{"id":237278,"date":"2023-08-07T08:07:32","date_gmt":"2023-08-07T08:07:32","guid":{"rendered":"https:\/\/consulting.lm-ag.de\/?p=237278"},"modified":"2025-09-19T10:38:41","modified_gmt":"2025-09-19T08:38:41","slug":"information-security-vs-it-security","status":"publish","type":"post","link":"https:\/\/www.lm-ag.de\/en\/informationssicherheit-vs-it-sicherheit\/","title":{"rendered":"Like James Bond 007: Information security vs. IT security"},"content":{"rendered":"<div class=\"et_pb_section_0 et_pb_section et_section_regular et_flex_section\">\n<div class=\"et_pb_row_0 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_0 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_0 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p><h1 style=\"font-size:50px;\">The mission<\/h1>\n<\/div><\/div>\n\n<div class=\"et_pb_text_1 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p>Today we are going on a secret mission and diving into the fascinating world of <strong>Information security vs. IT security<\/strong> in. But this time we're not just going to watch - no, we're going to use a technology that brings these two creative agents together: a <strong>ISMS<\/strong> - our faithful helper in the digital espionage adventure!<\/p>\n<p>The <strong>Information Security<\/strong> is our intrepid James Bond - protecting our valuable information, business secrets and customer information like a true secret agent. But even an agent like 007 needs support to successfully complete his missions.<\/p>\n<p>Here comes the <strong>IT security<\/strong> comes into play, our technology expert. She is responsible for protecting our systems, networks and devices from unwanted intruders. Together with information security, it forms an unbeatable duo that protects the digital world from the dangers of the dark cyber world.<\/p>\n<\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_1 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_2 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h4>About the author<\/h4>\n<\/div><\/div>\n\n<div class=\"et_pb_image_0 et_pb_image et_pb_module et_flex_module preset--module--divi-image--default\"><span class=\"et_pb_image_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_IT-Security_TorbenGerber.jpg\" title=\"LM_IT-Security_TorbenGerber\" width=\"260\" height=\"260\" srcset=\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_IT-Security_TorbenGerber.jpg 260w, https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_IT-Security_TorbenGerber-150x150.jpg 150w\" sizes=\"(max-width: 260px) 100vw, 260px\" class=\"wp-image-956\" \/><\/span><\/div>\n\n<div class=\"et_pb_text_3 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h4>Torben Gerber<\/h4>\n<p>Information Technology Security Lead<\/p>\n<p><a style=\"border-bottom: 0px !important;\" href=\"tel:+495414066452\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/LM_Signatur_Icon_Phone.svg\" alt=\"\" width=\"40\" height=\"40\" \/><\/a>\u2003<a style=\"border-bottom: 0px !important;\" href=\"mailto:torben.gerber@lm-ag.de\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/LM_Signatur_Icon_Mail.svg\" alt=\"\" width=\"40\" height=\"40\" \/><\/a>\u2003<a style=\"border-bottom: 0px !important;\" href=\"https:\/\/www.linkedin.com\/in\/torben-gerber-510865199\/\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/LM_Signatur_Icon_LinkedIn.svg\" alt=\"\" width=\"40\" height=\"40\" \/><\/a><\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_1 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_2 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_4 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h4>About the author<\/h4>\n<\/div><\/div>\n\n<div class=\"et_pb_image_1 et_pb_image et_pb_module et_flex_module preset--module--divi-image--default\"><span class=\"et_pb_image_wrap\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_IT-Security_TorbenGerber.jpg\" title=\"LM_IT-Security_TorbenGerber\" width=\"260\" height=\"260\" srcset=\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_IT-Security_TorbenGerber.jpg 