{"id":8457,"date":"2020-03-12T09:52:11","date_gmt":"2020-03-12T09:52:11","guid":{"rendered":"https:\/\/acora2021arch.wpengine.com\/?p=8457"},"modified":"2024-05-24T14:53:33","modified_gmt":"2024-05-24T14:53:33","slug":"three-key-considerations-when-creating-a-cyber-security-strategy","status":"publish","type":"post","link":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/","title":{"rendered":"Three key considerations when creating a cyber-security strategy"},"content":{"rendered":"\r\n<p>Selecting a partner for your security requirements is similar to IT procurement decisions you have made before &#8211; and will probably follow the traditional 3 questions, with a twist\u2026<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"question-1-diy-or-managed-services\"><span class=\"ez-toc-section\" id=\"Question_1_DIY_or_managed_services\"><\/span>Question 1: DIY or managed services?<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>As with all <a href=\"https:\/\/acora.com\/our-services\/\">IT services<\/a>, when it comes to cyber-security, businesses have a choice; manage the security piece themselves, use selective point solution support, or use a managed service provider (MSP) to take care of the whole problem.<br \/><br \/>Taking the MSP route is increasingly popular, which is probably because of the fast-evolving sophistication of blended threats and the regulations bringing stringent requirements for safeguarding data.<br \/><br \/>Avoiding data breaches is now seen by many organisations as the number one IT imperative after operational continuity. There are many benefits of outsourcing <a href=\"https:\/\/acora.com\/our-services\/infrastructure-cloud\/\">cyber-security<\/a> requirements to an MSP, but the process is not without its complexities.<br \/><br \/>Most organisations choose to work with an MSP for one (or more) of the following reasons:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>A shortage of available (or affordable) in-house skills<\/li>\r\n<li>The scale and complexity of technologies required<\/li>\r\n<li>The speed with which the threat landscape changes<\/li>\r\n<li>The need for 24-7-365 protection<\/li>\r\n<li>Budgetary or headcount constraints<\/li>\r\n<li>A business preference to outsource<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>Underpinning all of these reasons is the reality that the speed with which new attack formats and vulnerabilities develop and evolve is increasing all the time, meaning that internal IT teams are finding it increasingly difficult to keep up. Your MSP will:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Work around the clock because data breaches don\u2019t only happen in business hours<\/li>\r\n<li>Provide a range of integrated services, expertise, technologies and processes<\/li>\r\n<li>Provide cyber-security for a fixed cost model<\/li>\r\n<li>Free up internal resources to focus on core operational business functions<\/li>\r\n<li>Detect and respond to threats and attacks as soon as \u2014 or before \u2014 they arise, thereby minimising network downtime<\/li>\r\n<li>Integrate and manage technologies from multiple security vendors to provide a consolidated solution<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"question-2-if-managed-which-elements-are-you-considering\"><span class=\"ez-toc-section\" id=\"Question_2_If_managed_which_elements_are_you_considering\"><\/span>Question 2: If managed, which elements are you considering?<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>Do you want to outsource the entire security function? Or supplement existing in-house security capabilities with bought-in skills to fill a gap? Are you looking to outsource what you currently do, or bring in additional security measures?<br \/><br \/>As well as the \u2018usual\u2019 IT security functions like antivirus and anti-spam, consider how you manage:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Cyber-security threat monitoring and response<\/li>\r\n<li>Business-wide software updates<\/li>\r\n<li><a href=\"https:\/\/acora.com\/our-services\/managed-services\/cyber-security\/managed-firewall-service\/\">Firewall policy management<\/a><\/li>\r\n<li>24-hour server monitoring<\/li>\r\n<li>Compliance<\/li>\r\n<li>Operational continuity and back ups<\/li>\r\n<li>Data protection<\/li>\r\n<li>Specialised functions such as <a href=\"https:\/\/acora.com\/our-services\/security-testing-compliance\/cyber-security-st\/penetration-testing\/\">penetration testing<\/a><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\" id=\"question-3-which-provider-is-best-for-you\"><span class=\"ez-toc-section\" id=\"Question_3_Which_provider_is_best_for_you\"><\/span>Question 3: Which provider is best for you?<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n<p>When selecting and appointing your security provider you should follow the usual selection criteria:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Fit with your business objectives<\/li>\r\n<li>References and case studies<\/li>\r\n<li>Service level agreements<\/li>\r\n<li>Skills, qualifications, certifications and awards<\/li>\r\n<li>Systems and processes<\/li>\r\n<li>Scalability and flexibility<\/li>\r\n<li>Financial stability<\/li>\r\n<li>Transition management<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>This question does include one significant twist to consider. Which is, should you be working with someone who just does security, or should you work with a provider who can support your much wider IT infrastructure, platform and support challenges?<br \/><br \/>Single solution area providers sound like specialists, so you may think that\u2019s a good option. But that also brings with it limitations and in our experience unnecessary hand-offs. An experienced, mature IT managed service provider has the resource, skills, tools and in our case an integrated SOC &#8211; meaning as we manage users and infrastructure, we can instantly observe cyber-security challenges for our customers and seamlessly respond without handover, delay or confusion.<br \/><br \/>To discuss cyber-strategy further, <a href=\"\/contact-us\/\">feel free to contact us.<\/a> We&#8217;re happy to help.<br \/>\u00a0<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Selecting a partner for your security requirements is similar to IT procurement decisions you have made before &#8211; and will probably follow the traditional 3 questions, with a twist\u2026 Question 1: DIY or managed services? As with all IT services,&#8230;<\/p>\n","protected":false},"author":16,"featured_media":10648,"comment_status":"closed","ping_status":"open","sticky":false,"template":"full-width-single-post.blade.