{"id":246884,"date":"2020-09-16T18:27:00","date_gmt":"2020-09-16T16:27:00","guid":{"rendered":"https:\/\/hager-consulting.com\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/"},"modified":"2024-10-16T09:00:59","modified_gmt":"2024-10-16T07:00:59","slug":"prevent-internal-data-theft-through-centralized-control","status":"publish","type":"post","link":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/","title":{"rendered":"Prevent internal data theft through centralized control"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-welcher-mitarbeiter-darf-auf-welche-daten-zugreifen-und-welche-informationen-sind-besonders-unternehmenskritisch\">Which employee may access which data and which information is particularly critical to the company?  <\/h2>\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/hager-consulting.com\/wp-content\/uploads\/2020\/09\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1-1024x576.png\" alt=\"HAGER article Preventing internal data theft\" class=\"wp-image-244519\" srcset=\"https:\/\/hager-consulting.com\/wp-content\/uploads\/2020\/09\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1-980x551.png 980w, https:\/\/hager-consulting.com\/wp-content\/uploads\/2020\/09\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1-480x270.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n\n<p>Crime in your own company will increase in the coming years. Around two thirds of respondents agreed with this statement in a recent study by auditing firm <a href=\"https:\/\/kpmg.com\/de\/de\/home.html\">KPMG<\/a>. A total of 1,000 companies from various sectors were surveyed. The study showed that the theft of internal company data is a major problem for four out of five companies (around 80%). Whether it is a breach of copyright, unauthorized access to financial accounts or the disclosure of business secrets and confidential information about customers and employees. Even if no company wants to accuse its employees of bad intentions, according to the KPMG survey, more than half (56%) of &#8220;breaches of trade secrets&#8221; are attributable to the company&#8217;s own employees.     <\/p>\n\n<p>\u00a0<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-80-prozent-mussen-ihr-berechtigungskonzept-anpassen\">80 percent have to adapt their authorization concept<\/h2>\n\n<p>Many companies do not have an overview of the access rights that each individual in the company has to different data, as the IT department does not have a central management system. Sensitive information and internal data are not adequately protected. In addition, the right tools to identify risk factors and compliance vulnerabilities are often missing.  <\/p>\n\n<p>Revised authorization concepts help to prevent unauthorized access to internal company data in the future. It is important to determine who needs access to which areas of the company in order to carry out their work properly and which data should be classified as particularly critical. For example, only HR managers have access to employee files, while the accounting department has sole access to the company&#8217;s finances. KPMG advises around 80 percent of the companies surveyed to urgently adapt their authorization concept. Many companies are already assigning the topic a high priority.    <\/p>\n\n<p>\u00a0<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-auch-die-gefahr-von-innen-sehen\">Seeing the danger from the inside<\/h2>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>&#8220;Due to corona, many issues have been left unaddressed and neglected. However, in view of the worrying numbers of increasing incidents of digital crime, which can also come from within, these must not be postponed. Of course, nobody wants to admit that the danger can also come from within their own ranks. Nevertheless, it is an essential task of IT management to uncover security gaps and promote an appropriate authorization concept,   <\/em>&#8220;, emphasizes <a href=\"https:\/\/hager-consulting.com\/en\/about-us\/our-team\/martin-krill\/\">Martin Krill<\/a>, Managing Partner of HAGER Executive Consulting. <em>&#8220;As a recruitment consultancy, we are constantly working with sensitive client and candidate data. Protecting this information is therefore a top priority for us. At HAGER, the IT department controls the access rights of all company members. Although we have great trust in our employees, such role management is essential in this digital world,&#8221;<\/em> says Krill.<\/p>\n<\/blockquote>\n\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crime in your own company will increase in the coming years.<\/p>\n","protected":false},"author":3,"featured_media":246888,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[341,342],"tags":[396,398,397,346,118],"class_list":["post-246884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hager-news-en","category-martin-krill-en","tag-cybersecurity-en","tag-data-security","tag-data-theft","tag-hager-executive-consulting-en","tag-martin-krill-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Prevent internal data theft through centralized control - HAGER EXECUTIVE CONSULTING<\/title>\n<meta name=\"description\" content=\"Theft of trade secrets: Find out how companies can protect themselves against crime committed by their own employees.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prevent internal data theft through centralized control by HAGER.\" \/>\n<meta property=\"og:description\" content=\"Theft of trade secrets: Find out how companies can protect themselves against crime committed by their own employees.