{"id":32858,"date":"2022-04-18T10:36:37","date_gmt":"2022-04-18T08:36:37","guid":{"rendered":"https:\/\/www.itaf.eu\/?p=32858"},"modified":"2023-10-10T14:45:32","modified_gmt":"2023-10-10T12:45:32","slug":"crucial-steps-of-security-audit-to-protect-your-it-infrastructure","status":"publish","type":"post","link":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/","title":{"rendered":"Crucial steps of security audit"},"content":{"rendered":"<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/HIqd2hgy1TM\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\nDo you know how secure your IT infrastructure is? These days, due to global uncertainties, IT security became a hot topic. A thorough security audit is a pillar of a secure business IT infrastructure. Based on a detailed security audit, the necessary measures to protect business IT infrastructures can be planned and executed.<\/p>\n<p>ITAF is a security partner that can perform a broad perspective security audit for your organization and discover its pain points after which they can tailor and perform security measures specifically for your organization. A security audit is done through two phases \u2013 an on-site survey and an ICT security audit.<\/p>\n<p>These are the main points and benefits of a thorough security audit.<\/p>\n<h2>On-site survey<\/h2>\n<p>During this stage of a security audit, ITAF\u2019s security specialists will visit your organization on-site. During the visit, they will check several security points.<\/p>\n<p>The main benefit of this stage of the audit is checking out if there is any possibility of malicious intrusion, and how data loss-proof your offices are.<\/p>\n<p>Itaf specialists firstly do a check of<\/p>\n<ul>\n<li>security camera on the parking and building entrance<\/li>\n<li>control of who is entering the offices<\/li>\n<li>control of who can access the data and server room (if any on-site).<\/li>\n<\/ul>\n<p>If a malicious intruder comes to your offices, you also want to make sure that the levels of protection on devices your employees are using are extremely high.<\/p>\n<p>Secure Wi fi networks are also an important part of an on-site security system.<\/p>\n<p>These are only a few important points of security checks performed on-site and the main goal is to create a protection plan that will make your business building as safe as possible when it comes to IT security risks.<\/p>\n<h2>ICT security audit<\/h2>\n<p>ICT security audit covers the logical stage of <a href=\"https:\/\/www.itaf.eu\/en\/services\/security-services\/\" target=\"_blank\" rel=\"noopener\">IT security<\/a>. That is a thorough phase of audit from an ICT perspective of view. ITAF\u2019s security specialists are performing several check-ups to make sure that your business ICT structures are safe. These are the main points of an ICT security audit:<\/p>\n<ul>\n<li>Internet connection security, wi-fi, and guest net accesses: Securing your internet connections from intruders is one of the basic precaution measures to prevent data leaking and loss<\/li>\n<li>Software patching on desktop and server levels: each software is prone to having small errors and bugs in it, and software development companies are regularly producing updates and patches to make apps better. Any bug in the software, big or small, can be used by a malicious intruder to infest the specific app with the virus or to harm your IT environment.<\/li>\n<li>Real-time monitoring \u2013 timely reaction to any security incident might be crucial in preventing malicious attacks. That is why the check-up of your monitoring system is an important part of the audit.<\/li>\n<li>Identity and access management is another important part of the audit, especially when it comes to password policies, 2 Factor authentication, and the password manager your business is using (if any).<\/li>\n<li>Email security is an important level of cyber security, and it is contained of using advanced mailing protection and multifactor authentication<\/li>\n<li>Backups (from endpoint backup to <a class=\"jshlink\" href=\"https:\/\/www.itaf.eu\/en\/5-reasons-why-your-organization-needs-microsoft-365-backup\/\" target=\"_blank\" rel=\"noopener\">Microsoft 365 backup<\/a>) &#8211; Backup is a necessary process for data to be restored from an earlier point in time to help your data recovery from an unplanned event. Security audit involves checking if all your data is properly backed up.<\/li>\n<li>Security awareness of your employees is one of the pillars of IT security. Security audit includes several check-ups of your employee&#8217;s awareness including their ability to recognize online threats such as phishing attacks.<\/li>\n<li>Communication security, especially when it comes to VPNs and certificates is another vulnerability point that requires checking in depth.<\/li>\n<\/ul>\n<h2>Securing your IT infrastructure<\/h2>\n<p>Once a security analysis is done from a physical and ICT point of view, ITAF\u2019s security specialists will do a detailed review of the results and prepare advisory documentation that will inform you about each vulnerability point possible.<\/p>\n<p>Based on this advisory document, ITAF can provide you with a security solution that will prevent any incidents.<\/p>\n<h2>How can ITAF help you?<\/h2>\n<p><a class=\"jshlink\" href=\"https:\/\/www.itaf.eu\/en\/contact-us\/\" target=\"_blank\" rel=\"noopener\">Contact ITAF<\/a> for a complete security audit, and the security solutions crafted specifically for your organization based on all the vulnerability points discovered. Secure your IT infrastructure from scratch.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know how secure your IT infrastructure is? These days, due to global uncertainties, IT security became a hot topic. A thorough security audit is a pillar of a secure business IT infrastructure. Based on a detailed security audit, the necessary measures to protect business IT infrastructures can be planned and executed. ITAF is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":34889,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ngg_post_thumbnail":0,"footnotes":""},"categories":[96],"tags":[],"class_list":["post-32858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Crucial steps of security audit - ITAF IT Partner<\/title>\n<meta name=\"description\" content=\"Security audit is a pillar of a secure business IT infrastructure, based on which cyber security measures can be taken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crucial steps of security audit - ITAF IT Partner\" \/>\n<meta property=\"og:description\" content=\"Security audit is a pillar of a secure business IT infrastructure, based on which cyber security measures can be taken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAF IT Partner\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITAF.eu\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-18T08:36:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-10T12:45:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itaf.eu\/wp-content\/uploads\/2022\/04\/Security-Audit-EN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jasna Stanic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:site\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasna Stanic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/\"},\"author\":{\"name\":\"Jasna Stanic\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/9c7c004bb6f773cfd2a66a939556ca69\"},\"headline\":\"Crucial steps of security audit\",\"datePublished\":\"2022-04-18T08:36:37+00:00\",\"dateModified\":\"2023-10-10T12:45:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/\"},\"wordCount\":708,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Security-Audit-EN.