{"id":89731,"date":"2019-03-27T13:55:39","date_gmt":"2019-03-27T12:55:39","guid":{"rendered":"https:\/\/www.sma-sunny.com\/?p=89731"},"modified":"2023-05-04T15:04:43","modified_gmt":"2023-05-04T13:04:43","slug":"the-danger-of-hacker-attacks-what-must-companies-bear-in-mind","status":"publish","type":"post","link":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/","title":{"rendered":"The Danger of Hacker Attacks: What Must Companies Bear in Mind?"},"content":{"rendered":"<p><strong>PV systems, air conditioning technology, storage systems and electric vehicles are linked and exchange information \u2014 fully digitally. The energy transition is in full swing; linking different energy sectors is gaining in importance. Companies like SMA have to meet the challenge of making this data exchange as secure as possible to prevent cyber attacks such as the attack on the energy supply system in Ukraine in December 2016. We talked to Marek Seeger, Information Security Officer at SMA, and Dr. Ingo Hanke, Technical Manager Product IT Security, about how SMA is preparing for digitalization and cyber-security requirements.<\/strong><\/p>\n<h2>What risks does the increasing digitalization of the energy supply entail?<\/h2>\n<div id=\"attachment_89700\" style=\"width: 216px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Energiewende-und-Cyber-Security.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-89700\" class=\"wp-image-89700 lazyload\" data-src=\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Energiewende-und-Cyber-Security-262x175.jpg\" alt=\"\" width=\"206\" height=\"138\" data-srcset=\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Energiewende-und-Cyber-Security-262x175.jpg 262w, https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Energiewende-und-Cyber-Security-768x512.jpg 768w, https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Energiewende-und-Cyber-Security-1024x683.jpg 1024w, https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Energiewende-und-Cyber-Security-450x300.jpg 450w, https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Energiewende-und-Cyber-Security.jpg 1134w\" data-sizes=\"(max-width: 206px) 100vw, 206px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 206px; --smush-placeholder-aspect-ratio: 206\/138;\" \/><\/a><p id=\"caption-attachment-89700\" class=\"wp-caption-text\">Marek Seeger<\/p><\/div>\n<p><strong>Marek Seeger:<\/strong> First of all, digitalization is a great opportunity \u2014 particularly in the area of energy supply. The coupling of different sectors has just about been made possible and benefits consumers and users in particular. On the other hand, threats to IT systems and distributed industrial IoT structures (Internet of Things) have significantly intensified in the last decade. The energy sector is not exempt from that. Massive, targeted attacks with a criminal or terrorist background are now almost daily fare.<\/p>\n<h2>What challenges do companies have to face now?<\/h2>\n<div id=\"attachment_89707\" style=\"width: 172px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Hanke-Ingo_1854-ORIGINAL.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-89707\" class=\"wp-image-89707 lazyload\" data-src=\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Hanke-Ingo_1854-ORIGINAL-262x302.jpg\" alt=\"\" width=\"162\" height=\"187\" data-srcset=\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Hanke-Ingo_1854-ORIGINAL-262x302.jpg 262w, https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/Hanke-Ingo_1854-ORIGINAL.jpg 447w\" data-sizes=\"(max-width: 162px) 100vw, 162px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 162px; --smush-placeholder-aspect-ratio: 162\/187;\" \/><\/a><p id=\"caption-attachment-89707\" class=\"wp-caption-text\">Dr. Ingo Hanke<\/p><\/div>\n<p><strong>Dr. Ingo Hanke:<\/strong> In the past, SMA products were the subject of weak point analyses carried out by various security researchers, who thereby raised public awareness of the topic. As one of the most important market participants in the area of photovoltaics worldwide, we are aware of these risks and have taken them very seriously from the outset. We defined our basic policy for dealing openly with security weaknesses at an early stage. We constantly work on the necessary countermeasures and also proactively implement new procedures. At the same time, external service providers regularly subject our products to penetration tests. These involve using the same methods that hackers use. These voluntary technical cyber security tests help us uncover any weak points early on and ensure adequate IT security.<\/p>\n<h2>What exactly does SMA do to take account of the increased digital requirements and requirements in terms of data-protection law?<\/h2>\n<p><strong>Marek:<\/strong> As early as 2010, SMA invested in implementing a secure communication platform for real-time communication over the Internet. This has been part of the standard scope of delivery for SMA products since 2011. In addition to this, a company-wide overall strategy to protect against cyber security threats was developed. SMA created various positions within the company that are exclusively dedicated to dealing with the topic of IT security. In this way, we ensure that we can respond to all activities affecting cyber security quickly and efficiently. And, of course, we constantly enhance our technical expertise in the area of cyber security. To that end, we created the innovation field Cyber Security. This is an internal committee of experts that assesses security issues and actively develops new security solutions.