{"id":50264,"date":"2019-03-02T07:00:52","date_gmt":"2019-03-02T06:00:52","guid":{"rendered":"http:\/\/smeupnew.it\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/"},"modified":"2025-08-07T12:32:17","modified_gmt":"2025-08-07T10:32:17","slug":"cyber-sicurezza-ricette-parte-2","status":"publish","type":"post","link":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/","title":{"rendered":"Cyber sicurezza: le ricette di successo per le aziende &#8211; parte 2"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-1\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Nella <a href=\"https:\/\/www.smeup.com\/magazine\/blog\/smeup-ics-api-cyber-security-parte-1\/\" target=\"_blank\" rel=\"noopener\">prima puntata<\/a> di questi articoli sulla cyber sicurezza abbiamo parlato del webinar tematico realizzato da Dario Vemagi, Chief ICS Manager di smeup, in collaborazione con API Lecco. Successivamente, vi abbiamo dato alcune delle nostre ricette di successo per garantire la sicurezza informatica delle aziende.<\/p>\n<p>Passiamo ora a darvi altri consigli per la cyber sicurezza, ce si riveleranno sicuramente utili.<\/p>\n<h2>Ricette per la cyber sicurezza aziendale<\/h2>\n<ul>\n<li>Sicurezza \u00e8 Next Generation SEC<\/li>\n<\/ul>\n<p>La cybersecurity oggi \u00e8: utenti che usano applicazioni. Da dovunque essi ne abbiano bisogno con il device che preferiscono o di cui hanno necessit\u00e0.<br \/>\nLa modalit\u00e0 tradizionale di controllo del perimetro di accesso e dei device non \u00e8 pi\u00f9 corretta.<\/p>\n<p>Ricetta:<br \/>\nFirewall Next Generation<br \/>\nAdvanced threat prevention<\/p>\n<ul>\n<li>Sicurezza \u00e8 Mobile<\/li>\n<\/ul>\n<p>Dobbiamo gestire i dati ovunque essi siano sia con protezione che accesso. Le nuove piattaforme lanciano nuove sfide. Quale valore \u00e8 in mano agli utenti mobili, quale controllo, quali capacit\u00e0.<\/p>\n<p>Ricette:<br \/>\nStrumenti device manager<br \/>\nPolicy applicative basate su applicazioni\/utente<\/p>\n<ul>\n<li>Sicurezza \u00e8 Endpoint<\/li>\n<\/ul>\n<p>Tutti i device con cui accedo ai dati sono un potenziale strumento attraverso cui un attaccante pu\u00f2 vedere, cercare, modificare i dati.<\/p>\n<p>Ricetta:<br \/>\nProteggere i dati dalla perdita accidentale (crittografia)<br \/>\nProteggere le comunicazioni alle applicazioni (certificati SSL e VPN)<\/p>\n<ul>\n<li>Sicurezza \u00e8 IoT<\/li>\n<\/ul>\n<p>Nelle nostre aziende \/ case stanno entrando nuovi tipi di device.<br \/>\nChi produce il lato software? Che operazioni  svolgono? Come scambiano le operazioni?<\/p>\n<p>Ricetta:<br \/>\nIsolate e controllate i device<br \/>\nNon usate la stessa password per il Wi-Fi di tutti i device<\/p>\n<ul>\n<li>Sicurezza \u00e8 Industrial<\/li>\n<\/ul>\n<p>La produzione \u00e8 sempre pi\u00f9 legata alla componente software. Come per gli altri software dobbiamo valutare i macchinari anche per le caratteristiche del software e dell\u2019integrazione.<\/p>\n<p>Ricette<br \/>\nProgettare la rete per Industrial con occhio all\u2019isolamento e security<br \/>\nMettete dei NGFW tra Industrial e Office<br \/>\nRifiutate di continuare a supportare sistemi operativi obsoleti<\/p>\n<p>Arrivederci alla prossima puntata per scoprire altre ricette per la cyber sicurezza della vostra azienda!<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>La cyber sicurezza offre &#8220;ricette di successo&#8221; per affrontare le minacce moderne, coprendo la protezione di utenti mobili, endpoint, IoT e sistemi industriali per una difesa aziendale completa.<\/p>\n","protected":false},"author":1,"featured_media":53885,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7190],"tags":[5647,5779,5780,5781,4613,5648,5782,5783,5784,5785,4862,3983],"class_list":["post-50264","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sicurezza-informatica","tag-api-lecco","tag-certificati-ssl","tag-certificati-vpn","tag-crittografia","tag-cyber-security","tag-cyber-sicurezza","tag-dario-vemagi","tag-firewall-next-generation","tag-next-generation-sec","tag-ngfw","tag-security-informatica","tag-sicurezza-informatica"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber sicurezza: le ricette di successo per le aziende - parte 2<\/title>\n<meta name=\"description\" content=\"Nella prima puntata sulla cyber sicurezza abbiamo parlato del webinar tematico. Passiamo ora a darvi altri consigli per la cyber sicurezza.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber sicurezza: le ricette di successo per le aziende - parte 2\" \/>\n<meta property=\"og:description\" content=\"Nella prima puntata sulla cyber sicurezza abbiamo parlato del webinar tematico. Passiamo ora a darvi altri consigli per la cyber sicurezza.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Magazine\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-02T06:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T10:32:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2019\/03\/cyber-sicurezza.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"smeup\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"smeup\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/\"},\"author\":{\"name\":\"smeup\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"headline\":\"Cyber sicurezza: le ricette di successo per le aziende &#8211; parte 2\",\"datePublished\":\"2019-03-02T06:00:52+00:00\",\"dateModified\":\"2025-08-07T10:32:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/\"},\"wordCount\":460,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2019\\\/03\\\/cyber-sicurezza.jpg\",\"keywords\":[\"api lecco\",\"certificati ssl\",\"certificati vpn\",\"crittografia\",\"Cyber security\",\"cyber sicurezza\",\"dario vemagi\",\"firewall next generation\",\"next generation sec\",\"ngfw\",\"security informatica\",\"sicurezza informatica\"],\"articleSection\":[\"Sicurezza informatica\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/\",\"name\":\"Cyber sicurezza: le ricette di successo per le aziende - parte 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2019\\\/03\\\/cyber-sicurezza.jpg\",\"datePublished\":\"2019-03-02T06:00:52+00:00\",\"dateModified\":\"2025-08-07T10:32:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\"},\"description\":\"Nella prima puntata sulla cyber sicurezza abbiamo parlato del webinar tematico. Passiamo ora a darvi altri consigli per la cyber sicurezza.