260w, https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_IT-Security_TorbenGerber-150x150.jpg 150w\" sizes=\"(max-width: 260px) 100vw, 260px\" class=\"wp-image-956\" \/><\/span><\/div>\n\n<div class=\"et_pb_text_5 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h4>Torben Gerber<\/h4>\n<p>Information Technology Security Lead<\/p>\n<p><a style=\"border-bottom: 0px !important;\" href=\"tel:+495414066452\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/LM_Signatur_Icon_Phone.svg\" alt=\"\" width=\"40\" height=\"40\" \/><\/a>\u2003<a style=\"border-bottom: 0px !important;\" href=\"mailto:torben.gerber@lm-ag.de\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/LM_Signatur_Icon_Mail.svg\" alt=\"\" width=\"40\" height=\"40\" \/><\/a>\u2003<a style=\"border-bottom: 0px !important;\" href=\"https:\/\/www.linkedin.com\/in\/torben-gerber-510865199\/\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/02\/LM_Signatur_Icon_LinkedIn.svg\" alt=\"\" width=\"40\" height=\"40\" \/><\/a><\/p>\n<\/div><\/div>\n\n<div class=\"et_pb_divider_0 et_pb_divider et_pb_space et_pb_divider_position_top et_pb_module\"><div class=\"et_pb_divider_internal\"><\/div><\/div>\n\n<div class=\"et_pb_text_6 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p><h1 style=\"font-size:50px;\">The mission<\/h1>\n<\/div><\/div>\n\n<div class=\"et_pb_text_7 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p>Today we're going on a secret mission and diving into the fascinating world of information security vs. IT security. But this time we're not just going to watch - no, we're going to use a technology that brings these two creative agents together: an ISMS - our trusty sidekick in the digital espionage adventure!<\/p>\n<p>Information security is our intrepid James Bond - protecting our valuable information, business secrets and customer information like a true secret agent. But even an agent like 007 needs support to complete his missions successfully.<\/p>\n<p>This is where IT security, our technology expert, comes into play. It is responsible for protecting our systems, networks and devices from unwanted intruders. Together with information security, it forms an unbeatable duo that protects the digital world from the dangers of the dark cyber world.<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_2 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_3 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_8 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h3>The perfect interplay<\/h3>\n<p>But how can we ensure that this dynamic duo works together effectively? This is where the <strong>ISMS<\/strong> - our own \"Q\" of the IT world!<\/p>\n<p>An ISMS acts like an extensive spy network:<\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_3 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_4 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_9 et_pb_text et_pb_bg_layout_light et_animated et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-235637 size-full\" src=\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Echtzeitanalyse_blau.png\" alt=\"\" width=\"64\" height=\"64\" \/><\/p>\n<h5>Risk analysis<\/h5>\n<p>An ISMS <strong>identified and analysed<\/strong> possible threats and vulnerabilities in order to develop preventive measures. Like an invisible security team, it constantly monitors our systems and processes and evaluates <strong>Potential risks<\/strong>.<\/p>\n<\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_5 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_10 et_pb_text et_pb_bg_layout_light et_animated et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-235343\" src=\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/04\/LM_Ablaufe_blau.webp\" alt=\"\" width=\"64\" height=\"64\" \/><\/p>\n<h5>Harmonious interaction<\/h5>\n<p>An ISMS enables information security and IT security to fulfil their <strong>Efficient resources<\/strong> and pool their strengths. Clear guidelines and structures are used to define the roles and responsibilities of each agent in order to achieve a <strong>Harmonious interaction<\/strong> ensure.