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/\" \/>\n<meta property=\"og:site_name\" content=\"HAGER EXECUTIVE CONSULTING\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hagerub\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-16T16:27:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-16T07:00:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hager-consulting.com\/wp-content\/uploads\/2020\/09\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Angela Keuneke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HagerUBGmbH\" \/>\n<meta name=\"twitter:site\" content=\"@HagerUBGmbH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Keuneke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/\"},\"author\":{\"name\":\"Angela Keuneke\",\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/#\\\/schema\\\/person\\\/0af485391ed34256f0f81cd8b3207ea3\"},\"headline\":\"Prevent internal data theft through centralized control\",\"datePublished\":\"2020-09-16T16:27:00+00:00\",\"dateModified\":\"2024-10-16T07:00:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/\"},\"wordCount\":435,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hager-consulting.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png\",\"keywords\":[\"Cybersecurity\",\"Data security\",\"Data theft\",\"Hager Executive Consulting\",\"Martin Krill\"],\"articleSection\":[\"HAGER NEWS\",\"Martin Krill\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/\",\"url\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/\",\"name\":\"Prevent internal data theft through centralized control - HAGER EXECUTIVE CONSULTING\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hager-consulting.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png\",\"datePublished\":\"2020-09-16T16:27:00+00:00\",\"dateModified\":\"2024-10-16T07:00:59+00:00\",\"description\":\"Theft of trade secrets: Find out how companies can protect themselves against crime committed by their own employees.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hager-consulting.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png\",\"contentUrl\":\"https:\\\/\\\/hager-consulting.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png\",\"width\":1920,\"height\":1080,\"caption\":\"Die Kriminalit\u00e4t im eigenen Unternehmen wird in den kommenden Jahren zunehmen.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/2020\\\/09\\\/16\\\/prevent-internal-data-theft-through-centralized-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"home\",\"item\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prevent internal data theft through centralized control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/\",\"name\":\"HAGER EXECUTIVE CONSULTING\",\"description\":\"The Human Potential Company\",\"publisher\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/#organization\"},\"alternateName\":\"HAGER\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/#organization\",\"name\":\"HAGER Executive Consulting GmbH\",\"alternateName\":\"HAGER\",\"url\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hager-consulting.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cropped-HAGER_FAVICON_Executive_Consult_blau_hellblau_4c_010323_256x256px.png\",\"contentUrl\":\"https:\\\/\\\/hager-consulting.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cropped-HAGER_FAVICON_Executive_Consult_blau_hellblau_4c_010323_256x256px.png\",\"width\":512,\"height\":512,\"caption\":\"HAGER Executive Consulting GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hagerub\",\"https:\\\/\\\/x.com\\\/HagerUBGmbH\",\"https:\\\/\\\/www.instagram.com\\\/hager_executive_consulting\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68771\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCL7ge14cRVHn4NfRWIbaCrA\"],\"description\":\"HAGER is one of the five most successful and largest personnel consultancies in the German-speaking world and is represented in over 40 locations in more than 35 countries via the HORTON International network.\",\"email\":\"info@hager-consulting.com\",\"telephone\":\"+49 69 95092-0\",\"legalName\":\"HAGER Executive Consulting GmbH\",\"foundingDate\":\"1996-12-01\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/#\\\/schema\\\/person\\\/0af485391ed34256f0f81cd8b3207ea3\",\"name\":\"Angela Keuneke\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8d341121dcf70cf2b532e61735767695f7505d3171a9f5ff718be999ef593479?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8d341121dcf70cf2b532e61735767695f7505d3171a9f5ff718be999ef593479?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8d341121dcf70cf2b532e61735767695f7505d3171a9f5ff718be999ef593479?s=96&d=mm&r=g\",\"caption\":\"Angela Keuneke\"},\"url\":\"https:\\\/\\\/hager-consulting.com\\\/en\\\/author\\\/angelakeuneke\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Prevent internal data theft through centralized control - HAGER EXECUTIVE CONSULTING","description":"Theft of trade secrets: Find out how companies can protect themselves against crime committed by their own employees.