{"id":1818,"date":"2022-05-31T17:04:34","date_gmt":"2022-05-31T15:04:34","guid":{"rendered":"https:\/\/www.dsecbypass.com\/?p=1818"},"modified":"2022-09-27T08:28:29","modified_gmt":"2022-09-27T06:28:29","slug":"how-to-secure-my-small-business","status":"publish","type":"post","link":"https:\/\/www.dsecbypass.com\/en\/how-to-secure-my-small-business\/","title":{"rendered":"How to secure my Small Business?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/05\/favpng_small-business-e-commerce-shopping-retail-e1654004453736.png&#8221; alt=&#8221;VSE small business&#8221; title_text=&#8221;VSE&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">VSEs\/SMEs and freelancers are often faced with a lack of resources and skills to secure their IT system. However, the stakes are high in the event of a computer attack: sometimes long and costly repairs, loss of turnover, loss of reputation.<\/p>\n<p style=\"text-align: justify;\">This guide aims to provide Small Businesses (SMBs) with practical and affordable advice to secure their business. It is based, among other things, on the work of the National Cyber Security Center (NCSC) and the recommendations of the National Agency for Information Systems Security (ANSSI).<\/p>\n<p style=\"text-align: justify; padding-left: 80px;\"><strong>&gt; <a href=\"#sauvegarder\" title=\"Data backups\">Data backups<\/a><\/strong><\/p>\n<p style=\"text-align: justify; padding-left: 80px;\"><strong>&gt; <a href=\"#virus\" title=\"Protect yourself from viruses\">Protect yourself from viruses<\/a><\/strong><\/p>\n<p style=\"text-align: justify; padding-left: 80px;\"><strong>&gt; <a href=\"#mobiles\" title=\"Securing your smartphones\">Securing your smartphones<\/a><\/strong><\/p>\n<p style=\"text-align: justify; padding-left: 80px;\"><strong>&gt; <a href=\"#motsdepasse\" title=\"Improving passwords\">Improving passwords<\/a><\/strong><\/p>\n<p style=\"text-align: justify; padding-left: 80px;\"><strong>&gt;<a href=\"#phishing\" title=\"Limit the risks of phishing\"> Limit the risks of phishing<\/a><\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;sauvegarder&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"part\" data-startline=\"14\" data-endline=\"14\">1. Data backups<\/h2>\n<p style=\"text-align: justify;\">Backing up your data increases your resilience in the event of a computer attack: zero risk does not exist, so it is better to be prepared and be able to get your business back up and running as quickly as possible.<\/p>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Identify which data to back up <\/strong> <\/p>\n<blockquote>\n<p style=\"text-align: justify;\">These are the data essential to the proper functioning of the company: the documents, photos, e-mails, contacts, calendars and any other computer work file that are on your PCs, smartphones and tablets. Additionally, some companies may have file servers and specific hardware\/software configurations that also need to be backed up.<\/p>\n<\/blockquote>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Secure your backups<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Do not keep backups in the same place as the data to be backed up: make several copies of them on hard disks \/ USB keys. Some solutions also allow you to host backups in the cloud. Depending on the criticality of the data, it is interesting to use both the cloud and the physical medium. Make sure backups are only accessible by authorized people, keep them offline when not in use, and separate copies in different geographical locations (in case of fire or theft).<\/p>\n<\/blockquote>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Set up a process and make sure it is followed<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Determine a backup frequency (how much data can you afford to lose?). Make sure that the data is correctly saved: check for example that the modification of a document has been correctly reflected in the backups. The use of automatic backup solutions can facilitate this tedious and error-prone manual process, but it will still be necessary to regularly check the level of freshness of the backups and the ability to restore them.<\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">For more information on backups: <a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/bonnes-pratiques\/sauvegardes\" target=\"_blank\" rel=\"noopener\" title=\"backups security best practices\">https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/bonnes-pratiques\/sauvegardes<\/a>.<\/p>\n<ol><\/ol>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;virus&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>2. Protect yourself from viruses<\/h2>\n<p style=\"text-align: justify;\">Viruses (malware) are software that allow hackers to infect your equipment in order to recover your data, make it inaccessible or control your PC remotely.<\/p>\n<p style=\"text-align: justify;\"><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Use an antivirus software<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Most operating systems offer free antivirus software included: you must ensure that they are activated. If the budget allows it, a commercial antivirus could be used in order to provide additionnal functionalities. These offer an automatic update and an automatic scan of the storage spaces that it will be good to activate. Make sure that as many devices as possible have an antivirus.