{"id":901,"date":"2019-07-23T14:25:32","date_gmt":"2019-07-23T12:25:32","guid":{"rendered":"http:\/\/elementor.itaf.eu\/?p=901"},"modified":"2023-09-27T16:15:09","modified_gmt":"2023-09-27T14:15:09","slug":"cyber-security-in-the-era-of-mobility","status":"publish","type":"post","link":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/","title":{"rendered":"Cyber Security in the era of mobility"},"content":{"rendered":"<p>Cyber Security in the era of mobility are looking for new approaches and solutions based on modern technologies. It needs to operate on different fronts, from the edge of the network, through its interior and data center, to the end devices and users, wherever they are.<\/p>\n<p>At the beginning of the development of IT infrastructure in companies and the age that preceded the Internet, mechanisms for rapid spread of <a class=\"jshlink\" href=\"\/en\/how-to-protect-your-business-from-ransomware\/\" target=\"_blank\" rel=\"noopener\">software infections<\/a> practically did not exist, and the only real danger could come from inside, from malicious employees or someone who gained physical access to the network or data center. That is why it is understandable that so-called cyber security was often not high on the list of priorities of the IT staff.<\/p>\n<h2>Protecting the edge of the network<\/h2>\n<p>By connecting to the Internet, isolated infrastructure islands have ceased to exist. Companies were potential targets to anyone who is connected to a global network, so security has slowly come to the focus of IT employees and vendors. The strategy in the first stage of corporate IT security development can be compared with the measures used in medieval castles, where most efforts were made to prevent penetration of attackers from the outside, through reinforcing the door or digging deeper. Thus, IT also focused on protecting the edge of the network, mainly by investing in firewalls and creating a DMZ (demilitarized zone) segment, and antivirus and antispam solutions also found its place in companies.<\/p>\n<h2>Tactics of the attackers<\/h2>\n<p>The tactics and goals of the attackers changed over time. While malware was initially aimed at speeding up the dissemination and destruction of data, more recently, the focus of the attacker is to remain undiscovered within the corporate network for as long as possible, in order to gain as wide access as possible, but also eliminate entry traces. While hackers used to be kids who were breaking the protection just for proving themselves and become famous, today it is practically a highly profitable business. The attacks are sophisticated and well-planned, mainly with political or financial goals, such as theft of confidential data for the purpose of competing or extorting money from the companies.<\/p>\n<h2>The rise of mobility<\/h2>\n<p>The last decade has brought a real explosion in the use of mobile devices and applications, accompanied by the expansion of cloud technologies and solutions that have displaced applications from corporate infrastructure. Today, users and their data are no longer inside \u201cthe castle\u201d or company network, and Windows PCs, which have been the dominant business devices, are often replaced by mobile phones and tablets in companies. It is necessary to completely change the approach of IT security, in accordance with the challenges of the new time.<\/p>\n<h2>Keeping control &#8211; Cyber Security in the era of mobility<\/h2>\n<p>Strict security rules are usually not handy with the satisfaction of end users, who, accustomed to the speed and convenience of using apps on private mobile devices, expect similar experience in work and in a corporate environment. For today\u2019s IT staff, this seems to be an impossible task \u2013 to provide users with access to company IT services in a way that is both simple and safe, regardless of where the user is and what device is used.<\/p>\n<p>The answer to this challenge is <a class=\"jshlink\" href=\"https:\/\/www.itaf.eu\/en\/services\/microsoft-365\/\">the virtualization of desktops and applications<\/a> for their unified delivery to different mobile platforms, but also the shift of user data to the data center, where it is much easier to manage in terms of availability (high availability, <a class=\"jshlink\" href=\"\/en\/backup-disaster-recovery-services\/\">backup, DR<\/a>) and security. This makes it possible to convert end devices into simple access terminals that do not contain sensitive data (for example, a thin client office worker) or store the minimum data needed for work (for example, a tablet of a field vendor that needs access to e-mail and documents ).