{"id":1358,"date":"2021-01-20T16:22:00","date_gmt":"2021-01-20T15:22:00","guid":{"rendered":"http:\/\/vps-43e955e1.vps.ovh.net\/wordpress\/?p=1358"},"modified":"2022-11-24T15:24:44","modified_gmt":"2022-11-24T14:24:44","slug":"securite-des-donnees-et-actifs-des-entreprises","status":"publish","type":"post","link":"https:\/\/reciproc-it.com\/en\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/","title":{"rendered":"How to secure company data and assets"},"content":{"rendered":"<p class=\"has-drop-cap\">We are in the age of \"anything can happen\", technological disruption is increasing the risks to our businesses exponentially. It is essential to rethink the security of information systems in order to take into account current cyber threats.<\/p>\n\n\n\n<p>Nowadays, risk comes to the companies' doors on a regular basis, and no one is safe from it. Small, medium and large companies are all equally exposed to the threat!<\/p>\n\n\n\n<p>Traditionally, we have protected our assets by material technical means, risk management methods, more or less appropriate.<\/p>\n\n\n\n<p><strong>Le grand d\u00e9fi aujourd&rsquo;hui est bien plus grand, il porte sur la p\u00e9rennit\u00e9 des activit\u00e9s, S\u00e9curiser nos business devient une urgence. Il s\u2019agit de faire un choix quant \u00e0 la m\u00e9thode, le comportement que nous devons adopter pour faire face \u00e0 ces nouvelles menaces.<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Le Rapport Data Breach Investigations Report 2019 de Verizon s&rsquo;appuie sur des donn\u00e9es tangibles provenant de 41 686 incidents de s\u00e9curit\u00e9 et de 2 013 atteintes \u00e0 la protection des donn\u00e9es provenant de 73 sources de donn\u00e9es, tant publiques que priv\u00e9es, r\u00e9parties dans 86 pays.&nbsp;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<p>Why we believe the answer lies in Cyber-Resilience. We talk about it a lot since the multiplication and intensity of the attacks, which in the future will become part of our daily lives.<\/p>\n\n\n\n<p>Cyber-Resilience is the prerequisite that companies must adopt, a risk management, crisis management approach: How to act in the face of an attack!<\/p>\n\n\n\n<p>Our advice for building this resilience is based on 4 fundamentals:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understanding your striker<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Thinking about the attack, preventing it<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementing a remedial solution<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Strengthen prevention at the strategic, operational and human levels<\/li>\n<\/ul>\n\n\n\n<p>The crisis must be anticipated in order to manage it better, both on the technical side for rapid remediation to avoid damage to the company, and on the human side: well prepared internal and external communication is helpful.<\/p>\n\n\n\n<p>Internally, it is a matter of appeasing and encouraging the team in charge of remediation to avoid stress and the \"who's in charge\" phenomenon.<\/p>\n\n\n\n<p>And finally, externally, it is essential to report the incident to customers and partners. An information leak could be fatal to the company.<\/p>","protected":false},"excerpt":{"rendered":"<p>Nous sommes \u00e0 l\u2019\u00e8re du \u201cTout peut arriver&nbsp;\u00bb, la disruption technologique accro\u00eet les risques sur nos entreprises de fa\u00e7on exponentielle. Il est imp\u00e9ratif de repenser la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019informations afin de prendre en compte les cybermenaces actuelles. D\u00e9sormais, le risque frappe aux portes des entreprises de fa\u00e7on r\u00e9currente, nul n\u2019est \u00e0 l\u2019abri. Petites, moyennes [&hellip;]<\/p>","protected":false},"author":3,"featured_media":1999,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[15,17],"tags":[],"class_list":["post-1358","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite","category-datas"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[]}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curiser les donn\u00e9es et actifs des entreprises<\/title>\n<meta name=\"description\" content=\"N&#039;attendez pas une cyberattaque pour agir, devenez cyber-r\u00e9silient pour pouvoir r\u00e9pondre aux potentielles menaces pour votre entreprise.