<\/p>\n<\/blockquote>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Limit malware installation<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Make sure to install mobile apps only from official stores (<em>Google Play<\/em>, <em>Apple App Store<\/em>). In the same way, only install on your computers software from sources you trust. On PCs, do not use an administrator account for your daily work: prefer a simple user account and use the administration account when necessary.<\/p>\n<\/blockquote>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Keep your systems up-to-date<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><span role=\"presentation\" dir=\"ltr\">This rule is one of the most important to improve your company&#8217;s IT security. It is essential to carry out updates (<em>patching<\/em>) of the operating <\/span><span role=\"presentation\" dir=\"ltr\">system and any software as soon as patches are made available <\/span><span role=\"presentation\" dir=\"ltr\">by editors. Activate automatic updates wherever they are available: at the level of OS, business and office software, as well as IT equipment. If you go through a subcontractor, require this practice in your contracts. The software has an end of life from which the publishers no longer offer updates: then consider replacing them with a modern alternative.<br \/><\/span><\/p>\n<\/blockquote>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Beware of USB keys<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">USB keys are a well-known virus transmission vector. In order to reduce the risk related to their use, it is recommended to activate the antiviral analysis of removable media and not to connect a USB key whose origin is unknown.<\/p>\n<\/blockquote>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Switch on your firewall<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Workstations are often equipped with a local firewall, pre-installed with the operating system: the default setting is often sufficient in the case of a small business (blocks any incoming connection). Do not modify the firewall settings of your internet box if you do not understand the ins and outs: this could expose your file shares or other sensitive services on the Internet. If the information system is more extensive, physical firewalls can be configured, in which case <a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2018\/01\/guide_preconisations-pare-feux-zone-exposee-internet_anssi_pa_044_v1.pdf\" title=\"ANSSI guide on securing external information system\" target=\"_blank\" rel=\"noopener\">a specific guide<\/a> can be used. Calling on a qualified service provider in the latter case is strongly recommended.<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;mobiles&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>3. Securing your smartphones<\/h2>\n<p>Mobile devices such as smartphones and tablets are often used in professional environments. When the budget is sufficient, the use of an <a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2013\/05\/NP_Ordiphones_NoteTech_v1.2.pdf\" title=\"ANSSI guide on smartphone security\">MDM<\/a> (Mobile Device Management) can help administer its mobile fleet. Otherwise, the following three rules will limit the risks associated with mobility:<\/p>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Set up a complex PIN\/password to access it<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">A complex PIN will consist of at least 8 digits. In addition, modern mobile devices offer unlocking by fingerprint or facial recognition: it is recommended to activate and use it.<\/p>\n<\/blockquote>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Ensure mobile devices and apps are kept up to date<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Enable automatic OS and application updates and educate your employees to do the same.<\/p>\n<\/blockquote>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Do not connect to unkown Wi-Fi network<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Public Wi-Fi (<em>hotspots<\/em>) are convenient but generally insecure. Sometimes they may even be controlled by malicious individuals. Prefer your 4G\/5G connection which includes default security, even if it means sharing the connection with your computer if necessary. Using a <em>VPN<\/em>can protect your phone when connecting to unknown Wi-Fi networks: be careful to use a company <em>VPN<\/em>or a trusted third-party service.<\/p>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text module_id=&#8221;motsdepasse&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>4. Improving passwords<\/h2>\n<p>Passwords, if used and implemented correctly, are an effective and free way to increase the security of your business and your data.<\/p>\n<p><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Protect your equipment with a password<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Whether for your smartphones, tablets or PCs, it is strongly recommended to configure a unique password, known only to you and complex. To generate this type of password, the <a href=\"https:\/\/www.cnil.fr\/fr\/generer-un-mot-de-passe-solide\" title=\"CNIL: how to generate complex password\" target=\"_blank\" rel=\"noopener\">CNIL<\/a>offers an effective method. Unlocking a device must require a password in order for it to be secure. Also make sure to enable encryption for these different devices when available: <em>BitLocker<\/em>for Windows, <em>FileVault<\/em>for macOS and other features often included in mobile OS.