<\/p>\n<\/div><\/div>\n<\/div>\n\n<div class=\"et_pb_column_6 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_11 et_pb_text et_pb_bg_layout_light et_animated et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-235339\" src=\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Informationssicherheit_Icon-BeratungDSMS.svg\" alt=\"\" width=\"64\" height=\"64\" \/><\/p>\n<h5>Continuous improvement<\/h5>\n<p>An ISMS ensures <strong>Continuous improvement<\/strong> and adapting to new threats. It is like agent training that keeps our team at the cutting edge of technology. It promotes the <strong>Raising awareness of security risks<\/strong> throughout the organisation so that every employee keeps a watchful eye on suspicious activities.<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_row_4 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_7 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_12 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><p>In short, a <strong>ISMS<\/strong> brings <strong>Information Security <\/strong>and<strong> IT security<\/strong> to treat each other not like rivals, but like <strong>Partner<\/strong> to feel. You work <strong>Hand in hand<\/strong>to protect our digital treasures and protect our company from malicious attacks.<\/p>\n<p>So, let's raise our glasses to the inseparable trio: <strong>Information security, IT security <\/strong>and <strong>the ISMS<\/strong>! Together they form an unbeatable alliance that keeps us safe in the fast-paced world of cyber espionage and digital intrigue!<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"et_pb_section_1 et_pb_section et_section_regular et_flex_section\" id=\"kontakt\">\n<div class=\"et_pb_row_5 et_pb_row et_flex_row\">\n<div class=\"et_pb_column_8 et_pb_column et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_text_13 et_pb_text et_pb_bg_layout_light et_pb_module et_flex_module preset--module--divi-text--default\"><div class=\"et_pb_text_inner\"><h3>Do you have any questions?<\/h3>\n<p>I may not be in His Majesty's Secret Service, but I do have a licence to shoot. So if you want to become a little 007 yourself, just get in touch!<\/p>\n<\/div><\/div>\n\n<div class=\"et_pb_module et_pb_button_module_wrapper et_pb_button_0_wrapper preset--module--divi-button--default_wrapper\"><a class=\"et_pb_button_0 et_pb_button et_pb_bg_layout_dark et_pb_module et_flex_module preset--module--divi-button--default\" href=\"https:\/\/outlook.office365.com\/book\/ITSecurityBuchungen@lm-ag.de\/?ae=true\" target=\"_blank\" data-icon=\"\uf105\">Make an appointment directly<\/a><\/div>\n<\/div>\n\n<div class=\"et_pb_column_9 et_pb_column et-last-child et_flex_column et_pb_css_mix_blend_mode_passthrough et_flex_column_24_24 et_flex_column_24_24_tablet et_flex_column_24_24_phone\">\n<div class=\"et_pb_code_0 et_pb_code et_pb_module\"><div class=\"et_pb_code_inner\"><!-- Begin Brevo Form -->\n<!-- START - We recommend to place the below code in head tag of your website html  -->\n<style>\n  @font-face {\n    font-display: block;\n    font-family: 'Segoe Pro Black',Helvetica,Arial,Lucida,sans-serif;\n  }\n\n  @font-face {\n    font-display: fallback;\n    font-family: 'Segoe Pro Black',Helvetica,Arial,Lucida,sans-serif;\n    font-weight: 600;\n  }\n\n  @font-face {\n    font-display: fallback;\n    font-family: 'Segoe Pro Black',Helvetica,Arial,Lucida,sans-serif;\n    font-weight: 700;\n  }\n\n  #sib-container input:-ms-input-placeholder {\n    text-align: left;\n    font-family: \"Helvetica\", sans-serif;\n    color: #c0ccda;\n  }\n\n  #sib-container input::placeholder {\n    text-align: left;\n    font-family: \"Helvetica\", sans-serif;\n    color: #c0ccda;\n  }\n\n  #sib-container textarea::placeholder {\n    text-align: left;\n    font-family: \"Helvetica\", sans-serif;\n    color: #c0ccda;\n  }\n<\/style>\n<link rel=\"stylesheet\" href=\"https:\/\/sibforms.com\/forms\/end-form\/build\/sib-styles.css\">\n<!--  END - We recommend to place the above code in head tag of your website html -->\n\n<!