{"id":492,"date":"2025-11-05T20:30:50","date_gmt":"2025-11-05T20:30:50","guid":{"rendered":"https:\/\/siguriasiar.com\/?page_id=492"},"modified":"2025-11-18T21:54:57","modified_gmt":"2025-11-18T21:54:57","slug":"infrastrukture-e-mbrojtjes-dixhitale","status":"publish","type":"page","link":"https:\/\/siguriasiar.com\/en\/infrastrukture-e-mbrojtjes-dixhitale\/","title":{"rendered":"Digital protection infrastructure"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"492\" class=\"elementor elementor-492\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee9ad6e e-flex e-con-boxed e-con e-parent\" data-id=\"ee9ad6e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09b927b elementor-widget elementor-widget-elementskit-heading\" data-id=\"09b927b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-text_center\"><h2 class=\"ekit-heading--title elementskit-section-title\">Digital protection infrastructure<\/h2><h5 class=\"ekit-heading--subtitle elementskit-section-subtitle\">\n\t\t\t\t\t\tRobust cybersecurity to protect your data and systems from any threat.\n\t\t\t\t\t<\/h5><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1767c5 e-flex e-con-boxed e-con e-parent\" data-id=\"f1767c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a476498 e-con-full e-flex e-con e-child\" data-id=\"a476498\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03d2ee1 elementor-widget elementor-widget-heading\" data-id=\"03d2ee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Digital Infrastructure Monitoring and Protection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d60eac elementor-widget elementor-widget-text-editor\" data-id=\"5d60eac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"font-weight: 400;\"> Continuous monitoring of networks, servers and critical devices to detect unauthorized access attempts.<\/span><\/li><li><span style=\"font-weight: 400;\"> Implementation of intelligent firewalls, IDS\/IPS and traffic filtering systems for protection against cyber attacks.<\/span><\/li><li><span style=\"font-weight: 400;\"> Data center management and real-time monitoring of abnormal signals through centralized platforms.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca64829 e-con-full e-flex e-con e-child\" data-id=\"ca64829\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-005a51a elementor-widget elementor-widget-image\" data-id=\"005a51a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/siguriasiar.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-56b103d e-flex e-con-boxed e-con e-parent\" data-id=\"56b103d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f1f994c e-con-full e-flex e-con e-child\" data-id=\"f1f994c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4d03ef elementor-widget elementor-widget-heading\" data-id=\"c4d03ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Incident Investigation and Analysis (Cyber Investigation)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40920ab elementor-widget elementor-widget-text-editor\" data-id=\"40920ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"font-weight: 400;\"> Tracing the origin of attacks, IP addresses and domains used by malicious actors.<\/span><\/li><li><span style=\"font-weight: 400;\"> Preservation and forensic analysis of digital evidence in accordance with legal standards.<\/span><\/li><li><span style=\"font-weight: 400;\"> Drafting technical reports for clients with details on the attack method, impact and corrective measures.<\/span><\/li><li><span style=\"font-weight: 400;\"> Collaboration with state institutions and international partners for sharing cyber intelligence.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-962d055 e-con-full e-flex e-con e-child\" data-id=\"962d055\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3fdac1 elementor-widget elementor-widget-image\" data-id=\"f3fdac1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/siguriasiar.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1094f91 e-flex e-con-boxed e-con e-parent\" data-id=\"1094f91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e274041 e-con-full e-flex e-con e-child\" data-id=\"e274041\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d44b74 elementor-widget elementor-widget-heading\" data-id=\"3d44b74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Risk Assessment and Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5c896d elementor-widget elementor-widget-text-editor\" data-id=\"f5c896d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"font-weight: 400;\"> Identification of technical and operational weaknesses in business IT systems.