<\/p>\n<p>There is no \u201cgold bullet\u201d in cyber security \u2013 a product whose procurement and implementation guarantees a quiet sleep. The only successful security approach is a layered, one that starts from education and procedures and ends with concrete technological solutions, preferably diverse and from different vendors. In defining the security strategy, it is not necessary to focus on preventing the entry of bad guys from the outside, but starting from the assumption that they have probably been in for a long time.<\/p>\n<h2>How ITAF can help you?<\/h2>\n<p>If you need help with protecting your business and your brand, <a class=\"jshlink\" href=\"\/en\/contact-us\/#contactform\">Contact ITAF<\/a>. Our experienced security experts can help you with installing and maintaining some of the most effective protection against any security risks, training your employees and helping to defend your business from the lasting effects of hacking attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security in the era of mobility are looking for new approaches and solutions based on modern technologies. It needs to operate on different fronts, from the edge of the network, through its interior and data center, to the end devices and users, wherever they are. At the beginning of the development of IT infrastructure [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35284,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ngg_post_thumbnail":0,"footnotes":""},"categories":[96],"tags":[],"class_list":["post-901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security in the era of mobility - ITAF IT Partner<\/title>\n<meta name=\"description\" content=\"Cyber Security in the era of mobility are looking for new approaches and solutions based on modern technologies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security in the era of mobility - ITAF IT Partner\" \/>\n<meta property=\"og:description\" content=\"Cyber Security in the era of mobility are looking for new approaches and solutions based on modern technologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAF IT Partner\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ITAF.eu\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-23T12:25:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-27T14:15:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/Cyber-Security-in-the-era-of-mobility.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dejan Janosevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:site\" content=\"@ITAF_IT_partner\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dejan Janosevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/\"},\"author\":{\"name\":\"Dejan Janosevic\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\"},\"headline\":\"Cyber Security in the era of mobility\",\"datePublished\":\"2019-07-23T12:25:32+00:00\",\"dateModified\":\"2023-09-27T14:15:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/\"},\"wordCount\":775,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/Cyber-Security-in-the-era-of-mobility.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/\",\"name\":\"Cyber Security in the era of mobility - ITAF IT Partner\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/Cyber-Security-in-the-era-of-mobility.jpg\",\"datePublished\":\"2019-07-23T12:25:32+00:00\",\"dateModified\":\"2023-09-27T14:15:09+00:00\",\"description\":\"Cyber Security in the era of mobility are looking for new approaches and solutions based on modern technologies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/Cyber-Security-in-the-era-of-mobility.jpg\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/Cyber-Security-in-the-era-of-mobility.jpg\",\"width\":1080,\"height\":600,\"caption\":\"Cyber Security in the era of mobility\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/cyber-security-in-the-era-of-mobility\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security in the era of mobility\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"name\":\"ITAF IT Partner\",\"description\":\"Reliable IT support\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#organization\",\"name\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"contentUrl\":\"https:\\\/\\\/www.itaf.eu\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/ITAF-Geniki_logo_512px-1.webp\",\"width\":512,\"height\":166,\"caption\":\"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ITAF.eu\",\"https:\\\/\\\/x.com\\\/ITAF_IT_partner\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf\",\"https:\\\/\\\/www.youtube.com\\\/@ITAFICTPartner\\\/\",\"https:\\\/\\\/www.instagram.com\\\/itaf.eu\\\/\",\"https:\\\/\\\/www.threads.net\\\/@itaf.eu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/#\\\/schema\\\/person\\\/76d18fd2e3c2d369c9b20b96217208c2\",\"name\":\"Dejan Janosevic\",\"url\":\"https:\\\/\\\/www.itaf.eu\\\/en\\\/author\\\/dejan-janosevic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security