-- START - We recommend to place the below code where you want the form in your website html  -->\n<div class=\"sib-form\" style=\"text-align: center; background-color: #ffffff; padding-top:0px; padding-bottom:0px;\">\n  <div id=\"sib-form-container\" class=\"sib-form-container\">\n    <div id=\"error-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:\"helvetica\", sans-serif; color:#661d1d; background-color:#ffffff; border-radius:3px; border-color:#ffffff;max-width:540px;\">\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\n        <svg viewbox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\n          <path d=\"M256 40c118.621 0 216 96.075 216 216 0 119.291-96.61 216-216 216-119.244 0-216-96.562-216-216 0-119.203 96.602-216 216-216m0-32C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm-11.49 120h22.979c6.823 0 12.274 5.682 11.99 12.5l-7 168c-.268 6.428-5.556 11.5-11.99 11.5h-8.979c-6.433 0-11.722-5.073-11.99-11.5l-7-168c-.283-6.818 5.167-12.5 11.99-12.5zM256 340c-15.464 0-28 12.536-28 28s12.536 28 28 28 28-12.536 28-28-12.536-28-28-28z\" \/>\n        <\/svg>\n        <span class=\"sib-form-message-panel__inner-text\">\n                          Your registration could not be saved. Please try again.\n                      <\/span>\n      <\/div>\n    <\/div>\n    <div><\/div>\n    <div id=\"success-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:\"helvetica\", sans-serif; color:#085229; background-color:#e7faf0; border-radius:3px; border-color:#ffffff;max-width:540px;\">\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\n        <svg viewbox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\n          <path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 464c-118.664 0-216-96.055-216-216 0-118.663 96.055-216 216-216 118.664 0 216 96.055 216 216 0 118.663-96.055 216-216 216zm141.63-274.961L217.15 376.071c-4.705 4.667-12.303 4.637-16.97-.068l-85.878-86.572c-4.667-4.705-4.637-12.303.068-16.97l8.52-8.451c4.705-4.667 12.303-4.637 16.97.068l68.976 69.533 163.441-162.13c4.705-4.667 12.303-4.637 16.97.068l8.451 8.52c4.668 4.705 4.637 12.303-.068 16.97z\" \/>\n        <\/svg>\n        <span class=\"sib-form-message-panel__inner-text\">\n                          Your registration was successful.\n                      <\/span>\n      <\/div>\n    <\/div>\n    <div><\/div>\n    <div id=\"sib-container\" class=\"sib-container--large sib-container--vertical\" style=\"text-align:center; background-color:rgba(255,255,255,1); max-width:540px; border-radius:3px; border-width:1px; border-color:#ffffff; border-style:solid; direction:ltr\">\n      <form id=\"sib-form\" method=\"POST\" action=\"https:\/\/7546b615.sibforms.com\/serve\/MUIEAICDaXsOymjnxc3lSqxDsM-CwsqyHfgGekSHLWV6rM45cIOZvnBwTWN_P3H5d2zvPkiw96-JjzT0MuL7zijRhS-bCHRn3CA4ahJ0QuZ4bAFRw5s0fCVJg1OmOe5oZ6w7EKmi87VjR36nmFMVx4PfZbZpZXBCBOY4WXQRIHhh7tiQ5zHrhzCF6t3RtT1AaN6OAwWQWIF5uC_a\" data-type=\"subscription\">\n        <div style=\"padding: 8px 16px;\">\n          <div class=\"sib-form-block sib-image-form-block\" style=\"text-align: left\">\n            <img decoding=\"async\" src=\"https:\/\/img.mailinblue.com\/3425243\/images\/content_library\/original\/666add663f9e0bf90fd726ce.png\" style=\"width: 150px;height: 66px;\" alt=\"\" title=\"\" \/>\n          <\/div>\n        <\/div>\n        <div style=\"padding-top:10px; padding-bottom:0px;\">\n          <div class=\"sib-form-block\" style=\"font-size:32px; text-align:left; font-weight:700; font-family:'Segoe Pro Black',Helvetica,Arial,Lucida,sans-serif; color:#141414; background-color:transparent; text-align:left\">\n            <p>Microsoft 365 News<\/p>\n          <\/div>\n        <\/div>\n        <div style=\"padding-top:5px; padding-bottom:25px;\">\n          <div class=\"sib-form-block\" style=\"font-size:16px; text-align:left; font-family:'Segoe Pro',Helvetica,Arial,Lucida,sans-serif; color:#141414; background-color:transparent; text-align:left\">\n            <div class=\"sib-text-form-block\">\n              <p>In our newsletter we inform you about the latest Microsoft 365 news, trends and interesting opportunities and present important information from Microsoft in an easily understandable way.