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/reciproc-it.com\/en\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curiser les donn\u00e9es et actifs des entreprises\" \/>\n<meta property=\"og:description\" content=\"N&#039;attendez pas une cyberattaque pour agir, devenez cyber-r\u00e9silient pour pouvoir r\u00e9pondre aux potentielles menaces pour votre entreprise.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/reciproc-it.com\/en\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/\" \/>\n<meta property=\"og:site_name\" content=\"RECIPROC-IT\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-20T15:22:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-24T14:24:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"241\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Baya Lonqueux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Baya Lonqueux\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/\"},\"author\":{\"name\":\"Baya Lonqueux\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/person\/0259b19591cb4f7a0c409a4d61d48f24\"},\"headline\":\"Quels moyens adopter pour la s\u00e9curit\u00e9 des donn\u00e9es et actifs des entreprises\",\"datePublished\":\"2021-01-20T15:22:00+00:00\",\"dateModified\":\"2022-11-24T14:24:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/\"},\"wordCount\":449,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/reciproc-it.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png\",\"articleSection\":[\"Cybers\u00e9curit\u00e9\",\"Datas\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/\",\"url\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/\",\"name\":\"S\u00e9curiser les donn\u00e9es et actifs des entreprises\",\"isPartOf\":{\"@id\":\"https:\/\/reciproc-it.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png\",\"datePublished\":\"2021-01-20T15:22:00+00:00\",\"dateModified\":\"2022-11-24T14:24:44+00:00\",\"description\":\"N'attendez pas une cyberattaque pour agir, devenez cyber-r\u00e9silient pour pouvoir r\u00e9pondre aux potentielles menaces pour votre entreprise.\",\"breadcrumb\":{\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#primaryimage\",\"url\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png\",\"contentUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png\",\"width\":500,\"height\":241},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/reciproc-it.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quels moyens adopter pour la s\u00e9curit\u00e9 des donn\u00e9es et actifs des entreprises\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/reciproc-it.com\/#website\",\"url\":\"https:\/\/reciproc-it.com\/\",\"name\":\"RECIPROC-IT\",\"description\":\"\u00c9vang\u00e9liser nos clients en les outillant\",\"publisher\":{\"@id\":\"https:\/\/reciproc-it.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/reciproc-it.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/reciproc-it.com\/#organization\",\"name\":\"RECIPROC-IT\",\"url\":\"https:\/\/reciproc-it.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png\",\"contentUrl\":\"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png\",\"width\":1065,\"height\":234,\"caption\":\"RECIPROC-IT\"},\"image\":{\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/person\/0259b19591cb4f7a0c409a4d61d48f24\",\"name\":\"Baya Lonqueux\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/reciproc-it.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1c07e327b79ff4d45c28a2cd7955c0fe5b977ac48ea178cef93e711a4fc83936?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1c07e327b79ff4d45c28a2cd7955c0fe5b977ac48ea178cef93e711a4fc83936?s=96&d=mm&r=g\",\"caption\":\"Baya Lonqueux\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/bayalonqueux\/\"],\"url\":\"https:\/\/reciproc-it.com\/en\/author\/baya_lonqueux\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curiser les donn\u00e9es et actifs des entreprises","description":"N'attendez pas une cyberattaque pour agir, devenez cyber-r\u00e9silient pour pouvoir r\u00e9pondre aux potentielles menaces pour votre entreprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/reciproc-it.com\/en\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/","og_locale":"en_GB","og_type":"article","og_title":"S\u00e9curiser les donn\u00e9es et actifs des entreprises","og_description":"N'attendez pas une cyberattaque pour agir, devenez cyber-r\u00e9silient pour pouvoir r\u00e9pondre aux potentielles menaces pour votre