{"id":220678,"date":"2020-04-08T15:48:57","date_gmt":"2020-04-08T13:48:57","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=220678"},"modified":"2020-04-08T15:48:57","modified_gmt":"2020-04-08T13:48:57","slug":"risques-mobile-entreprise","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/risques-mobile-entreprise\/","title":{"rendered":"Using mobile phones in a professional context: risks &amp; best practices"},"content":{"rendered":"<p>[et_pb_section fb_built=&quot;1&quot; _builder_version=&quot;4.4.2&quot;][et_pb_row _builder_version=&quot;4.4.2&quot;][et_pb_column type=&quot;4_4&quot; _builder_version=&quot;4.4.2&quot;][et_pb_image src=&quot;https:\/\/www.intrinsec.com\/wp-content\/uploads\/2020\/04\/risks_mobile_entreprise.png&quot; align=&quot;center&quot; _builder_version=&quot;4.4.2&quot; width=&quot;65%&quot;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&quot;4.4.2&quot;][et_pb_column type=&quot;4_4&quot; _builder_version=&quot;4.4.2&quot;][et_pb_text _builder_version=&quot;4.4.2&quot; text_font=&quot;Nunito Sans|||||||||&quot; text_font_size=&quot;16px&quot; header_font=&quot;Poppins||||||||&quot; header_2_font=&quot;Poppins|500|||||||&quot; header_2_text_color=&quot;#e02b20&quot; header_2_line_height=&quot;1.2em&quot; custom_margin=&quot;||-33px|||&quot;]<\/p>\n<p>&nbsp;<\/p>\n<p>Mobile devices can be <strong>a prime entry point for malicious actors.<\/strong><\/p>\n<p>Therefore, it is necessary to take effective preventative and protective measures to <strong>to protect oneself against the associated risks,<\/strong> such as:<\/p>\n<ul>\n<li>Unsecured data storage<\/li>\n<li>The disruption to communications<\/li>\n<li>Data leaks: theft &amp; malicious dissemination<\/li>\n<\/ul>\n<p>These risks can affect your fleet of company mobile phones, but it is also common for employees to use their personal phones to handle work-related matters (<a href=\"https:\/\/www.cnil.fr\/fr\/byod-quelles-sont-les-bonnes-pratiques\">Bring Your Own Device \u2013 BYOD<\/a>Discover\u00a0<strong>Our best practices and recommendations to secure your data and protect your business on mobile environments (Apple &amp; Android), whether professional or personal.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Professional mobile fleet: best practices &amp; safety recommendations.<\/h2>\n<p>To ensure the confidentiality of company data, it is possible to add<strong> the following restrictions, notably blocking the downloading of these files from the Cloud.<\/strong><\/p>\n<ul>\n<li>Block screenshots<\/li>\n<li>Block the backup of company data to the Cloud<\/li>\n<li>Block the use of the Cloud to store documents<\/li>\n<\/ul>\n<p>Indeed, in the event that the user&#039;s account is compromised, data confidentiality is no longer guaranteed.<\/p>\n<p>Furthermore, if you have a Mobile Device Management (MDM) solution,\u00a0<strong>Regular compliance checks are necessary to ensure integrity<\/strong> (In terms of device security). If the check returns a negative result, it is then essential to have a quick response (via a notification or data deletion) to protect the information.<\/p>\n<p>It is also important to have the right to perform at least an Enterprise Wipe (removes all company data as well as the MDM (Mobile Device Management) configuration without deleting user data) or a Device Wipe (completely resets the device).<\/p>\n<p>Finally, we recommend that you <strong>to carry out a <a href=\"https:\/\/www.intrinsec.com\/en\/test-intrusion\/\">mobile penetration test<\/a> to assess and improve the security of your mobile devices<\/strong> and your business applications on mobile. If you have Mobile Device Management, we also suggest you implement <strong><a href=\"https:\/\/www.intrinsec.com\/en\/audit-securite\/\">an MDM configuration audit.