<\/p>\n<h2>What does that specifically mean for the security of SMA products?<\/h2>\n<p><strong>Ingo: <\/strong>SMA is the first manufacturer to develop a technical innovation in the area of system communication and is the only one to offer it in this way for PV system technology. Specifically, the latest versions of our firmware enable communication within the system that is fully encrypted.<br \/>\nThis provides our customers with additional protection against hacker attacks.\u00a0We have already been using encrypted communication between the PV systems and our monitoring solutions (e.g., Sunny Portal) as standard for many years.\u00a0The SMA <em>Sunny Portal<\/em>, the world\u2019s largest monitoring portal for PV systems with 400,000 registered systems, is also regularly examined by external security experts.<\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>SMA is actively involved in the association work of national and international organizations relevant to cyber security and the utility grid, e.g., in the network technology \/ network operation forum of the <a href=\"http:\/\/www.vde.com\/de\/fnn\" target=\"_blank\" rel=\"noopener\">Association for Electrical, Electronic and Information Technologies<\/a> (VDE), the <a href=\"http:\/\/www.sunspec.org\/\" target=\"_blank\" rel=\"noopener\">SunSpec Alliance<\/a> and the <a href=\"http:\/\/www.owasp.org\/\" target=\"_blank\" rel=\"noopener\">Open Web Application Security Project<\/a> (OWASP).<\/p><\/blockquote>\n<p>We are happy to answer questions from our customers about cyber security at any time. E-mail: <a href=\"mailto:information-security@SMA.de\">information-security@SMA.de<\/a><\/p>\n<p>&nbsp;<\/p>\n\n\n<div class=\"kk-star-ratings kksr-auto kksr-align-left kksr-valign-bottom\"\n    data-payload='{&quot;align&quot;:&quot;left&quot;,&quot;id&quot;:&quot;89731&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;3&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;4&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;1&quot;,&quot;greet&quot;:&quot;&quot;,&quot;legend&quot;:&quot;4\\\/5 - (3 votes)&quot;,&quot;size&quot;:&quot;22&quot;,&quot;title&quot;:&quot;The Danger of Hacker Attacks: What Must Companies Bear in Mind?&quot;,&quot;width&quot;:&quot;91.5&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 91.5px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 1px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 22px; height: 22px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 17.6px;\">\n            4\/5 - (3 votes)    <\/div>\n    <\/div>\n<div class='printomatic pom-default ' id='id7470'  data-print_target='article'><\/div>","protected":false},"excerpt":{"rendered":"<p>Businesses face the challenge of hacking to prevent cyber attacks. SMA is prepared for digitization and cyber security requirements.<\/p>\n","protected":false},"author":10,"featured_media":89716,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36],"tags":[1034,660],"class_list":["post-89731","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company","tag-data-protection","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Danger of Hacker Attacks: What Must Companies Bear in Mind?<\/title>\n<meta name=\"description\" content=\"Businesses face the challenge of hacking to prevent cyber attacks. SMA is prepared for digitization and cyber security requirements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Danger of Hacker Attacks: What Must Companies Bear in Mind?\" \/>\n<meta property=\"og:description\" content=\"Businesses face the challenge of hacking to prevent cyber attacks. SMA is prepared for digitization and cyber security requirements.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/\" \/>\n<meta property=\"og:site_name\" content=\"Sunny. SMA Corporate Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/SMASolarTechnology\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-27T12:55:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-04T13:04:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/SMA_cybersecurity-4-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"676\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dagmar Buth-Parvaresh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SMAsolar\" \/>\n<meta name=\"twitter:site\" content=\"@SMAsolar\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dagmar Buth-Parvaresh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/\",\"url\":\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/\",\"name\":\"The Danger of Hacker Attacks: What Must Companies Bear in Mind?\",\"isPartOf\":{\"@id\":\"https:\/\/www.sma-sunny.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/SMA_cybersecurity-4-4.jpg\",\"datePublished\":\"2019-03-27T12:55:39+00:00\",\"dateModified\":\"2023-05-04T13:04:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.sma-sunny.com\/en\/#\/schema\/person\/0c7a2eaa3bbb153c869499cb1712b627\"},\"description\":\"Businesses face the challenge of hacking to prevent cyber attacks. SMA is prepared for digitization and cyber security requirements.