<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n        <div style=\"padding: 8px 0;\">\n          <div class=\"sib-input sib-form-block\">\n            <div class=\"form__entry entry_block\">\n              <div class=\"form__label-row\">\n                <label class=\"entry__label\" style=\"font-weight: 700; text-align:left; font-size:16px; text-align:left; font-weight:700; line-height:1.2em; font-family:'Segoe Pro Black',Helvetica,Arial,Lucida,sans-serif; color:#3c4858;\" for=\"EMAIL\" data-required=\"*\">Enter your e-mail address to log in<\/label>\n\n                <div class=\"entry__field\">\n                  <input class=\"input\" type=\"text\" id=\"EMAIL\" name=\"EMAIL\" autocomplete=\"off\" placeholder=\"EMAIL\" data-required=\"true\" required \/>\n                <\/div>\n              <\/div>\n\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:\"helvetica\", sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\n              <\/label>\n            <\/div>\n          <\/div>\n        <\/div>\n        <div style=\"padding-top:0px; padding-bottom:5px;\">\n          <div class=\"sib-optin sib-form-block\">\n            <div class=\"form__entry entry_mcq\">\n              <div class=\"form__label-row\">\n                <div class=\"entry__choice\" style=\"\">\n                  <label>\n                    <input type=\"checkbox\" class=\"input_replaced\" value=\"1\" id=\"OPT_IN\" name=\"OPT_IN\" \/>\n                    <span class=\"checkbox checkbox_tick_positive\"\n            style=\"margin-left:\"\n            ><\/span><span style=\"font-size:14px; text-align:left; line-height:1.2em !important; font-family:'Segoe Pro',Helvetica,Arial,Lucida,sans-serif; color:#3C4858; background-color:transparent;\"><p style=\" line-height:1.2em !important;\">I would like to receive your newsletter and accept the privacy policy.<\/p><\/span> <\/label>\n                <\/div>\n              <\/div>\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:\"helvetica\", sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\n              <\/label>\n            <\/div>\n          <\/div>\n        <\/div>\n        <div style=\"padding: 8px 0;\">\n          <div class=\"sib-form__declaration\" style=\"direction:ltr\">\n            <div class=\"declaration-block-icon\">\n              <svg class=\"icon__SVG\" width=\"0\" height=\"0\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                <defs>\n                  <symbol id=\"svgIcon-sphere\" viewbox=\"0 0 63 63\">\n                    <path class=\"path1\" d=\"M31.54 0l1.05 3.06 3.385-.01-2.735 1.897 1.05 3.042-2.748-1.886-2.738 1.886 1.044-3.05-2.745-1.897h3.393zm13.97 3.019L46.555 6.4l3.384.01-2.743 2.101 1.048 3.387-2.752-2.1-2.752 2.1 1.054-3.382-2.745-2.105h3.385zm9.998 10.056l1.039 3.382h3.38l-2.751 2.1 1.05 3.382-2.744-2.091-2.743 2.091 1.054-3.381-2.754-2.1h3.385zM58.58 27.1l1.04 3.372h3.379l-2.752 2.096 1.05 3.387-2.744-2.091-2.75 2.092 1.054-3.387-2.747-2.097h3.376zm-3.076 14.02l1.044 3.364h3.385l-2.743 2.09 1.05 3.392-2.744-2.097-2.743 2.097 1.052-3.377-2.752-2.117 3.385-.01zm-9.985 9.91l1.045 3.364h3.393l-2.752 2.09 1.05 3.393-2.745-2.097-2.743 2.097 1.05-3.383-2.751-2.1 3.384-.01zM31.45 55.01l1.044 3.043 3.393-.008-2.752 1.9L34.19 63l-2.744-1.895-2.748 1.891 1.054-3.05-2.743-1.9h3.384zm-13.934-3.98l1.036 3.364h3.402l-2.752 2.09 1.053 3.393-2.747-2.097-2.752 2.097 1.053-3.382-2.743-2.1 3.384-.01zm-9.981-9.91l1.045 3.364h3.398l-2.748 2.09 1.05 3.392-2.753-2.1-2.752 2.096 1.053-3.382-2.743-2.102 3.384-.009zM4.466 27.1l1.038 3.372H8.88l-2.752 2.097 1.053 3.387-2.743-2.09-2.748 2.09 1.053-3.387L0 30.472h3.385zm3.069-14.025l1.045 3.382h3.395L9.23 18.56l1.05 3.381-2.752-2.09-2.752 2.09 1.053-3.381-2.744-2.1h3.384zm9.99-10.056L18.57 6.4l3.393.01-2.743 2.1 1.05 3.373-2.754-2.092-2.751 2.092 1.053-3.382-2.744-2.1h3.384zm24.938 19.394l-10-4.22a2.48 2.48 0 00-1.921 0l-10 4.22A2.529 2.529 0 0019 24.75c0 10.47 5.964 17.705 11.537 20.057a2.48 2.48 0 001.921 0C36.921 42.924 44 36.421 44 24.75a2.532 2.532 0 00-1.537-2.336zm-2.46 6.023l-9.583 9.705a.83.83 0 01-1.177 0l-5.416-5.485a.855.855 