<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&quot;https:\/\/www.intrinsec.com\/evaluer-sa-securite-informatique\/&quot; url_new_window=&quot;on&quot; button_text=&quot;Learn more about our audits &amp; intrusion tests&quot; button_alignment=&quot;center&quot; _builder_version=&quot;4.4.2&quot;][\/et_pb_button][et_pb_text _builder_version=&quot;4.4.2&quot; text_font=&quot;Nunito Sans||||||||&quot; text_font_size=&quot;16px&quot; header_font=&quot;Poppins||||||||&quot; header_2_font=&quot;Poppins|500|||||||&quot; header_2_text_color=&quot;#e02b20&quot; header_2_line_height=&quot;1.2em&quot; custom_margin=&quot;||-33px|||&quot;]<\/p>\n<p>&nbsp;<\/p>\n<h2>\u00abBring Your Own Device\u00bb \u2013 Using personal phones to access work information: our tips to raise awareness among your teams and maximize data security.<\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #a31515;\"><strong>On your personal phones, we recommend applying the same level of security as on your work devices, namely:<\/strong><\/span><\/p>\n<ul>\n<li><strong>Prefer using a privacy filter<\/strong> also on mobile devices (they are often used on public transport).<\/li>\n<li><strong>Disabling notifications on the lock screen<\/strong> (and in the best-case scenario, disable the preview when the phone is unlocked).<\/li>\n<li><strong>Enable remote device erasure.<\/strong><\/li>\n<li><strong>Enable brute-force protection for the lock code<\/strong> to erase the phone after x attempts.<\/li>\n<li><strong>Enable biometric protection on business applications<\/strong> (child \/ spouse \/ friend who borrows your phone).<\/li>\n<li><strong>Enable data encryption<\/strong> on the devices.<\/li>\n<li><strong>Preferably activate biometric unlocking<\/strong> (this reduces code disclosure by &quot;look over the shoulder&quot;).<\/li>\n<\/ul>\n<p><span style=\"color: #9b1414;\"><strong>In addition, we strongly encourage you to implement measures to raise awareness among your employees regarding the security of professional data:<\/strong><\/span><\/p>\n<ul>\n<li><strong>Give them the right advice to fight phishing<\/strong>\u00a0Even on mobile, the risks associated with phishing are numerous, and it&#039;s essential to protect yourself. You can find our best practices here. <a href=\"https:\/\/www.intrinsec.com\/en\/bonnes-pratiques-phishing\/\">here<\/a>.<\/li>\n<li>Use<strong> encrypted messaging solutions<\/strong> like Signal.<\/li>\n<li><strong>Do not store professional documents<\/strong> in the cloud or the phone&#039;s memory.<\/li>\n<li><strong>We strongly advise against integrating work emails and Active Directory credentials.<\/strong> on personal mobile phones.<\/li>\n<li><strong>Block access to the company Wi-Fi network on personal phones<\/strong>\u00a0If the phone is at risk, you will prevent the spread of the virus to your internal information system. Therefore, it is best to <strong>Make it a habit not to connect to public Wi-Fi networks, which are generally insecure.<\/strong> or at a minimum, have a secure connection through this access point (using a VPN).<\/li>\n<\/ul>\n<p>\u00a0Finally, we strongly advise you to <strong>to implement a strategy of <a href=\"https:\/\/www.intrinsec.com\/en\/sensibilisation\/\">cybersecurity awareness<\/a><\/strong>\u00a0: Engage a cybersecurity specialist to raise awareness among your employees about cyber risks and train them in best practices.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&quot;https:\/\/www.intrinsec.com\/awareness\/&quot; url_new_window=&quot;on&quot; button_text=&quot;Learn more about awareness&quot; button_alignment=&quot;center&quot; _builder_version=&quot;4.4.2&quot; custom_button=&quot;on&quot; button_bg_color=&quot;#59c9a5&quot; button_border_color=&quot;#59c9a5&quot;][\/et_pb_button][et_pb_text _builder_version=&quot;4.4.2&quot; text_font=&quot;Nunito Sans||||||||&quot; text_font_size=&quot;16px&quot; header_font=&quot;Poppins||||||||&quot; header_2_font=&quot;Poppins|500|||||||&quot; header_2_text_color=&quot;#e02b20&quot; header_2_line_height=&quot;1.2em&quot; custom_margin=&quot;||-33px|||&quot;]<\/p>\n<p>&nbsp;<\/p>\n<p>In general, we recommend that you encourage your employees to <strong>use their phones as little as possible <\/strong><strong>staff to deal with professional matters.