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#primaryimage\",\"url\":\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/SMA_cybersecurity-4-4.jpg\",\"contentUrl\":\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/SMA_cybersecurity-4-4.jpg\",\"width\":1400,\"height\":676},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.sma-sunny.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Danger of Hacker Attacks: What Must Companies Bear in Mind?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sma-sunny.com\/en\/#website\",\"url\":\"https:\/\/www.sma-sunny.com\/en\/\",\"name\":\"Sunny. SMA Corporate Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sma-sunny.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sma-sunny.com\/en\/#\/schema\/person\/0c7a2eaa3bbb153c869499cb1712b627\",\"name\":\"Dagmar Buth-Parvaresh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.sma-sunny.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2022\/08\/dagmar-120x120.jpg\",\"contentUrl\":\"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2022\/08\/dagmar-120x120.jpg\",\"caption\":\"Dagmar Buth-Parvaresh\"},\"description\":\"Public Relations Professional\",\"url\":\"https:\/\/www.sma-sunny.com\/en\/author\/dagmar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Danger of Hacker Attacks: What Must Companies Bear in Mind?","description":"Businesses face the challenge of hacking to prevent cyber attacks. SMA is prepared for digitization and cyber security requirements.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/","og_locale":"en_GB","og_type":"article","og_title":"The Danger of Hacker Attacks: What Must Companies Bear in Mind?","og_description":"Businesses face the challenge of hacking to prevent cyber attacks. SMA is prepared for digitization and cyber security requirements.","og_url":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/","og_site_name":"Sunny. SMA Corporate Blog","article_publisher":"https:\/\/facebook.com\/SMASolarTechnology","article_published_time":"2019-03-27T12:55:39+00:00","article_modified_time":"2023-05-04T13:04:43+00:00","og_image":[{"width":1400,"height":676,"url":"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/SMA_cybersecurity-4-4.jpg","type":"image\/jpeg"}],"author":"Dagmar Buth-Parvaresh","twitter_card":"summary_large_image","twitter_creator":"@SMAsolar","twitter_site":"@SMAsolar","twitter_misc":{"Written by":"Dagmar Buth-Parvaresh","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/","url":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/","name":"The Danger of Hacker Attacks: What Must Companies Bear in Mind?","isPartOf":{"@id":"https:\/\/www.sma-sunny.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#primaryimage"},"image":{"@id":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/SMA_cybersecurity-4-4.jpg","datePublished":"2019-03-27T12:55:39+00:00","dateModified":"2023-05-04T13:04:43+00:00","author":{"@id":"https:\/\/www.sma-sunny.com\/en\/#\/schema\/person\/0c7a2eaa3bbb153c869499cb1712b627"},"description":"Businesses face the challenge of hacking to prevent cyber attacks. SMA is prepared for digitization and cyber security requirements.","breadcrumb":{"@id":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#primaryimage","url":"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/SMA_cybersecurity-4-4.jpg","contentUrl":"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2019\/03\/SMA_cybersecurity-4-4.jpg","width":1400,"height":676},{"@type":"BreadcrumbList","@id":"https:\/\/www.sma-sunny.com\/en\/the-danger-of-hacker-attacks-what-must-companies-bear-in-mind\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.sma-sunny.com\/en\/"},{"@type":"ListItem","position":2,"name":"The Danger of Hacker Attacks: What Must Companies Bear in Mind?"}]},{"@type":"WebSite","@id":"https:\/\/www.sma-sunny.com\/en\/#website","url":"https:\/\/www.sma-sunny.com\/en\/","name":"Sunny. SMA Corporate Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sma-sunny.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.sma-sunny.com\/en\/#\/schema\/person\/0c7a2eaa3bbb153c869499cb1712b627","name":"Dagmar Buth-Parvaresh","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.sma-sunny.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2022\/08\/dagmar-120x120.jpg","contentUrl":"https:\/\/www.sma-sunny.com\/wp-content\/uploads\/2022\/08\/dagmar-120x120.jpg","caption":"Dagmar Buth-Parvaresh"},"description":"Public Relations Professional","url":"https:\/\/www.sma-sunny.com\/en\/author\/dagmar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/posts\/89731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/comments?post=89731"}],"version-history":[{"count":0,"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/posts\/89731\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/media\/89716"}],"wp:attachment":[{"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/media?parent=89731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/categories?post=89731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sma-sunny.com\/en\/wp-json\/wp\/v2\/tags?post=89731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}