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/","og_locale":"en_US","og_type":"article","og_title":"Prevent internal data theft through centralized control by HAGER.","og_description":"Theft of trade secrets: Find out how companies can protect themselves against crime committed by their own employees.","og_url":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/","og_site_name":"HAGER EXECUTIVE CONSULTING","article_publisher":"https:\/\/www.facebook.com\/hagerub","article_published_time":"2020-09-16T16:27:00+00:00","article_modified_time":"2024-10-16T07:00:59+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/hager-consulting.com\/wp-content\/uploads\/2020\/09\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png","type":"image\/png"}],"author":"Angela Keuneke","twitter_card":"summary_large_image","twitter_creator":"@HagerUBGmbH","twitter_site":"@HagerUBGmbH","twitter_misc":{"Written by":"Angela Keuneke","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/#article","isPartOf":{"@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/"},"author":{"name":"Angela Keuneke","@id":"https:\/\/hager-consulting.com\/en\/#\/schema\/person\/0af485391ed34256f0f81cd8b3207ea3"},"headline":"Prevent internal data theft through centralized control","datePublished":"2020-09-16T16:27:00+00:00","dateModified":"2024-10-16T07:00:59+00:00","mainEntityOfPage":{"@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/"},"wordCount":435,"commentCount":0,"publisher":{"@id":"https:\/\/hager-consulting.com\/en\/#organization"},"image":{"@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/#primaryimage"},"thumbnailUrl":"https:\/\/hager-consulting.com\/wp-content\/uploads\/2020\/09\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png","keywords":["Cybersecurity","Data security","Data theft","Hager Executive Consulting","Martin Krill"],"articleSection":["HAGER NEWS","Martin Krill"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/","url":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/","name":"Prevent internal data theft through centralized control - HAGER EXECUTIVE CONSULTING","isPartOf":{"@id":"https:\/\/hager-consulting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/#primaryimage"},"image":{"@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/#primaryimage"},"thumbnailUrl":"https:\/\/hager-consulting.com\/wp-content\/uploads\/2020\/09\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png","datePublished":"2020-09-16T16:27:00+00:00","dateModified":"2024-10-16T07:00:59+00:00","description":"Theft of trade secrets: Find out how companies can protect themselves against crime committed by their own employees.","breadcrumb":{"@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/#primaryimage","url":"https:\/\/hager-consulting.com\/wp-content\/uploads\/2020\/09\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png","contentUrl":"https:\/\/hager-consulting.com\/wp-content\/uploads\/2020\/09\/Internen-Datendiebstahl-durch-zentrale-Steuerung-vorbeugen-1.png","width":1920,"height":1080,"caption":"Die Kriminalit\u00e4t im eigenen Unternehmen wird in den kommenden Jahren zunehmen."},{"@type":"BreadcrumbList","@id":"https:\/\/hager-consulting.com\/en\/2020\/09\/16\/prevent-internal-data-theft-through-centralized-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"home","item":"https:\/\/hager-consulting.com\/en\/"},{"@type":"ListItem","position":2,"name":"Prevent internal data theft through centralized control"}]},{"@type":"WebSite","@id":"https:\/\/hager-consulting.com\/en\/#website","url":"https:\/\/hager-consulting.com\/en\/","name":"HAGER EXECUTIVE CONSULTING","description":"The Human Potential Company","publisher":{"@id":"https:\/\/hager-consulting.com\/en\/#organization"},"alternateName":"HAGER","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hager-consulting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hager-consulting.com\/en\/#organization","name":"HAGER Executive Consulting GmbH","alternateName":"HAGER","url":"https:\/\/hager-consulting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hager-consulting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/hager-consulting.com\/wp-content\/uploads\/2023\/03\/cropped-HAGER_FAVICON_Executive_Consult_blau_hellblau_4c_010323_256x256px.png","contentUrl":"https:\/\/hager-consulting.com\/wp-content\/uploads\/2023\/03\/cropped-HAGER_FAVICON_Executive_Consult_blau_hellblau_4c_010323_256x256px.png","width":512,"height":512,"caption":"HAGER Executive Consulting GmbH"},"image":{"@id":"https:\/\/hager-consulting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hagerub","https:\/\/x.com\/HagerUBGmbH","https:\/\/www.instagram.com\/hager_executive_consulting","https:\/\/www.linkedin.com\/company\/68771\/","https:\/\/www.youtube.com\/channel\/UCL7ge14cRVHn4NfRWIbaCrA"],"description":"HAGER is one of the five most successful and largest personnel consultancies in the German-speaking world and is represented in over 40 locations in more than 35 countries via the HORTON International network.","email":"info@hager-consulting.com","telephone":"+49 69 95092-0","legalName":"HAGER Executive Consulting GmbH","foundingDate":"1996-12-01","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/hager-consulting.com\/en\/#\/schema\/person\/0af485391ed34256f0f81cd8b3207ea3","name":"Angela Keuneke","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8d341121dcf70cf2b532e61735767695f7505d3171a9f5ff718be999ef593479?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8d341121dcf70cf2b532e61735767695f7505d3171a9f5ff718be999ef593479?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8d341121dcf70cf2b532e61735767695f7505d3171a9f5ff718be999ef593479?s=96&d=mm&r=g","caption":"Angela Keuneke"},"url":"https:\/\/hager-consulting.com\/en\/author\/angelakeuneke\/"}]}},"_links":{"self":[{"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/posts\/246884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=246884"}],"version-history":[{"count":0,"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/posts\/246884\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/media\/246888"}],"wp:attachment":[{"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=246884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/categories?post=246884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hager-consulting.com\/en\/wp-json\/wp\/v2\/tags?post=246884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}