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/\",\"name\":\"Crucial steps of security audit - ITAF IT Partner\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Security-Audit-EN.jpg\",\"datePublished\":\"2022-04-18T08:36:37+00:00\",\"dateModified\":\"2023-10-10T12:45:32+00:00\",\"description\":\"Security audit is a pillar of a secure business IT infrastructure, based on which cyber security measures can be taken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Security-Audit-EN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Security-Audit-EN.jpg\",\"width\":1080,\"height\":600,\"caption\":\"Crucial steps of security audit to protect your IT infrastructure\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crucial steps of security audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"name\":\"ITAF IT Partner\",\"description\":\"Reliable IT support\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\",\"name\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"width\":512,\"height\":166,\"caption\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ITAF.eu\",\"https:\\\/\\\/x.com\\\/ITAF_IT_partner\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf\",\"https:\\\/\\\/www.youtube.com\\\/@ITAFICTPartner\\\/\",\"https:\\\/\\\/www.instagram.com\\\/itaf.eu\\\/\",\"https:\\\/\\\/www.threads.net\\\/@itaf.eu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/9c7c004bb6f773cfd2a66a939556ca69\",\"name\":\"Jasna Stanic\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/author\\\/jasna-stanic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crucial steps of security audit - ITAF IT Partner","description":"Security audit is a pillar of a secure business IT infrastructure, based on which cyber security measures can be taken.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Crucial steps of security audit - ITAF IT Partner","og_description":"Security audit is a pillar of a secure business IT infrastructure, based on which cyber security measures can be taken.","og_url":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/","og_site_name":"ITAF IT Partner","article_publisher":"https:\/\/www.facebook.com\/ITAF.eu","article_published_time":"2022-04-18T08:36:37+00:00","article_modified_time":"2023-10-10T12:45:32+00:00","og_image":[{"width":1080,"height":600,"url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2022\/04\/Security-Audit-EN.jpg","type":"image\/jpeg"}],"author":"Jasna Stanic","twitter_card":"summary_large_image","twitter_creator":"@ITAF_IT_partner","twitter_site":"@ITAF_IT_partner","twitter_misc":{"Written by":"Jasna Stanic","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/"},"author":{"name":"Jasna Stanic","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/9c7c004bb6f773cfd2a66a939556ca69"},"headline":"Crucial steps of security audit","datePublished":"2022-04-18T08:36:37+00:00","dateModified":"2023-10-10T12:45:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/"},"wordCount":708,"publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2022\/04\/Security-Audit-EN.jpg","articleSection":["IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/","url":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/","name":"Crucial steps of security audit - ITAF IT Partner","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2022\/04\/Security-Audit-EN.jpg","datePublished":"2022-04-18T08:36:37+00:00","dateModified":"2023-10-10T12:45:32+00:00","description":"Security audit is a pillar of a secure business IT infrastructure, based on which cyber security measures can be taken.","breadcrumb":{"@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/#primaryimage","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2022\/04\/Security-Audit-EN.jpg","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2022\/04\/Security-Audit-EN.jpg","width":1080,"height":600,"caption":"Crucial steps of security audit to protect your IT infrastructure"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itaf.eu\/en\/crucial-steps-of-security-audit-to-protect-your-it-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itaf.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Crucial steps of security audit"}]},{"@type":"WebSite","@id":"https:\/\/www.itaf.eu\/en\/#website","url":"https:\/\/www.itaf.eu\/en\/","name":"ITAF IT Partner","description":"Reliable IT support","publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itaf.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itaf.eu\/en\/#organization","name":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling","url":"https:\/\/www.itaf.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","width":512,"height":166,"caption":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITAF.eu","https:\/\/x.com\/ITAF_IT_partner","https:\/\/www.linkedin.com\/company\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf","https:\/\/www.youtube.com\/@ITAFICTPartner\/","https:\/\/www.instagram.com\/itaf.eu\/","https:\/\/www.threads.net\/@itaf.eu"]},{"@type":"Person","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/9c7c004bb6f773cfd2a66a939556ca69","name":"Jasna Stanic","url":"https:\/\/www.itaf.eu\/en\/author\/jasna-stanic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/32858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/comments?post=32858"}],"version-history":[{"count":2,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/32858\/revisions"}],"predecessor-version":[{"id":45828,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/32858\/revisions\/45828"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media\/34889"}],"wp:attachment":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media?parent=32858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/categories?post=32858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/tags?post=32858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}