{"id":1696,"date":"2024-11-11T13:00:30","date_gmt":"2024-11-11T13:00:30","guid":{"rendered":"https:\/\/www.intnews.it\/?p=1696"},"modified":"2025-10-21T10:06:50","modified_gmt":"2025-10-21T10:06:50","slug":"cyber-security-a-technical-guide-for-entrepreneurs","status":"publish","type":"post","link":"https:\/\/intnews.it\/en\/cyber-security-a-technical-guide-for-entrepreneurs\/","title":{"rendered":"Cyber security: a technical guide for entrepreneurs"},"content":{"rendered":"<iframe width=\"100%\" height=\"100%\"src=\"https:\/\/iframe.mediadelivery.net\/embed\/511677\/6fd69b77-d9d2-41ff-89c2-64975663fff0\" loading=\"lazy\" allow=\"accelerometer;gyroscope;encrypted-media;picture-in-picture;\" allowfullscreen=\"true\"><\/iframe>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is critical for entrepreneurs to understand the basics of cyber security and take effective preventive measures. This article provides a technical overview of cyber security, highlighting the main threats, defense strategies and best practices to implement.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Understanding the Threats<\/strong><\/p>\n\n\n\n<p>Cyber threats can be divided into several categories, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware: <\/strong>Malicious software designed to damage or exploit systems. Includes viruses, worms, trojans and ransomware. According to research by Cybersecurity Ventures, the global costs associated with ransomware could exceed $20 billion by 2021.<\/li>\n\n\n\n<li><strong>Phishing:<\/strong> Social engineering techniques used to trick users into obtaining sensitive information. Criminals send fraudulent emails or messages, simulating reliable sources<\/li>\n\n\n\n<li><strong>Distributed Denial of Service (DDoS) attacks:<\/strong> These attacks aim to make a service or website unavailable by overloading servers with excessive traffic.<\/li>\n\n\n\n<li><strong>Unauthorized access: <\/strong>Hackers attempt to gain access to corporate systems by exploiting software vulnerabilities or using stolen credentials.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Risk Assessment<\/strong><\/p>\n\n\n\n<p>The first step in protecting a business is risk assessment. This process involves:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Asset Identification: <\/strong>Catalog all digital assets, including servers, applications, sensitive data and mobile devices.<\/li>\n\n\n\n<li><strong>Vulnerability Assessment:<\/strong> Use scanning tools to identify weaknesses in systems.&nbsp;<\/li>\n\n\n\n<li><strong>Impact analysis:<\/strong> Determine which assets are most critical to business operations and what consequences would result from a security breach.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Protection measures<\/strong><\/p>\n\n\n\n<p>After conducting a risk assessment, it is essential to implement protective measures. Here are some effective strategies:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Firewalls and Intrusion Detection Systems:<\/strong> Firewalls monitor and control incoming and outgoing traffic, while Intrusion Detection Systems (IDS) detect suspicious activity. It is important to configure these solutions correctly in order to maximise their effectiveness.<\/li>\n\n\n\n<li><strong>Encryption:<\/strong> Protect sensitive data by encrypting both at rest and in transit. HTTPS protocol, VPN and database encryption are essential to safeguard your information.<\/li>\n\n\n\n<li><strong>Multi-factor authentication (MFA): <\/strong>The implementation of MFA adds an additional layer of security by requiring users to provide two or more forms of identification. This drastically reduces the risk of unauthorized access.<\/li>\n\n\n\n<li><strong>Updates and Patches:<\/strong> Keeping your software and operating systems up to date is critical to fix known vulnerabilities. Schedule regular updates for all devices and applications.<\/li>\n\n\n\n<li><strong>Data Backup:<\/strong> Perform regular backups of critical data so that you can restore them in the event of an attack. Use both on-premises and cloud backup solutions to ensure availability.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Training of Staff<\/strong><\/p>\n\n\n\n<p>One of the most common weaknesses in cyber security is the users themselves. It is essential to provide regular training for staff on cyber risks and security practices. Employees should be aware of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Recognize phishing emails:<\/strong> Teach how to identify suspicious messages.<\/li>\n\n\n\n<li><strong>Use strong passwords:<\/strong> Promote the use of strong passwords and password management through tools like LastPass or 1Password.<\/li>\n\n\n\n<li><strong>Mobile device security: <\/strong>Educate on the risks associated with using mobile devices and protecting personal information.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Incident Response Plan<\/strong><\/p>\n\n\n\n<p>Despite all preventive measures, there is a risk of safety incidents. It is essential to have an accident response plan (IRP) in place. This should include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identification and Containment:<\/strong> Quickly detect a breach and contain the incident to limit damage.<\/li>\n\n\n\n<li><strong>Analysis and Recovery: <\/strong>Analyze the incident to understand how it happened and restore compromised systems.<\/li>\n\n\n\n<li><strong>Communication: <\/strong>Inform stakeholders, including customers and authorities, in the event of a data breach.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Cyber security is a top priority for entrepreneurs in an increasingly digital world. Investing in cyber security is not just about data protection, but also about trust and corporate reputation. Taking a proactive approach and training staff on best practices are key steps to protect the company from cyber threats. In an age of constantly changing risk, preparedness is the key to a secure and prosperous future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is critical for entrepreneurs&#8230;<\/p>\n","protected":false},"author":6,"featured_media":1552,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[84],"tags":[],"class_list":{"0":"post-1696","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technologies"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber security: a technical guide for entrepreneurs - INT News<\/title>\n<meta name=\"description\" content=\"In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is critical for entrepreneurs to understand the basics of cyber security and take effective preventive measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security: a technical guide for entrepreneurs\" \/>\n<meta property=\"og:description\" content=\"In recent years, cyber security has emerged as a major concern for companies of all sizes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/\" \/>\n<meta property=\"og:site_name\" content=\"INT News\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-11T13:00:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-21T10:06:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intnews.it\/wp-content\/uploads\/2024\/10\/3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Redazione\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Redazione\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/\"},\"author\":{\"name\":\"Redazione\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/person\\\/348bf8ca8793a1fff502097a042cb621\"},\"headline\":\"Cyber security: a technical guide for entrepreneurs\",\"datePublished\":\"2024-11-11T13:00:30+00:00\",\"dateModified\":\"2025-10-21T10:06:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/\"},\"wordCount\":633,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/3.png\",\"articleSection\":[\"Technologies\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/\",\"url\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/\",\"name\":\"Cyber security: a technical guide for entrepreneurs - INT News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/3.png\",\"datePublished\":\"2024-11-11T13:00:30+00:00\",\"dateModified\":\"2025-10-21T10:06:50+00:00\",\"description\":\"In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is critical for entrepreneurs to understand the basics of cyber security and take effective preventive measures.