0 010-1.192l1.177-1.192a.83.83 0 011.177 0l3.65 3.697 7.819-7.916a.83.83 0 011.177 0l1.177 1.191a.843.843 0 010 1.192z\" fill=\"#0092FF\"><\/path>\n                  <\/symbol>\n                <\/defs>\n              <\/svg>\n              <svg class=\"svgIcon-sphere\" style=\"width:63px; height:63px;\">\n                <use xlink:href=\"#svgIcon-sphere\"><\/use>\n              <\/svg>\n            <\/div>\n            <p style=\"font-size:14px; text-align:left; font-family:'Segoe Pro',Helvetica,Arial,Lucida,sans-serif; color:#687484; background-color:transparent;\">\n              We use Sendinblue as our marketing platform. By Clicking below to submit this form, you acknowledge that the information you provided will be transferred to Sendinblue for processing in accordance with their <a target=\"_blank\" class=\"clickable_link\" href=\"https:\/\/www.sendinblue.com\/legal\/termsofuse\/\" rel=\"noopener\">terms of use<\/a>\n            <\/p>\n          <\/div>\n\n        <\/div>\n        <div style=\"padding: 8px 0;\">\n          <div class=\"sib-form-block\" style=\"text-align: left\">\n            <button class=\"sib-form-block__button sib-form-block__button-with-loader\" style=\"font-size:16px; text-align:left; font-weight:700; font-family:\"helvetica\", sans-serif; color:#ffffff; background-image: linear-gradient(160deg,#36a9e1 0%,#007cff 100%); border-radius:3px; border-width:0px;\" form=\"sib-form\" type=\"submit\">\n              <svg class=\"icon clickable__icon progress-indicator__icon sib-hide-loader-icon\" viewbox=\"0 0 512 512\">\n                <path d=\"M460.116 373.846l-20.823-12.022c-5.541-3.199-7.54-10.159-4.663-15.874 30.137-59.886 28.343-131.652-5.386-189.946-33.641-58.394-94.896-95.833-161.827-99.676C261.028 55.961 256 50.751 256 44.352V20.309c0-6.904 5.808-12.337 12.703-11.982 83.556 4.306 160.163 50.864 202.11 123.677 42.063 72.696 44.079 162.316 6.031 236.832-3.14 6.148-10.75 8.461-16.728 5.01z\" \/>\n              <\/svg>\n              Register now free of charge\n            <\/button>\n          <\/div>\n        <\/div>\n\n        <input type=\"text\" name=\"email_address_check\" value=\"\" class=\"input--hidden\">\n        <input type=\"hidden\" name=\"locale\" value=\"de\">\n      <\/form>\n    <\/div>\n  <\/div>\n<\/div>\n<!-- END - We recommend to place the below code where you want the form in your website html  -->\n\n<!-- START - We recommend to place the below code in footer or bottom of your website html  -->\n<script>\n  window.REQUIRED_CODE_ERROR_MESSAGE = 'W\u00e4hlen Sie bitte einen L\u00e4ndervorwahl aus.';\n  window.LOCALE = 'de';\n  window.EMAIL_INVALID_MESSAGE = window.SMS_INVALID_MESSAGE = \"Ihre bereitgestellten Informationen sind ung\u00fcltig. Bitte pr\u00fcfen Sie Ihre Eingaben.\";\n\n  window.REQUIRED_ERROR_MESSAGE = \"Dieses Feld darf nicht leer sein. \";\n\n  window.GENERIC_INVALID_MESSAGE = \"Ihre bereitgestellten Informationen sind ung\u00fcltig. Bitte pr\u00fcfen Sie Ihre Eingaben.\";\n\n\n\n\n  window.translation = {\n    common: {\n      selectedList: '{quantity} Liste ausgew\u00e4hlt',\n      selectedLists: '{quantity} Listen ausgew\u00e4hlt'\n    }\n  };\n\n  var AUTOHIDE = Boolean(1);\n<\/script>\n<script defer src=\"https:\/\/sibforms.com\/forms\/end-form\/build\/main.js\"><\/script>\n\n\n<!-- END - We recommend to place the above code in footer or bottom of your website html  -->\n<!-- End Brevo Form --><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Today we embark on a secret mission and delve into the fascinating world of information security vs. IT security. Always at our side on our digital espionage adventure: our trusty sidekick - our ISMS.