in the era of mobility - ITAF IT Partner","description":"Cyber Security in the era of mobility are looking for new approaches and solutions based on modern technologies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security in the era of mobility - ITAF IT Partner","og_description":"Cyber Security in the era of mobility are looking for new approaches and solutions based on modern technologies.","og_url":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/","og_site_name":"ITAF IT Partner","article_publisher":"https:\/\/www.facebook.com\/ITAF.eu","article_published_time":"2019-07-23T12:25:32+00:00","article_modified_time":"2023-09-27T14:15:09+00:00","og_image":[{"width":1080,"height":600,"url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/Cyber-Security-in-the-era-of-mobility.jpg","type":"image\/jpeg"}],"author":"Dejan Janosevic","twitter_card":"summary_large_image","twitter_creator":"@ITAF_IT_partner","twitter_site":"@ITAF_IT_partner","twitter_misc":{"Written by":"Dejan Janosevic","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/#article","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/"},"author":{"name":"Dejan Janosevic","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2"},"headline":"Cyber Security in the era of mobility","datePublished":"2019-07-23T12:25:32+00:00","dateModified":"2023-09-27T14:15:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/"},"wordCount":775,"commentCount":0,"publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/Cyber-Security-in-the-era-of-mobility.jpg","articleSection":["IT Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/","url":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/","name":"Cyber Security in the era of mobility - ITAF IT Partner","isPartOf":{"@id":"https:\/\/www.itaf.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/#primaryimage"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/Cyber-Security-in-the-era-of-mobility.jpg","datePublished":"2019-07-23T12:25:32+00:00","dateModified":"2023-09-27T14:15:09+00:00","description":"Cyber Security in the era of mobility are looking for new approaches and solutions based on modern technologies.","breadcrumb":{"@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/#primaryimage","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/Cyber-Security-in-the-era-of-mobility.jpg","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2019\/07\/Cyber-Security-in-the-era-of-mobility.jpg","width":1080,"height":600,"caption":"Cyber Security in the era of mobility"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itaf.eu\/en\/cyber-security-in-the-era-of-mobility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itaf.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security in the era of mobility"}]},{"@type":"WebSite","@id":"https:\/\/www.itaf.eu\/en\/#website","url":"https:\/\/www.itaf.eu\/en\/","name":"ITAF IT Partner","description":"Reliable IT support","publisher":{"@id":"https:\/\/www.itaf.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itaf.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itaf.eu\/en\/#organization","name":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling","url":"https:\/\/www.itaf.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","contentUrl":"https:\/\/www.itaf.eu\/wp-content\/uploads\/2026\/02\/ITAF-Geniki_logo_512px-1.webp","width":512,"height":166,"caption":"ITAF is een IT partner voor KMO's, grote bedrijven en overheid: IT support, ICT infrastructuur, Cloud oplossingen, Managed IT services en software ontwikkeling"},"image":{"@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ITAF.eu","https:\/\/x.com\/ITAF_IT_partner","https:\/\/www.linkedin.com\/company\/itaf-eu?trk=tyah&trkInfo=clickedVerticalcompanyidx2-2-7tarId1429703363595tasitaf","https:\/\/www.youtube.com\/@ITAFICTPartner\/","https:\/\/www.instagram.com\/itaf.eu\/","https:\/\/www.threads.net\/@itaf.eu"]},{"@type":"Person","@id":"https:\/\/www.itaf.eu\/en\/#\/schema\/person\/76d18fd2e3c2d369c9b20b96217208c2","name":"Dejan Janosevic","url":"https:\/\/www.itaf.eu\/en\/author\/dejan-janosevic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/comments?post=901"}],"version-history":[{"count":2,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/901\/revisions"}],"predecessor-version":[{"id":45609,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/posts\/901\/revisions\/45609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media\/35284"}],"wp:attachment":[{"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/media?parent=901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/categories?post=901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itaf.eu\/en\/wp-json\/wp\/v2\/tags?post=901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}