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8457","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-archive"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Three key considerations when creating a cyber-security strategy - Acora Netherlands<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three key considerations when creating a cyber-security strategy\" \/>\n<meta property=\"og:description\" content=\"Selecting a partner for your security requirements is similar to IT procurement decisions you have made before &#8211; and will probably follow the traditional 3 questions, with a twist\u2026 Question 1: DIY or managed services? As with all IT services,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora Netherlands\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-12T09:52:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-24T14:53:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2020\/03\/Press-3-Keys-to-cyber-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Acora Press Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Acora Press Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/\"},\"author\":{\"name\":\"The Acora Press Team\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\"},\"headline\":\"Three key considerations when creating a cyber-security strategy\",\"datePublished\":\"2020-03-12T09:52:11+00:00\",\"dateModified\":\"2024-05-24T14:53:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/\"},\"wordCount\":576,\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/4\\\/2020\\\/03\\\/Press-3-Keys-to-cyber-security.jpg\",\"articleSection\":[\"Acora Archives\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/\",\"name\":\"Three key considerations when creating a cyber-security strategy - Acora Netherlands\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/4\\\/2020\\\/03\\\/Press-3-Keys-to-cyber-security.jpg\",\"datePublished\":\"2020-03-12T09:52:11+00:00\",\"dateModified\":\"2024-05-24T14:53:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/4\\\/2020\\\/03\\\/Press-3-Keys-to-cyber-security.jpg\",\"contentUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/4\\\/2020\\\/03\\\/Press-3-Keys-to-cyber-security.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/archive\\\/three-key-considerations-when-creating-a-cyber-security-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud &amp; Infrastructure\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/category\\\/cloud-infrastructure\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Three key considerations when creating a cyber-security strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/\",\"name\":\"Acora Netherlands\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\",\"name\":\"The Acora Press Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"caption\":\"The Acora Press Team\"},\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nl\\\/news\\\/author\\\/marketingteamacora-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Three key considerations when creating a cyber-security strategy - Acora Netherlands","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Three key considerations when creating a cyber-security strategy","og_description":"Selecting a partner for your security requirements is similar to IT procurement decisions you have made before &#8211; and will probably follow the traditional 3 questions, with a twist\u2026 Question 1: DIY or managed services? As with all IT services,...","og_url":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/","og_site_name":"Acora Netherlands","article_published_time":"2020-03-12T09:52:11+00:00","article_modified_time":"2024-05-24T14:53:33+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2020\/03\/Press-3-Keys-to-cyber-security.jpg","type":"image\/jpeg"}],"author":"The Acora Press Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"The Acora Press Team","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/#article","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/"},"author":{"name":"The Acora Press Team","@id":"https:\/\/acora.s.nomatter.dev\/nl\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267"},"headline":"Three key considerations when creating a cyber-security strategy","datePublished":"2020-03-12T09:52:11+00:00","dateModified":"2024-05-24T14:53:33+00:00","mainEntityOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/"},"wordCount":576,"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2020\/03\/Press-3-Keys-to-cyber-security.jpg","articleSection":["Acora Archives"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/","url":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/","name":"Three key considerations when creating a cyber-security strategy - Acora Netherlands","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/#primaryimage"},"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2020\/03\/Press-3-Keys-to-cyber-security.jpg","datePublished":"2020-03-12T09:52:11+00:00","dateModified":"2024-05-24T14:53:33+00:00","author":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267"},"breadcrumb":{"@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/#primaryimage","url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2020\/03\/Press-3-Keys-to-cyber-security.jpg","contentUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/4\/2020\/03\/Press-3-Keys-to-cyber-security.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/acora.s.nomatter.dev\/nl\/news\/archive\/three-key-considerations-when-creating-a-cyber-security-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acora.s.nomatter.dev\/nl\/"},{"@type":"ListItem","position":2,"name":"Cloud &amp; Infrastructure","item":"https:\/\/acora.s.nomatter.dev\/nl\/news\/category\/cloud-infrastructure\/"},{"@type":"ListItem","position":3,"name":"Three key considerations when creating a cyber-security strategy"}]},{"@type":"WebSite","@id":"https:\/\/acora.s.nomatter.dev\/nl\/#website","url":"https:\/\/acora.s.nomatter.dev\/nl\/","name":"Acora Netherlands","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acora.s.nomatter.dev\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/acora.s.nomatter.dev\/nl\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267","name":"The Acora Press Team","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","caption":"The Acora Press Team"},"url":"https:\/\/acora.s.nomatter.dev\/nl\/news\/author\/marketingteamacora-com\/"}]}},"_links":{"self":[{"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/posts\/8457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/comments?post=8457"}],"version-history":[{"count":2,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/posts\/8457\/revisions"}],"predecessor-version":[{"id":17127,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/posts\/8457\/revisions\/17127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/media\/10648"}],"wp:attachment":[{"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/media?parent=8457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/categories?post=8457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nl\/wp-json\/wp\/v2\/tags?post=8457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}