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2019\\\/03\\\/cyber-sicurezza.jpg\",\"contentUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2019\\\/03\\\/cyber-sicurezza.jpg\",\"width\":1600,\"height\":840,\"caption\":\"smeup cyber sicurezza\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/cyber-sicurezza-ricette-parte-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber sicurezza: le ricette di successo per le aziende &#8211; parte 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\",\"name\":\"Magazine\",\"description\":\"smeup\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/194a55d96e7e52223a84ff78468bf5c7\",\"name\":\"smeup\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g\",\"caption\":\"smeup\"},\"sameAs\":[\"https:\\\/\\\/www.smeup.com\"],\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber sicurezza: le ricette di successo per le aziende - parte 2","description":"Nella prima puntata sulla cyber sicurezza abbiamo parlato del webinar tematico. Passiamo ora a darvi altri consigli per la cyber sicurezza.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/","og_locale":"it_IT","og_type":"article","og_title":"Cyber sicurezza: le ricette di successo per le aziende - parte 2","og_description":"Nella prima puntata sulla cyber sicurezza abbiamo parlato del webinar tematico. Passiamo ora a darvi altri consigli per la cyber sicurezza.","og_url":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/","og_site_name":"Magazine","article_published_time":"2019-03-02T06:00:52+00:00","article_modified_time":"2025-08-07T10:32:17+00:00","og_image":[{"width":1600,"height":840,"url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2019\/03\/cyber-sicurezza.jpg","type":"image\/jpeg"}],"author":"smeup","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"smeup","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/#article","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/"},"author":{"name":"smeup","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"headline":"Cyber sicurezza: le ricette di successo per le aziende &#8211; parte 2","datePublished":"2019-03-02T06:00:52+00:00","dateModified":"2025-08-07T10:32:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/"},"wordCount":460,"commentCount":0,"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2019\/03\/cyber-sicurezza.jpg","keywords":["api lecco","certificati ssl","certificati vpn","crittografia","Cyber security","cyber sicurezza","dario vemagi","firewall next generation","next generation sec","ngfw","security informatica","sicurezza informatica"],"articleSection":["Sicurezza informatica"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/","url":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/","name":"Cyber sicurezza: le ricette di successo per le aziende - parte 2","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/#primaryimage"},"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2019\/03\/cyber-sicurezza.jpg","datePublished":"2019-03-02T06:00:52+00:00","dateModified":"2025-08-07T10:32:17+00:00","author":{"@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7"},"description":"Nella prima puntata sulla cyber sicurezza abbiamo parlato del webinar tematico. Passiamo ora a darvi altri consigli per la cyber sicurezza.","breadcrumb":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/#primaryimage","url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2019\/03\/cyber-sicurezza.jpg","contentUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2019\/03\/cyber-sicurezza.jpg","width":1600,"height":840,"caption":"smeup cyber sicurezza"},{"@type":"BreadcrumbList","@id":"https:\/\/www.smeup.com\/magazine\/blog\/cyber-sicurezza-ricette-parte-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.smeup.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Cyber sicurezza: le ricette di successo per le aziende &#8211; parte 2"}]},{"@type":"WebSite","@id":"https:\/\/www.smeup.com\/magazine\/#website","url":"https:\/\/www.smeup.com\/magazine\/","name":"Magazine","description":"smeup","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.smeup.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/194a55d96e7e52223a84ff78468bf5c7","name":"smeup","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a88cc3ad6c0af01768fe2ac47c88a321699d97ced53c173f66ceaa51400f43ca?s=96&d=mm&r=g","caption":"smeup"},"sameAs":["https:\/\/www.smeup.com"],"url":"https:\/\/www.smeup.com\/magazine\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/50264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/comments?post=50264"}],"version-history":[{"count":5,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/50264\/revisions"}],"predecessor-version":[{"id":58270,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/50264\/revisions\/58270"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media\/53885"}],"wp:attachment":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media?parent=50264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/categories?post=50264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/tags?post=50264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}