entreprise.","og_url":"https:\/\/reciproc-it.com\/en\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/","og_site_name":"RECIPROC-IT","article_published_time":"2021-01-20T15:22:00+00:00","article_modified_time":"2022-11-24T14:24:44+00:00","og_image":[{"width":500,"height":241,"url":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png","type":"image\/png"}],"author":"Baya Lonqueux","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Baya Lonqueux","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#article","isPartOf":{"@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/"},"author":{"name":"Baya Lonqueux","@id":"https:\/\/reciproc-it.com\/#\/schema\/person\/0259b19591cb4f7a0c409a4d61d48f24"},"headline":"Quels moyens adopter pour la s\u00e9curit\u00e9 des donn\u00e9es et actifs des entreprises","datePublished":"2021-01-20T15:22:00+00:00","dateModified":"2022-11-24T14:24:44+00:00","mainEntityOfPage":{"@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/"},"wordCount":449,"commentCount":0,"publisher":{"@id":"https:\/\/reciproc-it.com\/#organization"},"image":{"@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png","articleSection":["Cybers\u00e9curit\u00e9","Datas"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/","url":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/","name":"S\u00e9curiser les donn\u00e9es et actifs des entreprises","isPartOf":{"@id":"https:\/\/reciproc-it.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#primaryimage"},"image":{"@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png","datePublished":"2021-01-20T15:22:00+00:00","dateModified":"2022-11-24T14:24:44+00:00","description":"N'attendez pas une cyberattaque pour agir, devenez cyber-r\u00e9silient pour pouvoir r\u00e9pondre aux potentielles menaces pour votre entreprise.","breadcrumb":{"@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#primaryimage","url":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png","contentUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/CyberResilience1-e1591283394878.png","width":500,"height":241},{"@type":"BreadcrumbList","@id":"https:\/\/reciproc-it.com\/2021\/01\/20\/securite-des-donnees-et-actifs-des-entreprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/reciproc-it.com\/"},{"@type":"ListItem","position":2,"name":"Quels moyens adopter pour la s\u00e9curit\u00e9 des donn\u00e9es et actifs des entreprises"}]},{"@type":"WebSite","@id":"https:\/\/reciproc-it.com\/#website","url":"https:\/\/reciproc-it.com\/","name":"RECIPROC-IT","description":"\u00c9vang\u00e9liser nos clients en les outillant","publisher":{"@id":"https:\/\/reciproc-it.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/reciproc-it.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/reciproc-it.com\/#organization","name":"RECIPROC-IT","url":"https:\/\/reciproc-it.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/","url":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png","contentUrl":"https:\/\/reciproc-it.com\/wp-content\/uploads\/2021\/04\/Reciproc_it.logo-removebg-preview.png","width":1065,"height":234,"caption":"RECIPROC-IT"},"image":{"@id":"https:\/\/reciproc-it.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/reciproc-it.com\/#\/schema\/person\/0259b19591cb4f7a0c409a4d61d48f24","name":"Baya Lonqueux","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/reciproc-it.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1c07e327b79ff4d45c28a2cd7955c0fe5b977ac48ea178cef93e711a4fc83936?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c07e327b79ff4d45c28a2cd7955c0fe5b977ac48ea178cef93e711a4fc83936?s=96&d=mm&r=g","caption":"Baya Lonqueux"},"sameAs":["https:\/\/www.linkedin.com\/in\/bayalonqueux\/"],"url":"https:\/\/reciproc-it.com\/en\/author\/baya_lonqueux\/"}]}},"_links":{"self":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts\/1358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/comments?post=1358"}],"version-history":[{"count":5,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts\/1358\/revisions"}],"predecessor-version":[{"id":2444,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/posts\/1358\/revisions\/2444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/media\/1999"}],"wp:attachment":[{"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/media?parent=1358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/categories?post=1358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reciproc-it.com\/en\/wp-json\/wp\/v2\/tags?post=1358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}