{"id":12460,"date":"2024-05-07T10:20:47","date_gmt":"2024-05-07T10:20:47","guid":{"rendered":"https:\/\/www.emagister.it\/blog\/?p=12460"},"modified":"2024-05-07T10:23:31","modified_gmt":"2024-05-07T10:23:31","slug":"cyber-sicurity","status":"publish","type":"post","link":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/","title":{"rendered":"Cyber security"},"content":{"rendered":"<p><b>Perdita di dati<\/b><span style=\"font-weight: 400;\">, malfunzionamento dei <\/span><b>sistemi informativi<\/b><span style=\"font-weight: 400;\">, <\/span><b>blocco<\/b><span style=\"font-weight: 400;\"> dell\u2019attivit\u00e0: gli <\/span><b>attacchi cibernetici<\/b><span style=\"font-weight: 400;\"> possono avere conseguenze devastanti, soprattutto all\u2019interno di <\/span><b>Enti pubblici<\/b><span style=\"font-weight: 400;\"> che devono erogare servizi ai cittadini.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L\u2019ultimo report annuale dell\u2019Agenzia per la Cybersicurezza Nazionale, presentato di recente, mette in luce un <\/span><b>fenomeno in forte espansione<\/b><span style=\"font-weight: 400;\">. Rispetto al 2023, gli attacchi subiti dalle istituzioni italiane sono <\/span><b>cresciuti del 163%<\/b><span style=\"font-weight: 400;\">. Particolarmente frequenti le segnalazioni di <\/span><b>ransomware<\/b><span style=\"font-weight: 400;\">, aumentate del <\/span><b>27%<\/b><span style=\"font-weight: 400;\">. <b><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8036 size-full\" src=\"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2021\/05\/Professional-Accademy.jpg\" alt=\"\" width=\"300\" height=\"200\" \/><\/strong><\/b><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Una delle strategie pi\u00f9 efficaci per difendersi dagli attacchi e ridurne gli effetti \u00e8 la <\/span><b>prevenzione<\/b><span style=\"font-weight: 400;\">. \u00c8 fondamentale avere <\/span><b>adeguate competenze<\/b><span style=\"font-weight: 400;\"> in materia di cyber sicurezza, cio\u00e8 sapere, per esempio, le differenti <\/span><b>tipologie<\/b><span style=\"font-weight: 400;\"> di attacco e i rischi pi\u00f9 diffusi, al fine di attuare, laddove possibile, le <\/span><b>contromisure<\/b><span style=\"font-weight: 400;\"> pi\u00f9 opportune per evitarlo e le <\/span><b>soluzioni<\/b><span style=\"font-weight: 400;\"> pi\u00f9 efficaci per gestire eventuali emergenze.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Altro aspetto importante riguarda l\u2019utilizzo di <\/span><b>sistemi digitali all\u2019avanguardia<\/b><span style=\"font-weight: 400;\">, capaci di garantire un alto livello di sicurezza, oltre ad attivit\u00e0 periodiche di <\/span><b>ispezione e monitoraggio<\/b><span style=\"font-weight: 400;\"> per verificare le performances dell\u2019infrastruttura e la risposta a eventuali attacchi.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Soprattutto per quanto riguarda la Pubblica Amministrazione, \u00e8 importante continuare a <\/span><b>investire risorse<\/b><span style=\"font-weight: 400;\">: un\u2019opportunit\u00e0 da cogliere, per esempio, \u00e8 rappresentata dal PNRR che mette a disposizione fondi da utilizzare proprio a tale scopo. Infine, vista la continua e rapida evoluzione della tecnologia e la possibilit\u00e0 che vengano sviluppati in futuro <\/span><b>modalit\u00e0 di attacco sempre pi\u00f9 sofisticate<\/b><span style=\"font-weight: 400;\">, \u00e8 fondamentale la <\/span><b>collaborazione<\/b><span style=\"font-weight: 400;\"> tra gli enti e le istituzioni.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Per evitare conseguenze molto gravi (dal furto di dati alla sospensione dell\u2019attivit\u00e0) bisogna avere un minimo di dimestichezza a livello informatico, perch\u00e9 chiunque utilizza quotidianamente un PC, naviga online e riceve mail <\/span><b>\u00e8 esposto a rischi di attacco che possono ripercuotersi sull\u2019intero Ente pubblico<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Perdita di dati, malfunzionamento dei sistemi informativi, blocco dell\u2019attivit\u00e0: gli attacchi cibernetici possono avere conseguenze devastanti, soprattutto all\u2019interno di Enti pubblici che devono erogare servizi ai cittadini. L\u2019ultimo report annuale dell\u2019Agenzia per la Cybersicurezza Nazionale, presentato di recente, mette in luce un fenomeno in forte espansione. Rispetto al 2023, gli attacchi subiti dalle istituzioni italiane [&hellip;]<\/p>\n","protected":false},"author":164,"featured_media":12461,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[867,1138,1139,1324,260,592],"class_list":["post-12460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-i-nostri-clienti","tag-noticiasskuola","tag-1138","tag-professional-academy-aidem-srl","tag-ij_sector_center_99992269674249392522766775091915_78","tag-centri-di-formazione","tag-centri-emagister"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber security - Emagister Blog Italia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security - Emagister Blog Italia\" \/>\n<meta