<\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\"><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Use two-factor authentication (2FA) when available<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Two-factor authentication allows the user to be asked for a second verification of their identity (for example an SMS or a <em>Google Authenticator<\/em> code) in addition to their password. Thus, even if the latter has been compromised, the attacker will have a much harder time taking possession of the account. Configuring this feature adds a very important layer of security, especially in small businesses where accounts are often shared and used on uncontrolled equipment (social network accounts, ERP access accounts or with suppliers).<\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\"><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Use unique and complex passwords<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Faced with the multitude of services that require a password, we tend to use the same one everywhere or in various mutations. Attackers know this and use it to compromise all of your accounts (pro and personal) when they discover your password. In order to secure your important accesses, use a password manager like <em>Keepass<\/em>: no need to remember your passwords which can now be generated automatically. A <a href=\"https:\/\/www.economie.gouv.fr\/files\/bro-guide-secu-info-print_0.pdf\" title=\"Keepass password manager user guide\">user guide<\/a> is made available by the government.<\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\"><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Change all default passwords<\/strong><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Smartphones (SIM card), PCs and other equipment are often delivered with default passwords from the manufacturer. It is better to modify them <em>all<\/em>because they are also well known to <em>hackers<\/em>.<\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">[\/et_pb_text][et_pb_text module_id=&#8221;phishing&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: justify;\">5. Limit the risks of phishing<\/h2>\n<p data-placeholder=\"Traduction\" id=\"tw-target-text\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\">In a typical phishing attack, scammers send fake emails to thousands of people asking for sensitive information (such as bank details) or containing links to malicious websites. They may trick you into sending money, steal your details to resell, or have political or ideological motives to access your organization&#8217;s information. Phishing emails are getting harder to spot, and some will trick even the most attentive users. Regardless of your business, large or small, you will receive phishing attacks at some point.<\/span><\/p>\n<p data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\"><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Secure your accounts to limit the impact of a successful attack<\/strong><\/span><\/p>\n<blockquote>\n<p data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\">The principle of least privilege is a golden rule in computer security: employees must be granted the privileges strictly necessary for their tasks. Applied to the risks of phishing, this rule implies that to limit the execution of a virus or the theft of an employee&#8217;s account, their rights must be limited: use of a non-administrator account on their PC, non-administrator accounts on business software, configuration of two-factor authentication when possible. This rule should also apply to senior executives of the company: an administrator account should only be used when an administration task is to be performed.<br \/><\/span><\/p>\n<\/blockquote>\n<p data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\"><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Consolidate your way of operating<br \/><\/strong><\/span><\/p>\n<blockquote>\n<p data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\">Your company&#8217;s sensitive operations must have a clear and well-defined operating mode: creation of new computer accounts, bank transfers, password resets. It is important that managers, employees and potential partners are aware of these processes and that the interlocutors are clearly identified. Also pay special attention when you communicate: do you usually ask for passwords by electronic messages (emails, WhatsApp)? Do your emails have a well-defined graphical identity? A &#8220;classic&#8221; phishing email will not include the precise signature of the company, for example. Be careful, this does not mean, of course, that you should trust any email with the company&#8217;s signature.