<\/strong><\/p>\n<p><strong><\/strong>Whether your company is a BYOD enthusiast or has a fleet of professional mobile devices, <strong>You can also deploy an EDR-type antivirus solution on your mobile devices.<\/strong> particularly through your Mobile Device Management system. Our partners offer solutions in this regard:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.lemagit.fr\/actualites\/252458791\/Crowdstrike-etend-son-offre-dEDR-aux-terminaux-mobiles\" target=\"_blank\" rel=\"noopener noreferrer\">CrowdStrike\u00a0<\/a><\/li>\n<li><a href=\"https:\/\/www.cybereason.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybereason<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built= \u00bb1\u2033 _builder_version= \u00bb3.22.4\u2033 use_background_color_gradient= \u00bbon \u00bb background_color_gradient_start= \u00bb#c9202b \u00bb background_color_gradient_end= \u00bbrgba(204,42,45,0.56) \u00bb][et_pb_row column_structure= \u00bb3_4,1_4\u2033 _builder_version= \u00bb3.25\u2033][et_pb_column type= \u00bb3_4\u2033 _builder_version= \u00bb3.25\u2033 custom_padding= \u00bb||| \u00bb custom_padding__hover= \u00bb||| \u00bb][et_pb_text _builder_version= \u00bb3.27.4\u2033 text_font= \u00bbNunito Sans|||||||| \u00bb text_text_color= \u00bb#ffffff \u00bb text_font_size= \u00bb24px \u00bb text_line_height= \u00bb1.4em \u00bb header_font= \u00bb|||||||| \u00bb custom_margin= \u00bb-11px|||31px \u00bb custom_padding= \u00bb13px|| \u00bb]<\/p>\n<p><b>For an effective and tailored response to your challenges, do not hesitate to contact us.\u00a0<\/b><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bbhttps:\/\/www.intrinsec.com\/contact\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbContactez-nous\u00a0\u00bb button_alignment=\u00a0\u00bbleft\u00a0\u00bb _builder_version=\u00a0\u00bb3.22.4&Prime; custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb18px\u00a0\u00bb button_text_color=\u00a0\u00bb#e02b20&Prime; button_bg_color=\u00a0\u00bb#ffffff\u00a0\u00bb button_border_color=\u00a0\u00bb#ffffff\u00a0\u00bb button_font=\u00a0\u00bbNunito Sans|700|||||||\u00a0\u00bb button_icon=\u00a0\u00bb%%86%%\u00a0\u00bb button_icon_color=\u00a0\u00bb#ffffff\u00a0\u00bb button_icon_placement=\u00a0\u00bbleft\u00a0\u00bb custom_margin=\u00a0\u00bb17px|-30px||17px||\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&quot;1&quot; _builder_version=&quot;4.4.2&quot;][et_pb_row _builder_version=&quot;4.4.2&quot;][et_pb_column type=&quot;4_4&quot; _builder_version=&quot;4.4.2&quot;][et_pb_image src=&quot;https:\/\/www.intrinsec.com\/wp-content\/uploads\/2020\/04\/risks_mobile_entreprise.png&quot; align=&quot;center&quot; _builder_version=&quot;4.4.2&quot; width=&quot;65%&quot;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&quot;4.4.2&quot;][et_pb_column type=&quot;4_4&quot; _builder_version=&quot;4.4.2&quot;][et_pb_text _builder_version=&quot;4.4.2&quot; text_font=&quot;Nunito [\u2026]<\/p>","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-220678","post","type-post","status-publish","format-standard","hentry","category-evaluation-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobile &amp; Entreprise : Quels risques ? Quelles bonnes pratiques ? -<\/title>\n<meta name=\"description\" content=\"Les appareils mobiles peuvent \u00eatre un point d\u2019entr\u00e9e privil\u00e9gi\u00e9 pour les acteurs malveillants.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/risques-mobile-entreprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Utilisation du mobile dans le cadre professionnel: risques &amp; bonnes pratiques\" \/>\n<meta property=\"og:description\" content=\"Les appareils mobiles peuvent \u00eatre un point d\u2019entr\u00e9e privil\u00e9gi\u00e9 pour les acteurs malveillants.