<\/p>","protected":false},"author":3,"featured_media":239122,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":["post-237278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-informationssicherheit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wie 007 - Informationssicherheit vs. IT-Sicherheit<\/title>\n<meta name=\"description\" content=\"Heute begeben wir uns auf eine geheime Mission und tauchen ein in die faszinierende Welt der Informationssicherheit vs. IT-Sicherheit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lm-ag.de\/en\/information-security-vs-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wie 007 - Informationssicherheit vs. IT-Sicherheit\" \/>\n<meta property=\"og:description\" content=\"Heute begeben wir uns auf eine geheime Mission und tauchen ein in die faszinierende Welt der Informationssicherheit vs. IT-Sicherheit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lm-ag.de\/en\/information-security-vs-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"LM IT Services AG\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LMITServicesAG\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-07T08:07:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-19T08:38:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"jmandel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"jmandel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/\"},\"author\":{\"name\":\"jmandel\",\"@id\":\"https:\/\/www.lm-ag.de\/#\/schema\/person\/ff28b446631f0f08d8110d9a7948b746\"},\"headline\":\"Wie James Bond 007: Informationssicherheit vs. IT-Sicherheit\",\"datePublished\":\"2023-08-07T08:07:32+00:00\",\"dateModified\":\"2025-09-19T08:38:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/\"},\"wordCount\":6,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.lm-ag.de\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp\",\"articleSection\":[\"Informationssicherheit\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/\",\"url\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/\",\"name\":\"Wie 007 - Informationssicherheit vs. IT-Sicherheit\",\"isPartOf\":{\"@id\":\"https:\/\/www.lm-ag.de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp\",\"datePublished\":\"2023-08-07T08:07:32+00:00\",\"dateModified\":\"2025-09-19T08:38:41+00:00\",\"description\":\"Heute begeben wir uns auf eine geheime Mission und tauchen ein in die faszinierende Welt der Informationssicherheit vs. IT-Sicherheit.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#primaryimage\",\"url\":\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp\",\"contentUrl\":\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp\",\"width\":1920,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lm-ag.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wie James Bond 007: Informationssicherheit vs. IT-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lm-ag.de\/#website\",\"url\":\"https:\/\/www.lm-ag.de\/\",\"name\":\"LM IT Services AG\",\"description\":\"Der IT Dienstleister aus Osnabr\u00fcck\",\"publisher\":{\"@id\":\"https:\/\/www.lm-ag.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lm-ag.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lm-ag.de\/#organization\",\"name\":\"LM IT Services AG\",\"url\":\"https:\/\/www.lm-ag.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.lm-ag.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/04\/LM_Historie-2022.svg\",\"contentUrl\":\"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/04\/LM_Historie-2022.svg\",\"width\":1,\"height\":1,\"caption\":\"LM IT Services AG\"},\"image\":{\"@id\":\"https:\/\/www.lm-ag.de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LMITServicesAG\",\"https:\/\/www.linkedin.com\/company\/lm-it-services-ag\/\",\"https:\/\/www.instagram.com\/lmitservicesag\/\",\"https:\/\/www.youtube.com\/channel\/UC8C4s1Arjmt9NgOBgzpH39Q\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lm-ag.de\/#\/schema\/person\/ff28b446631f0f08d8110d9a7948b746\",\"name\":\"jmandel\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Like 007 - Information security vs. IT security","description":"Today we embark on a secret mission and delve into the fascinating world of information security vs. IT security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lm-ag.de\/en\/information-security-vs-it-security\/","og_locale":"en_GB","og_type":"article","og_title":"Wie 007 - Informationssicherheit vs. IT-Sicherheit","og_description":"Heute begeben wir uns auf eine geheime Mission und tauchen ein in die