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/3.png\",\"contentUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/3.png\",\"width\":1920,\"height\":1080,\"caption\":\"Cyber Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/intnews.it\\\/cyber-security-una-guida-tecnica-per-imprenditori-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/intnews.it\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber security: a technical guide for entrepreneurs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/intnews.it\\\/en\\\/\",\"name\":\"INT News\",\"description\":\"innovation tomorrow\",\"publisher\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#organization\"},\"alternateName\":\"Innovation Tomorrow\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/intnews.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#organization\",\"name\":\"INT News\",\"alternateName\":\"Innovation Tomorrow\",\"url\":\"https:\\\/\\\/intnews.it\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/int-logo2.webp\",\"contentUrl\":\"https:\\\/\\\/intnews.it\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/int-logo2.webp\",\"width\":538,\"height\":232,\"caption\":\"INT News\"},\"image\":{\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/intnews.it\\\/en\\\/#\\\/schema\\\/person\\\/348bf8ca8793a1fff502097a042cb621\",\"name\":\"Redazione\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g\",\"caption\":\"Redazione\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber security: a technical guide for entrepreneurs - INT News","description":"In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is critical for entrepreneurs to understand the basics of cyber security and take effective preventive measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/","og_locale":"en_US","og_type":"article","og_title":"Cyber security: a technical guide for entrepreneurs","og_description":"In recent years, cyber security has emerged as a major concern for companies of all sizes.","og_url":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/","og_site_name":"INT News","article_published_time":"2024-11-11T13:00:30+00:00","article_modified_time":"2025-10-21T10:06:50+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/intnews.it\/wp-content\/uploads\/2024\/10\/3.png","type":"image\/png"}],"author":"Redazione","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Redazione","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/#article","isPartOf":{"@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/"},"author":{"name":"Redazione","@id":"https:\/\/intnews.it\/en\/#\/schema\/person\/348bf8ca8793a1fff502097a042cb621"},"headline":"Cyber security: a technical guide for entrepreneurs","datePublished":"2024-11-11T13:00:30+00:00","dateModified":"2025-10-21T10:06:50+00:00","mainEntityOfPage":{"@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/"},"wordCount":633,"commentCount":0,"publisher":{"@id":"https:\/\/intnews.it\/en\/#organization"},"image":{"@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/#primaryimage"},"thumbnailUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/09\/3.png","articleSection":["Technologies"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/","url":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/","name":"Cyber security: a technical guide for entrepreneurs - INT News","isPartOf":{"@id":"https:\/\/intnews.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/#primaryimage"},"image":{"@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/#primaryimage"},"thumbnailUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/09\/3.png","datePublished":"2024-11-11T13:00:30+00:00","dateModified":"2025-10-21T10:06:50+00:00","description":"In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is In recent years, cyber security has emerged as a major concern for companies of all sizes. With the rise of digital threats and data breaches, it is critical for entrepreneurs to understand the basics of cyber security and take effective preventive measures.","breadcrumb":{"@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/#primaryimage","url":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/09\/3.png","contentUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/09\/3.png","width":1920,"height":1080,"caption":"Cyber Security"},{"@type":"BreadcrumbList","@id":"https:\/\/intnews.it\/cyber-security-una-guida-tecnica-per-imprenditori-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intnews.it\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber security: a technical guide for entrepreneurs"}]},{"@type":"WebSite","@id":"https:\/\/intnews.it\/en\/#website","url":"https:\/\/intnews.it\/en\/","name":"INT News","description":"innovation tomorrow","publisher":{"@id":"https:\/\/intnews.it\/en\/#organization"},"alternateName":"Innovation Tomorrow","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intnews.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/intnews.it\/en\/#organization","name":"INT News","alternateName":"Innovation Tomorrow","url":"https:\/\/intnews.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intnews.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/10\/int-logo2.webp","contentUrl":"https:\/\/intnews.it\/wp-content\/uploads\/2023\/10\/int-logo2.webp","width":538,"height":232,"caption":"INT News"},"image":{"@id":"https:\/\/intnews.it\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/intnews.it\/en\/#\/schema\/person\/348bf8ca8793a1fff502097a042cb621","name":"Redazione","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2ed8a7892d41b1e1987f89dec08d9f4fd49c9b52e56b298a375a6418002ff84?s=96&d=mm&r=g","caption":"Redazione"}}]}},"_links":{"self":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts\/1696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/comments?post=1696"}],"version-history":[{"count":10,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts\/1696\/revisions"}],"predecessor-version":[{"id":6188,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/posts\/1696\/revisions\/6188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/media\/1552"}],"wp:attachment":[{"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/media?parent=1696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/categories?post=1696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intnews.it\/en\/wp-json\/wp\/v2\/tags?post=1696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}