<\/span><\/li><li><span style=\"font-weight: 400;\"> Classification of risks according to impact and probability to determine protection priorities.<\/span><\/li><li><span style=\"font-weight: 400;\"> Drafting a Cyber Risk Mitigation Plan with preventive and response measures.<\/span><\/li><li><span style=\"font-weight: 400;\"> Consultancy for building internal security and access management policies.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd86ad7 e-con-full e-flex e-con e-child\" data-id=\"cd86ad7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d050625 elementor-widget elementor-widget-image\" data-id=\"d050625\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/siguriasiar.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-953a547 e-flex e-con-boxed e-con e-parent\" data-id=\"953a547\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3fe3438 e-con-full e-flex e-con e-child\" data-id=\"3fe3438\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e478eb5 elementor-widget elementor-widget-heading\" data-id=\"e478eb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prevention &amp; Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a6e480 elementor-widget elementor-widget-text-editor\" data-id=\"1a6e480\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"font-weight: 400;\"> Implementation of immediate response protocols after any attack signal.<\/span><\/li><li><span style=\"font-weight: 400;\"> Isolation of compromised areas and restoration of critical services through business continuity plans.<\/span><\/li><li><span style=\"font-weight: 400;\"> Implementation of data backup &amp; disaster recovery solutions for secure information storage.<\/span><\/li><li><span style=\"font-weight: 400;\"> Post-incident analysis to identify vulnerabilities and improve cyber resilience.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a4f75a e-con-full e-flex e-con e-child\" data-id=\"7a4f75a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-383382f elementor-widget elementor-widget-image\" data-id=\"383382f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/siguriasiar.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d0bd8c1 e-flex e-con-boxed e-con e-parent\" data-id=\"d0bd8c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a39a137 e-con-full e-flex e-con e-child\" data-id=\"a39a137\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46478ad elementor-widget elementor-widget-heading\" data-id=\"46478ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Specialized Technical Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35d500b elementor-widget elementor-widget-text-editor\" data-id=\"35d500b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"font-weight: 400;\"> Penetration Testing &amp; Vulnerability Assessment to discover hidden vulnerabilities in the network.<\/span><\/li><li><span style=\"font-weight: 400;\"> Email Security and Anti-Phishing Systems for protection against social engineering attacks.<\/span><\/li><li><span style=\"font-weight: 400;\"> Encryption of data and communications in business operating platforms.<\/span><\/li><li><span style=\"font-weight: 400;\"> Access management and multi-factor authentication (MFA) for highly privileged users.<\/span><\/li><li><span style=\"font-weight: 400;\"> Integrating CCTV and access control systems with digital security for unified protection.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-92b933c e-con-full e-flex e-con e-child\" data-id=\"92b933c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0082006 elementor-widget elementor-widget-image\" data-id=\"0082006\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/siguriasiar.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2020308 e-flex e-con-boxed e-con e-parent\" data-id=\"2020308\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5abf113 e-con-full e-flex e-con e-child\" data-id=\"5abf113\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efd7f1b elementor-widget elementor-widget-heading\" data-id=\"efd7f1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Training and Education for Staff<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7f3156 elementor-widget elementor-widget-text-editor\" data-id=\"b7f3156\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"font-weight: 400;\"> Personalized training for employees on cyber hygiene and sensitive data management.<\/span><\/li><li><span style=\"font-weight: 400;\"> Periodic simulations of phishing attacks to test staff readiness.<\/span><\/li><li><span style=\"font-weight: 400;\"> Creating a digital security awareness program at the organizational level.<\/span><\/li><li><span style=\"font-weight: 400;\"> Preparing management staff for decision-making in cases of digital crises.