faszinierende Welt der Informationssicherheit vs. IT-Sicherheit.","og_url":"https:\/\/www.lm-ag.de\/en\/information-security-vs-it-security\/","og_site_name":"LM IT Services AG","article_publisher":"https:\/\/www.facebook.com\/LMITServicesAG","article_published_time":"2023-08-07T08:07:32+00:00","article_modified_time":"2025-09-19T08:38:41+00:00","og_image":[{"width":1920,"height":683,"url":"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp","type":"image\/webp"}],"author":"jmandel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"jmandel","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#article","isPartOf":{"@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/"},"author":{"name":"jmandel","@id":"https:\/\/www.lm-ag.de\/#\/schema\/person\/ff28b446631f0f08d8110d9a7948b746"},"headline":"Wie James Bond 007: Informationssicherheit vs. IT-Sicherheit","datePublished":"2023-08-07T08:07:32+00:00","dateModified":"2025-09-19T08:38:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/"},"wordCount":6,"commentCount":0,"publisher":{"@id":"https:\/\/www.lm-ag.de\/#organization"},"image":{"@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp","articleSection":["Informationssicherheit"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/","url":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/","name":"Like 007 - Information security vs. IT security","isPartOf":{"@id":"https:\/\/www.lm-ag.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp","datePublished":"2023-08-07T08:07:32+00:00","dateModified":"2025-09-19T08:38:41+00:00","description":"Today we embark on a secret mission and delve into the fascinating world of information security vs. IT security.","breadcrumb":{"@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#primaryimage","url":"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp","contentUrl":"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/03\/LM_Blog-ITSicherheitVergleich.webp","width":1920,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/www.lm-ag.de\/informationssicherheit-vs-it-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lm-ag.de\/"},{"@type":"ListItem","position":2,"name":"Wie James Bond 007: Informationssicherheit vs. IT-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/www.lm-ag.de\/#website","url":"https:\/\/www.lm-ag.de\/","name":"LM IT Services AG","description":"The IT service provider from Osnabr\u00fcck","publisher":{"@id":"https:\/\/www.lm-ag.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lm-ag.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.lm-ag.de\/#organization","name":"LM IT Services AG","url":"https:\/\/www.lm-ag.de\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.lm-ag.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/04\/LM_Historie-2022.svg","contentUrl":"https:\/\/www.lm-ag.de\/wp-content\/uploads\/2025\/04\/LM_Historie-2022.svg","width":1,"height":1,"caption":"LM IT Services AG"},"image":{"@id":"https:\/\/www.lm-ag.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LMITServicesAG","https:\/\/www.linkedin.com\/company\/lm-it-services-ag\/","https:\/\/www.instagram.com\/lmitservicesag\/","https:\/\/www.youtube.com\/channel\/UC8C4s1Arjmt9NgOBgzpH39Q"]},{"@type":"Person","@id":"https:\/\/www.lm-ag.de\/#\/schema\/person\/ff28b446631f0f08d8110d9a7948b746","name":"jmandel"}]}},"_links":{"self":[{"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/posts\/237278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/comments?post=237278"}],"version-history":[{"count":6,"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/posts\/237278\/revisions"}],"predecessor-version":[{"id":244213,"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/posts\/237278\/revisions\/244213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/media\/239122"}],"wp:attachment":[{"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/media?parent=237278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/categories?post=237278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lm-ag.de\/en\/wp-json\/wp\/v2\/tags?post=237278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}