<\/p>\n<\/blockquote>\n<p data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\"><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>Know the obvious signs<br \/><\/strong><\/span><\/p>\n<blockquote>\n<p data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\">There will always be phishing attacks that will bypass defenses and the attention of employees. However, it is possible to apply a few simple rules in order to defuse the most obvious attacks:<br \/><\/span><\/p>\n<ul>\n<li data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\">A large number of phishings are sent from other continents which sometimes makes spelling and punctuation hazardous (although this is also sometimes the case in legitimate exchanges&#8230;). In addition, the logos and the overall appearance of the mail are often poorer than the official communications.<\/span><\/li>\n<li data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\">Is the email addressed directly to you? It is not uncommon for it to be addressed generically to &#8220;dear customer&#8221;, &#8220;friends&#8221; or &#8220;colleague&#8221;.<\/span><\/li>\n<li data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\">Check the sending email address (by hovering the mouse over the sender if necessary): does it seem legitimate to you?<\/span><\/li>\n<li data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\">Is the content written in a way that generates a sense of urgency or threat? Attackers use this psychological bias to trick victims into acting without thinking.<\/span><\/li>\n<li data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\">Beware of e-mails that seem to come from inside the company, from a high-ranking person, sending you a sensitive transaction request. Take the time to analyze the email and the legitimacy of the request. If in doubt, call the person directly or ask for a second opinion.<\/span><\/li>\n<li data-placeholder=\"Traduction\" dir=\"ltr\" style=\"text-align: justify;\"><span lang=\"fr\">If it&#8217;s too good to be true, it definitely is&#8230; <\/span><span lang=\"fr\"><\/span><\/li>\n<\/ul>\n<\/blockquote>\n<p><span lang=\"fr\"><span class=\"wHYlTd z8gr9e\">\u2705<\/span> <strong>In doubt, report it<br \/><\/strong><\/span><\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><span lang=\"fr\">Encourage your employees to report phishing emails or seek help if they suspect an attack. This allows you to react faster and warn other employees. Do not punish an employee who has been duped as this encourages hiding the incidents later. When you suspect a compromise, disconnect the equipment, carry out an antiviral analysis, change the user&#8217;s passwords and report the incident on <a href=\"https:\/\/www.cybermalveillance.gouv.fr\/diagnostic\/accueil\" target=\"_blank\" rel=\"noopener\" title=\"Declare and diagnose a cybersecurity incident\">cybermalveillance.gouv.fr<\/a>.<\/span><\/p>\n<\/blockquote>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>\ud83d\udee1\ufe0f DSecBypass supports you in raising your teams&#8217; awareness of cyber risks through simulations of phishing attacks as well as novice-level and interactive conferences. Do not hesitate to <a href=\"https:\/\/www.dsecbypass.com\/en\/dsecbypass-contact-cybersecurity-company-lyon\/\">contact <\/a>us for additional information and\/or a personalized quote \ud83d\udcdd.<\/span><\/p>\n<p style=\"text-align: justify;\"><span><\/span><\/p>\n<p style=\"text-align: left;\"><span>References: <a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2021\/02\/anssi-guide-tpe_pme.pdf\">https:\/\/www.ssi.gouv.fr\/uploads\/2021\/02\/anssi-guide-tpe_pme.pdf<\/a>, <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/small-business-guide\">https:\/\/www.ncsc.gov.uk\/collection\/small-business-guide<\/a>, <a href=\"https:\/\/www.economie.gouv.fr\/files\/bro-guide-secu-info-print_0.pdf\">https:\/\/www.economie.gouv.fr\/files\/bro-guide-secu-info-print_0.pdf<\/a>  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.dsecbypass.com\/en\/contact\/&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;13px&#8221; button_bg_color=&#8221;#4328b7&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#4328b7&#8243; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Titillium Web|700||on|||||&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VSEs\/SMEs and freelancers are often faced with a lack of resources and skills to secure their IT system. However, the stakes are high in the event of a computer attack: sometimes long and expensive repairs, loss of turnover, loss of reputation.<br \/>\nThis guide aims to provide Small Businesses (SMBs) with practical and affordable advice to secure their business. It is based, among other things, on the work of the National Cyber Security Center (NCSC) and the recommendations of the National Agency for Information Systems Security (ANSSI).<\/p>\n","protected":false},"author":4,"featured_media":1744,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[34],"tags":[],"class_list":["post-1818","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=1818"}],"version-history":[{"count":19,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1818\/revisions"}],"predecessor-version":[{"id":2471,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1818\/revisions\/2471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media\/1744"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=1818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/categories?post=1818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/tags?post=1818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}