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li>Fehlen einer formellen Cybersicherheitsrichtlinie oder eines Eigentumsrechts.<\/li>\n\n\n\n<li>Schwache Passw\u00f6rter und inkonsistente Authentifizierungspraktiken.<\/li>\n\n\n\n<li>Ungesicherte pers\u00f6nliche Ger\u00e4te, die f\u00fcr sensible Kommunikation verwendet werden.<\/li>\n\n\n\n<li>Unzureichende \u00dcberwachungs- oder Protokollpr\u00fcfungsfunktionen.<\/li>\n\n\n\n<li>Nicht \u00fcberpr\u00fcfte Drittanbieter mit Zugang zu vertraulichen Daten.<\/li>\n\n\n\n<li>Schatten-IT-Nutzung (nicht genehmigte Anwendungen oder Cloud-Dienste).<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-see-also\"><span class=\"highlight\">Siehe auch<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/family-office-advisory.com\/wiki\/technology-infrastructure-for-family-offices\/\">Technologie-Infrastruktur f\u00fcr Family Offices<\/a><\/li>\n\n\n\n<li><a href=\"\/wiki\/risk-management-and-reporting\">Risikomanagement &amp; Berichterstattung<\/a><\/li>\n\n\n\n<li><a href=\"\/wiki\/family-governance\">Familienf\u00fchrung<\/a><\/li>\n\n\n\n<li><a href=\"\/wiki\/data-governance-and-document-management\">Datenverwaltung &amp; Dokumentenmanagement<\/a><\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-references\"><span class=\"highlight\">Referenzen<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.kpmg.com\/xx\/en\/home\/services\/advisory\/technology\/cyber-security.html\" target=\"_blank\" rel=\"noopener\">KPMG &#8211; Dienstleistungen im Bereich Cybersicherheit<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.pwc.com\/gx\/en\/services\/cybersecurity.html\" target=\"_blank\" rel=\"noopener\">PwC &#8211; Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.ey.com\/en_gl\/cybersecurity\" target=\"_blank\" rel=\"noopener\">EY &#8211; Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.deloitte.com\/global\/en\/services\/risk\/cyber.html\" target=\"_blank\" rel=\"noopener\">Deloitte &#8211; Dienstleistungen f\u00fcr Cyberrisiken<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.enisa.europa.eu\/\" target=\"_blank\" rel=\"noopener\">ENISA &#8211; Agentur der Europ\u00e4ischen Union f\u00fcr Cybersicherheit<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/gdpr.eu\/\" target=\"_blank\" rel=\"noopener\">GDPR &#8211; \u00dcberblick \u00fcber die Allgemeine Datenschutzverordnung<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity &amp; Datenschutzkontrollen Cybersicherheit und Datenschutz sind entscheidende S\u00e4ulen des operativen Risikomanagements in einem Family Office. Angesichts der Sensibilit\u00e4t von [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"doc_category":[64],"doc_tag":[],"class_list":["post-476","docs","type-docs","status-publish","hentry","doc_category-betrieb-infrastruktur"],"year_month":"2026-04","word_count":577,"total_views":0,"reactions":{"happy":0,"normal":0,"sad":0},"author_info":{"name":"admin","author_nicename":"email_t1xzty82","author_url":"https:\/\/family-office-advisory.com\/de\/author\/email_t1xzty82\/"},"doc_category_info":[{"term_name":"Betrieb &amp; Infrastruktur","term_url":"https:\/\/family-office-advisory.com\/de\/wiki-category\/betrieb-infrastruktur\/"}],"doc_tag_info":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity &amp; Datenschutzkontrollen - Family Office Advisory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity &amp; Datenschutzkontrollen\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity &amp; Datenschutzkontrollen Cybersicherheit und Datenschutz sind entscheidende S\u00e4ulen des operativen Risikomanagements in einem Family Office. Angesichts der Sensibilit\u00e4t von [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Family Office Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-16T22:16:50+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/wiki\\\/cybersecurity-datenschutzkontrollen-2\\\/\",\"url\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/wiki\\\/cybersecurity-datenschutzkontrollen-2\\\/\",\"name\":\"Cybersecurity &amp; Datenschutzkontrollen - Family Office Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/#website\"},\"datePublished\":\"2025-11-15T22:02:12+00:00\",\"dateModified\":\"2025-11-16T22:16:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/wiki\\\/cybersecurity-datenschutzkontrollen-2\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/wiki\\\/cybersecurity-datenschutzkontrollen-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/wiki\\\/cybersecurity-datenschutzkontrollen-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/startseite\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge Base\",\"item\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/wiki\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity &amp; Datenschutzkontrollen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/\",\"name\":\"Family Office Advisory\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/family-office-advisory.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity &amp; Datenschutzkontrollen - Family Office Advisory","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/","og_locale":"de_DE","og_type":"article","og_title":"Cybersecurity &amp; Datenschutzkontrollen","og_description":"Cybersecurity &amp; Datenschutzkontrollen Cybersicherheit und Datenschutz sind entscheidende S\u00e4ulen des operativen Risikomanagements in einem Family Office. Angesichts der Sensibilit\u00e4t von [&hellip;]","og_url":"https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/","og_site_name":"Family Office Advisory","article_modified_time":"2025-11-16T22:16:50+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/","url":"https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/","name":"Cybersecurity &amp; Datenschutzkontrollen - Family Office Advisory","isPartOf":{"@id":"https:\/\/family-office-advisory.com\/de\/#website"},"datePublished":"2025-11-15T22:02:12+00:00","dateModified":"2025-11-16T22:16:50+00:00","breadcrumb":{"@id":"https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/family-office-advisory.com\/de\/wiki\/cybersecurity-datenschutzkontrollen-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/family-office-advisory.com\/de\/startseite\/"},{"@type":"ListItem","position":2,"name":"Knowledge Base","item":"https:\/\/family-office-advisory.com\/de\/wiki\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity &amp; Datenschutzkontrollen"}]},{"@type":"WebSite","@id":"https:\/\/family-office-advisory.com\/de\/#website","url":"https:\/\/family-office-advisory.com\/de\/","name":"Family Office Advisory","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/family-office-advisory.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"knowledge_base_info":[],"knowledge_base_slug":[],"_links":{"self":[{"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/docs\/476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/comments?post=476"}],"version-history":[{"count":3,"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/docs\/476\/revisions"}],"predecessor-version":[{"id":481,"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/docs\/476\/revisions\/481"}],"wp:attachment":[{"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/media?parent=476"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/doc_category?post=476"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/family-office-advisory.com\/de\/wp-json\/wp\/v2\/doc_tag?post=476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}