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/risques-mobile-entreprise\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-08T13:48:57+00:00\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/risques-mobile-entreprise\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/risques-mobile-entreprise\\\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"headline\":\"Utilisation du mobile dans le cadre professionnel: risques &#038; bonnes pratiques\",\"datePublished\":\"2020-04-08T13:48:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/risques-mobile-entreprise\\\/\"},\"wordCount\":1431,\"commentCount\":0,\"articleSection\":[\"Evaluation S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/risques-mobile-entreprise\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/risques-mobile-entreprise\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/risques-mobile-entreprise\\\/\",\"name\":\"Mobile & Entreprise : Quels risques ? Quelles bonnes pratiques ? -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"datePublished\":\"2020-04-08T13:48:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\"},\"description\":\"Les appareils mobiles peuvent \u00eatre un point d\u2019entr\u00e9e privil\u00e9gi\u00e9 pour les acteurs malveillants.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/risques-mobile-entreprise\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/risques-mobile-entreprise\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/risques-mobile-entreprise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Utilisation du mobile dans le cadre professionnel: risques &#038; bonnes pratiques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/5636e3e5276b952facbd0aadb12a858a\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Admin\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobile &amp; Enterprise: What are the risks? What are the best practices?","description":"Mobile devices can be a preferred entry point for malicious actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/risques-mobile-entreprise\/","og_locale":"en_US","og_type":"article","og_title":"Utilisation du mobile dans le cadre professionnel: risques & bonnes pratiques","og_description":"Les appareils mobiles peuvent \u00eatre un point d\u2019entr\u00e9e privil\u00e9gi\u00e9 pour les acteurs malveillants.","og_url":"https:\/\/www.intrinsec.com\/en\/risques-mobile-entreprise\/","og_site_name":"INTRINSEC","article_published_time":"2020-04-08T13:48:57+00:00","author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/risques-mobile-entreprise\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/risques-mobile-entreprise\/"},"author":{"name":"Admin","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"headline":"Utilisation du mobile dans le cadre professionnel: risques &#038; bonnes pratiques","datePublished":"2020-04-08T13:48:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/risques-mobile-entreprise\/"},"wordCount":1431,"commentCount":0,"articleSection":["Evaluation S\u00e9curit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/risques-mobile-entreprise\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/risques-mobile-entreprise\/","url":"https:\/\/www.intrinsec.com\/risques-mobile-entreprise\/","name":"Mobile &amp; Enterprise: What are the risks? What are the best practices?","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"datePublished":"2020-04-08T13:48:57+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a"},"description":"Mobile devices can be a preferred entry point for malicious actors.","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/risques-mobile-entreprise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/risques-mobile-entreprise\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/risques-mobile-entreprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"Utilisation du mobile dans le cadre professionnel: risques &#038; bonnes pratiques"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/5636e3e5276b952facbd0aadb12a858a","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Admin"},"url":"https:\/\/www.intrinsec.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/220678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=220678"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/220678\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=220678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=220678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=220678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}