{"id":987496411,"date":"2024-03-22T11:39:12","date_gmt":"2024-03-22T10:39:12","guid":{"rendered":"https:\/\/tyrex-cyber.com\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/"},"modified":"2024-03-22T11:39:56","modified_gmt":"2024-03-22T10:39:56","slug":"cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2","status":"publish","type":"post","link":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/","title":{"rendered":"Cybersecurity: 5 Key Actions for Businesses and Local Authorities"},"content":{"rendered":"<h2>Cybersecurity: the Right Thing to Do for Businesses and Public Authorities<\/h2>\n<p>While 54% of businesses suffered at least one cyber attack in 2021, cybersecurity is no longer an option but a necessity. These frequent incidents can have devastating consequences for businesses, since the median cost of a cyber attack is around \u20ac50,000. What good cyber security practices should you be following? TYREX gives you 5 key pieces of advice.<\/p>\n<h3>1. Corporate Cybersecurity: Take Care When Using USB Ports<\/h3>\n<p>USB media can be a major vector for computer threats (viruses, malware, etc.). They represent around 37% of intrusions. Whether it\u2019s a USB key or an external hard drive, it\u2019s essential to be careful when using them.<\/p>\n<p>You need to educate your employees and any service providers who may work on your site. Curiosity often leads IT users to plug in USB peripherals without knowing where they come from.<\/p>\n<p>According to the \u201cUsers Really Do Plug in USB Drives They Find\u201d study carried out by Google, 48% of users who find a USB flash drive randomly (on the floor, on the corner of a table, etc.) pick them up and plug them in. This can have serious consequences for a company or public organisation.<\/p>\n<p>To go further, organisations can also secure all removable media by adding one or more decontamination stations, as TYREX offers. By analysing USB media, our decontamination kiosks detect and eliminate threats for safe connection.<\/p>\n<p><em>CTA: Discover TYREX solutions<\/em><\/p>\n<h3>2. Choose Strong Passwords<\/h3>\n<p>Passwords are the key to accessing your computer or certain software applications or online platforms, and are one of the most sensitive aspects of IT security.<\/p>\n<p>Choosing strong passwords is essential for a company\u2019s security. A good password should be long, ideally more than 12 characters, and combine upper and lower case letters, numbers, and symbols.<\/p>\n<p>On the other hand, avoid common words, proper names, or dates that are easy to guess. Use secret phrases or random combinations of words and characters. In the same spirit, don\u2019t use the same password for several accounts.<\/p>\n<p>Change it after each incident. You could also consider using a password manager to store passwords securely, or activate two-factor authentication where possible.<\/p>\n<h3>3. Install Anti-virus and Anti-malware Software<\/h3>\n<p>Installing anti-virus and anti-malware software in your company helps to protect your IT infrastructure against cyber threats. This software serves as the first line of defence against viruses, malware, ransomware, or any other form of malicious software that can compromise sensitive data, disrupt operations, and damage a company\u2019s reputation (and its cash flow!).<\/p>\n<p>To choose the right antivirus solution, remember to take into account:<\/p>\n<ul>\n<li>The level of security offered: make sure the software offers comprehensive protection, including detection of viruses, malware, spyware, and ransomware;<\/li>\n<li>Lightweight installation: the software must be effective without significantly impacting system performance;<\/li>\n<li>Ease of integration: the solution must be easy and quick to deploy in your existing IT infrastructure and support its development;<\/li>\n<li>Frequency of automatic scans and updates: opt for solutions that regularly scan the data on the company\u2019s computer or server to eliminate threats as quickly as possible;<\/li>\n<li>The quality of customer support: in the event of an incident or attack, pay attention to the quality and availability of customer service.<\/li>\n<\/ul>\n<h3>4. Enable Only Certain IP Addresses<\/h3>\n<p>By the strategic use of an .htaccess file for access control based on IP address.<\/p>\n<p>Using an .htaccess file for IP Restriction allows you to block access to certain IP addresses to prevent access by undesirable users or IP addresses known to be malicious. Conversely, you can configure the .htaccess file to allow access only to specific IP addresses.<\/p>\n<h3>5. Using a VPN<\/h3>\n<p>With the emergence of remote working and the need for business travel, companies need to make employees aware of the potential dangers present on public networks or networks shared by several users. In this respect, they may require the use of a VPN to secure communications and data processing.<\/p>\n<p>This ensures:<\/p>\n<ul>\n<li>Greater security for the organisation, since the VPN will provide a secure connection between the employee\u2019s computer and the company server. Encrypted, it prevents malicious software or hackers from intercepting or stealing sensitive data;<\/li>\n<li>Greater confidentiality. VPN preserves anonymity and confidentiality for online activities. Even when working from home, employees can surf the Internet without revealing their real location. It also protects them from advertising tracking and privacy intrusions;<\/li>\n<li>Easy access to restricted content. Finally, VPN also enables the user\u2019s IP address to be virtually changed, making it impossible for remote servers to detect their real geographical location. This function is essential for accessing content or internal systems restricted only to certain IP addresses or geographically.<\/li>\n<\/ul>\n<p>There are many VPN solutions available, with features that provide varying levels of security. Think about comparing solutions to find one that\u2019s right for your business.<\/p>\n<p><strong>Delegate Cyber Security to an Expert<\/strong><\/p>\n<p>Cyber outsourcing involves delegating the management and security of your IT systems and network infrastructure to a specialist third party. It allows a business to use a single service provider to combine IS management and protection of sensitive data.