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-809983f e-con-full e-flex e-con e-child\" data-id=\"809983f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a9ea5c elementor-widget elementor-widget-image\" data-id=\"3a9ea5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/siguriasiar.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eedc530 e-flex e-con-boxed e-con e-parent\" data-id=\"eedc530\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-74015f9 e-con-full e-flex e-con e-child\" data-id=\"74015f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-060f9db elementor-widget elementor-widget-heading\" data-id=\"060f9db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Standards and Legal Compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-603693a elementor-widget elementor-widget-text-editor\" data-id=\"603693a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"font-weight: 400;\"> Implementation of international standards ISO\/IEC 27001 and ISO 22301 for information security management and operational resilience.<\/span><\/li><li><span style=\"font-weight: 400;\"> Compliance with personal data protection law and GDPR directives for companies operating in the EU.<\/span><\/li><li><span style=\"font-weight: 400;\"> Periodic audits to ensure that security standards are maintained at a technical and procedural level.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-964fdc1 e-con-full e-flex e-con e-child\" data-id=\"964fdc1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f747262 elementor-widget elementor-widget-image\" data-id=\"f747262\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/siguriasiar.com\/wp-content\/plugins\/elementor\/assets\/images\/placeholder.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5042db8 e-flex e-con-boxed e-con e-parent\" data-id=\"5042db8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72dfcc5 elementor-widget__width-initial elementor-widget elementor-widget-elementskit-heading\" data-id=\"72dfcc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h3 class=\"elementskit-section-subtitle\">\n\t\t\t\t\t\tYour safety is our priority.\n\t\t\t\t\t<\/h3><h2 class=\"ekit-heading--title elementskit-section-title\">Find out how we can help you protect what matters most.<\/h2><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c81c4f elementor-align--mobilecenter elementor-align-center elementor-widget elementor-widget-elementskit-button\" data-id=\"5c81c4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-button.default\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\t\t<div class=\"ekit-btn-wraper\">\n\t\t\t\t\t\t\t<a href=\"#\" class=\"elementskit-btn  whitespace--normal\" id=\"\">\n\t\t\t\t\t<svg class=\"e-font-icon-svg e-fas-phone-alt\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M497.39 361.8l-112-48a24 24 0 0 0-28 6.9l-49.6 60.6A370.66 370.66 0 0 1 130.6 204.11l60.6-49.6a23.94 23.94 0 0 0 6.9-28l-48-112A24.16 24.16 0 0 0 122.6.61l-104 24A24 24 0 0 0 0 48c0 256.5 207.9 464 464 464a24 24 0 0 0 23.4-18.6l24-104a24.29 24.29 0 0 0-14.01-27.6z\"><\/path><\/svg>Contact now\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n        <\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Infrastruktur\u00eb e mbrojtjes dixhitale Siguri kibernetike e q\u00ebndrueshme p\u00ebr t\u00eb mbrojtur t\u00eb dh\u00ebnat dhe sistemet tuaja nga \u00e7do k\u00ebrc\u00ebnim. Monitorim dhe Mbrojtje Dixhitale e Infrastruktur\u00ebs Vrojtim i vazhduesh\u00ebm i rrjeteve, server\u00ebve dhe pajisjeve kritike p\u00ebr t\u00eb zbuluar tentativa hyrjeje t\u00eb paautorizuara. Implementim i firewall-eve inteligjent\u00eb, IDS\/IPS dhe sistemesh t\u00eb filtrimit t\u00eb trafikut p\u00ebr mbrojtje ndaj [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-492","page","type-page","status-publish","hentry"],"_hostinger_reach_plugin_has_subscription_block":false,"_hostinger_reach_plugin_is_elementor":false,"_links":{"self":[{"href":"https:\/\/siguriasiar.com\/en\/wp-json\/wp\/v2\/pages\/492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/siguriasiar.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/siguriasiar.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/siguriasiar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/siguriasiar.com\/en\/wp-json\/wp\/v2\/comments?post=492"}],"version-history":[{"count":35,"href":"https:\/\/siguriasiar.com\/en\/wp-json\/wp\/v2\/pages\/492\/revisions"}],"predecessor-version":[{"id":1665,"href":"https:\/\/siguriasiar.com\/en\/wp-json\/wp\/v2\/pages\/492\/revisions\/1665"}],"wp:attachment":[{"href":"https:\/\/siguriasiar.com\/en\/wp-json\/wp\/v2\/media?parent=492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}