property=\"og:description\" content=\"Perdita di dati, malfunzionamento dei sistemi informativi, blocco dell\u2019attivit\u00e0: gli attacchi cibernetici possono avere conseguenze devastanti, soprattutto all\u2019interno di Enti pubblici che devono erogare servizi ai cittadini. L\u2019ultimo report annuale dell\u2019Agenzia per la Cybersicurezza Nazionale, presentato di recente, mette in luce un fenomeno in forte espansione. Rispetto al 2023, gli attacchi subiti dalle istituzioni italiane [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Emagister Blog Italia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/es-la.facebook.com\/Emagister.Italia\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-07T10:20:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T10:23:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"787\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Redazione Emagister\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@emagister_it\" \/>\n<meta name=\"twitter:site\" content=\"@emagister_it\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Redazione Emagister\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/\"},\"author\":{\"name\":\"Redazione Emagister\",\"@id\":\"https:\/\/www.emagister.it\/blog\/#\/schema\/person\/b854365c040bf8645900cd60a97f1897\"},\"headline\":\"Cyber security\",\"datePublished\":\"2024-05-07T10:20:47+00:00\",\"dateModified\":\"2024-05-07T10:23:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/\"},\"wordCount\":278,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg\",\"keywords\":[\"noticiasSkuola\",\"99992269674249392522766775091915\",\"Professional Academy - Aidem srl\",\"ij_sector_center_99992269674249392522766775091915_78\",\"Centri di Formazione\",\"centri emagister\"],\"articleSection\":[\"I Nostri Clienti\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/\",\"url\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/\",\"name\":\"Cyber security - Emagister Blog Italia\",\"isPartOf\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg\",\"datePublished\":\"2024-05-07T10:20:47+00:00\",\"dateModified\":\"2024-05-07T10:23:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#primaryimage\",\"url\":\"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg\",\"contentUrl\":\"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg\",\"width\":787,\"height\":443,\"caption\":\"cybersecurity concept, user privacy security and encryption, secure internet access Future technology and cybernetics, screen padlock. Man using his mobile selects the icon security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\ue821\",\"item\":\"https:\/\/www.emagister.it\/blog\/homepage\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"I Nostri Clienti\",\"item\":\"https:\/\/www.emagister.it\/blog\/category\/i-nostri-clienti\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.emagister.it\/blog\/#website\",\"url\":\"https:\/\/www.emagister.it\/blog\/\",\"name\":\"Emagister Blog Italia\",\"description\":\"Notizie e curiosit\u00e0 sul mondo della formazione\",\"publisher\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.emagister.it\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.emagister.it\/blog\/#organization\",\"name\":\"Emagister Italia\",\"url\":\"https:\/\/www.emagister.it\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.emagister.it\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2018\/07\/photo.png\",\"contentUrl\":\"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2018\/07\/photo.png\",\"width\":120,\"height\":120,\"caption\":\"Emagister Italia\"},\"image\":{\"@id\":\"https:\/\/www.emagister.it\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/es-la.facebook.com\/Emagister.Italia\/\",\"https:\/\/x.com\/emagister_it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.emagister.it\/blog\/#\/schema\/person\/b854365c040bf8645900cd60a97f1897\",\"name\":\"Redazione Emagister\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.emagister.it\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/44dc9fc526e06eb47a16c88f9b66a081ab656cfa8d8ad442778aa78886bdaff1?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/44dc9fc526e06eb47a16c88f9b66a081ab656cfa8d8ad442778aa78886bdaff1?s=96&r=g\",\"caption\":\"Redazione Emagister\"},\"url\":\"https:\/\/www.emagister.it\/blog\/author\/redazione-emagister\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber security - Emagister Blog Italia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/","og_locale":"it_IT","og_type":"article","og_title":"Cyber security - Emagister Blog Italia","og_description":"Perdita di dati, malfunzionamento dei sistemi informativi, blocco dell\u2019attivit\u00e0: gli attacchi cibernetici possono avere conseguenze devastanti, soprattutto all\u2019interno di Enti pubblici che devono erogare servizi ai cittadini. L\u2019ultimo report annuale dell\u2019Agenzia per la Cybersicurezza Nazionale, presentato di recente, mette in luce un fenomeno in forte espansione. Rispetto al 2023, gli attacchi subiti dalle istituzioni italiane [&hellip;]","og_url":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/","og_site_name":"Emagister Blog Italia","article_publisher":"https:\/\/es-la.facebook.com\/Emagister.Italia\/","article_published_time":"2024-05-07T10:20:47+00:00","article_modified_time":"2024-05-07T10:23:31+00:00","og_image":[{"width":787,"height":443,"url":"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg","type":"image\/jpeg"}],"author":"Redazione Emagister","twitter_card":"summary_large_image","twitter_creator":"@emagister_it","twitter_site":"@emagister_it","twitter_misc":{"Scritto da":"Redazione Emagister","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#article","isPartOf":{"@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/"},"author":{"name":"Redazione Emagister","@id":"https:\/\/www.emagister.it\/blog\/#\/schema\/person\/b854365c040bf8645900cd60a97f1897"},"headline":"Cyber security","datePublished":"2024-05-07T10:20:47+00:00","dateModified":"2024-05-07T10:23:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/"},"wordCount":278,"commentCount":0,"publisher":{"@id":"https:\/\/www.emagister.it\/blog\/#organization"},"image":{"@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg","keywords":["noticiasSkuola","99992269674249392522766775091915","Professional Academy - Aidem srl","ij_sector_center_99992269674249392522766775091915_78","Centri di Formazione","centri emagister"],"articleSection":["I Nostri Clienti"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/","url":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/","name":"Cyber security - Emagister Blog Italia","isPartOf":{"@id":"https:\/\/www.emagister.it\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#primaryimage"},"image":{"@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg","datePublished":"2024-05-07T10:20:47+00:00","dateModified":"2024-05-07T10:23:31+00:00","breadcrumb":{"@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.emagister.it\/blog\/cyber-sicurity\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#primaryimage","url":"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg","contentUrl":"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2024\/05\/GettyImages-2149527563.jpg","width":787,"height":443,"caption":"cybersecurity concept, user privacy security and encryption, secure internet access Future technology and cybernetics, screen padlock. Man using his mobile selects the icon security."},{"@type":"BreadcrumbList","@id":"https:\/\/www.emagister.it\/blog\/cyber-sicurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\ue821","item":"https:\/\/www.emagister.it\/blog\/homepage\/"},{"@type":"ListItem","position":2,"name":"I Nostri Clienti","item":"https:\/\/www.emagister.it\/blog\/category\/i-nostri-clienti\/"},{"@type":"ListItem","position":3,"name":"Cyber security"}]},{"@type":"WebSite","@id":"https:\/\/www.emagister.it\/blog\/#website","url":"https:\/\/www.emagister.it\/blog\/","name":"Emagister Blog Italia","description":"Notizie e curiosit\u00e0 sul mondo della formazione","publisher":{"@id":"https:\/\/www.emagister.it\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.emagister.it\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.emagister.it\/blog\/#organization","name":"Emagister Italia","url":"https:\/\/www.emagister.it\/blog\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.emagister.it\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2018\/07\/photo.png","contentUrl":"https:\/\/www.emagister.it\/blog\/wp-content\/uploads\/2018\/07\/photo.png","width":120,"height":120,"caption":"Emagister Italia"},"image":{"@id":"https:\/\/www.emagister.it\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/es-la.facebook.com\/Emagister.Italia\/","https:\/\/x.com\/emagister_it"]},{"@type":"Person","@id":"https:\/\/www.emagister.it\/blog\/#\/schema\/person\/b854365c040bf8645900cd60a97f1897","name":"Redazione Emagister","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.emagister.it\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/44dc9fc526e06eb47a16c88f9b66a081ab656cfa8d8ad442778aa78886bdaff1?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/44dc9fc526e06eb47a16c88f9b66a081ab656cfa8d8ad442778aa78886bdaff1?s=96&r=g","caption":"Redazione Emagister"},"url":"https:\/\/www.emagister.it\/blog\/author\/redazione-emagister\/"}]}},"_links":{"self":[{"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/posts\/12460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/comments?post=12460"}],"version-history":[{"count":3,"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/posts\/12460\/revisions"}],"predecessor-version":[{"id":12465,"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/posts\/12460\/revisions\/12465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/media\/12461"}],"wp:attachment":[{"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/media?parent=12460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/categories?post=12460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.emagister.it\/blog\/wp-json\/wp\/v2\/tags?post=12460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}