<\/p>\n<p>As a subsidiary of the RAS group, TYREX works hand in hand with ARMADA solutions management. Advanced antivirus, VPN, secure servers, SOC, different levels of security are offered to ensure the use of data and the cyber security of the company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity: the Right Thing to Do for Businesses and Public Authorities While 54% of businesses suffered at least one cyber attack in 2021, cybersecurity is no longer an option but a necessity. These frequent incidents can have devastating consequences for businesses, since the median cost of a cyber attack is around \u20ac50,000. What good cyber [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":987496370,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-987496411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity: 5 Key Actions for Businesses and Local Authorities - TYREX - d\u00e9contamination USB<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: 5 Key Actions for Businesses and Local Authorities - TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity: the Right Thing to Do for Businesses and Public Authorities While 54% of businesses suffered at least one cyber attack in 2021, cybersecurity is no longer an option but a necessity. These frequent incidents can have devastating consequences for businesses, since the median cost of a cyber attack is around \u20ac50,000. What good cyber [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\" \/>\n<meta property=\"og:site_name\" content=\"TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-22T10:39:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-22T10:39:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1081\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Morgan-1505-admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Morgan-1505-admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\"},\"author\":{\"name\":\"Morgan-1505-admin\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/7897c8815927d160f6a468ab81b8f774\"},\"headline\":\"Cybersecurity: 5 Key Actions for Businesses and Local Authorities\",\"datePublished\":\"2024-03-22T10:39:12+00:00\",\"dateModified\":\"2024-03-22T10:39:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\"},\"wordCount\":887,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\",\"name\":\"Cybersecurity: 5 Key Actions for Businesses and Local Authorities - TYREX - d\u00e9contamination USB\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg\",\"datePublished\":\"2024-03-22T10:39:12+00:00\",\"dateModified\":\"2024-03-22T10:39:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#primaryimage\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg\",\"width\":1918,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tyrex-cyber.com\/en\/accueil\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: 5 Key Actions for Businesses and Local Authorities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"name\":\"TYREX - d\u00e9contamination USB\",\"description\":\"TYREX - d\u00e9contamination USB\",\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\",\"name\":\"TYREX - d\u00e9contamination USB\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"width\":4000,\"height\":4118,\"caption\":\"TYREX - d\u00e9contamination USB\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/7897c8815927d160f6a468ab81b8f774\",\"name\":\"Morgan-1505-admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7afdfa7d4975b0eb9a7147f489b51b62c6c05915024b507719f8237a91f28fc8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7afdfa7d4975b0eb9a7147f489b51b62c6c05915024b507719f8237a91f28fc8?s=96&d=mm&r=g\",\"caption\":\"Morgan-1505-admin\"},\"sameAs\":[\"https:\/\/tyrex-cyber.com\"],\"url\":\"https:\/\/tyrex-cyber.com\/en\/author\/morgan-1505\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: 5 Key Actions for Businesses and Local Authorities - TYREX - d\u00e9contamination USB","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: 5 Key Actions for Businesses and Local Authorities - TYREX - d\u00e9contamination USB","og_description":"Cybersecurity: the Right Thing to Do for Businesses and Public Authorities While 54% of businesses suffered at least one cyber attack in 2021, cybersecurity is no longer an option but a necessity. These frequent incidents can have devastating consequences for businesses, since the median cost of a cyber attack is around \u20ac50,000. What good cyber [&hellip;]","og_url":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/","og_site_name":"TYREX - d\u00e9contamination USB","article_published_time":"2024-03-22T10:39:12+00:00","article_modified_time":"2024-03-22T10:39:56+00:00","og_image":[{"width":1920,"height":1081,"url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg","type":"image\/jpeg"}],"author":"Morgan-1505-admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Morgan-1505-admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#article","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/"},"author":{"name":"Morgan-1505-admin","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/7897c8815927d160f6a468ab81b8f774"},"headline":"Cybersecurity: 5 Key Actions for Businesses and Local Authorities","datePublished":"2024-03-22T10:39:12+00:00","dateModified":"2024-03-22T10:39:56+00:00","mainEntityOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/"},"wordCount":887,"commentCount":0,"publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/","url":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/","name":"Cybersecurity: 5 Key Actions for Businesses and Local Authorities - TYREX - d\u00e9contamination USB","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#primaryimage"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg","datePublished":"2024-03-22T10:39:12+00:00","dateModified":"2024-03-22T10:39:56+00:00","breadcrumb":{"@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#primaryimage","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/03\/dan-nelson-ah-HeguOe9k-unsplash.jpg","width":1918,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tyrex-cyber.com\/en\/accueil\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: 5 Key Actions for Businesses and Local Authorities"}]},{"@type":"WebSite","@id":"https:\/\/tyrex-cyber.com\/en\/#website","url":"https:\/\/tyrex-cyber.com\/en\/","name":"TYREX - d\u00e9contamination USB","description":"TYREX - d\u00e9contamination USB","publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tyrex-cyber.com\/en\/#organization","name":"TYREX - d\u00e9contamination USB","url":"https:\/\/tyrex-cyber.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","width":4000,"height":4118,"caption":"TYREX - d\u00e9contamination USB"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/7897c8815927d160f6a468ab81b8f774","name":"Morgan-1505-admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7afdfa7d4975b0eb9a7147f489b51b62c6c05915024b507719f8237a91f28fc8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7afdfa7d4975b0eb9a7147f489b51b62c6c05915024b507719f8237a91f28fc8?s=96&d=mm&r=g","caption":"Morgan-1505-admin"},"sameAs":["https:\/\/tyrex-cyber.com"],"url":"https:\/\/tyrex-cyber.com\/en\/author\/morgan-1505\/"}]}},"_links":{"self":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987496411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/comments?post=987496411"}],"version-history":[{"count":1,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987496411\/revisions"}],"predecessor-version":[{"id":987496413,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987496411\/revisions\/987496413"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media\/987496370"}],"wp:attachment":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media?parent=987496411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/categories?post=987496411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/tags?post=987496411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}