{"id":831,"date":"2021-02-19T17:31:43","date_gmt":"2021-02-19T16:31:43","guid":{"rendered":"https:\/\/www.4next.eu\/?p=831"},"modified":"2021-03-12T09:45:22","modified_gmt":"2021-03-12T08:45:22","slug":"the-most-common-ot-and-it-mistakes","status":"publish","type":"post","link":"https:\/\/www.4next.eu\/en\/news\/the-most-common-ot-and-it-mistakes\/","title":{"rendered":"The most common OT and IT mistakes"},"content":{"rendered":"\n<p>Here we rectify some of the most frequent mistakes regarding OT and IT security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-top-5-mistakes-of-ot-security\">TOP 5 mistakes of OT Security<\/h2>\n\n\n\n<p><strong>5 \u201cWe have an antivirus or firewall solution. That protects us from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cyberattack\" target=\"_blank\" rel=\"noreferrer noopener\">cyber attacks<\/a>.\u201d<\/strong><\/p>\n\n\n\n<p>It is true that they are indispensable but they don\u2019t eliminate the risk. Don\u2019t forget to update and configurate them!<\/p>\n\n\n\n<p><strong>4 \u201cOur production is not connected to the Internet\u201d<\/strong><\/p>\n\n\n\n<p>For remote maintenance Internet is required. Or the IT department applies the necessary operating system patches via a patch server connected to the Internet. Current windows operating system also requires a regular Internet connection.<\/p>\n\n\n\n<p><strong>3 \u201cWe are too far insignificant, no one wants to hack us anyway\u201d<\/strong><\/p>\n\n\n\n<p>Cyberattaks take place everyday, no matter what, no matter who<\/p>\n\n\n\n<p><strong>2 \u201cWe believe that our OT network is safe and hardened\u201d<\/strong><\/p>\n\n\n\n<p>You need to monitor the systems constantly because production plans are subject to a constant change. Belief does not mean knowing.<\/p>\n\n\n\n<p><strong>1 \u201cWe have an IT department. They take care of it.\u201d<\/strong><\/p>\n\n\n\n<p>The situation in the OT network is very different and requires a different education and experience compared with the office enviroment. The tools of the office network are also not easily adaptable in automation technology.<\/p>\n\n\n\n<p><em>&#8211; Marcus Woehl<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-8-biggest-cybersecurity-mistakes\">8 biggest <a href=\"https:\/\/www.4next.eu\/en\/news\/blog\/machine-learning\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity <\/a>Mistakes<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-emails\">Emails<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>OPENING ATTACHMENTS FROM UNKNOWN PEOPLE<\/strong><\/li><\/ol>\n\n\n\n<p>\u2022 Check the context of the email message. If something looks suspicious or the person is asking you something that they wouldn\u2019t usually ask you to do, it\u2019s more than likely spam.<br>\u2022 Check the sender. Don\u2019t recognize it? Google the domain name to see if it is a legitimate business.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li><strong>FORWARDING EMAILS WITH ATTACHMENTS FROM UNKNOWN PEOPLE<\/strong><\/li><\/ol>\n\n\n\n<p>\u2022 Do not forward the email to anyone else in your organization. This increases the chance of a malicious attachment being clicked on accidentally.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-password\">Password<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li><strong>USING EASY PASSWORDS<\/strong><\/li><\/ol>\n\n\n\n<p>\u2022 We still see employees using yourname123and yourbirthday as passwords.<br>\u2022 Re-work your current passwords, using numbers and capital letters.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li><strong>LEAVING YOUR PASSWORDS WRITTEN ON YOUR DESK<\/strong><\/li><\/ol>\n\n\n\n<p>\u2022 Anyone could gain access to files or systems with confidential information.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li><strong>USING THE SAME PASSWORD FOR SEVERAL ACCOUNTS<\/strong><\/li><\/ol>\n\n\n\n<p>\u2022 It is important to change your passwords frequently.<br>\u2022 Do not use the same password for different accounts. Having different passwords for your accounts minimize the possibility of all of your accounts being compromised at once. Complexity and length are very important.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li><strong>NOT PUTTING A PASSWORD OR PASSCODE ON YOUR WORK DEVICES<\/strong><\/li><\/ol>\n\n\n\n<p>\u2022 It is highly recommended having a password or passcode for the devices you use at work.<br>\u2022 When you walk away from your computer, lock it . Devices with no passcode entice people to use them for malicious activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-web\">Web<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\"><li><strong>CLICKING ON ADVERTISEMENTS<\/strong><\/li><\/ol>\n\n\n\n<p>\u2022 Many ads are harmless, but the ones that are too good to be true are often clickbait advertisements that could lead you to sites with malware.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"8\"><li><strong>SURFING THE DEEP WEB<\/strong><\/li><\/ol>\n\n\n\n<p>\u2022 Work computers should be used only for working, lots of deep web sites will instantly track you and install malicious code.<\/p>\n\n\n\n<p><em>&#8211; Helen Littl<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here we rectify some of the most frequent mistakes regarding OT and IT security. TOP 5 mistakes of OT Security 5 \u201cWe have an antivirus or firewall solution. That protects us from cyber attacks.\u201d It is true that they are indispensable but they don\u2019t eliminate the risk. Don\u2019t forget to update and configurate them! 4 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":828,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[122,121],"tags":[],"applicazioni":[],"class_list":["post-831","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The most common OT and IT mistakes : 4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M<\/title>\n<meta name=\"description\" content=\"Here we rectify some of the most frequent mistakes regarding OT (operational technology) and IT (information technology) security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The most common OT and IT mistakes : 4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M\" \/>\n<meta property=\"og:description\" content=\"Here we rectify some of the most frequent mistakes regarding OT (operational technology) and IT (information technology) security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/\" \/>\n<meta property=\"og:site_name\" content=\"4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/4neXt.eu\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-19T16:31:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-12T08:45:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"305\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gino Cecchettin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/\"},\"author\":{\"name\":\"Gino Cecchettin\",\"@id\":\"https:\/\/www.4next.eu\/en\/#\/schema\/person\/d8645c58d31e4a18a881eb99f91e88e7\"},\"headline\":\"The most common OT and IT mistakes\",\"datePublished\":\"2021-02-19T16:31:43+00:00\",\"dateModified\":\"2021-03-12T08:45:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/\"},\"wordCount\":489,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.4next.eu\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png\",\"articleSection\":[\"Blog\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/\",\"url\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/\",\"name\":\"The most common OT and IT mistakes : 4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M\",\"isPartOf\":{\"@id\":\"https:\/\/www.4next.eu\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png\",\"datePublished\":\"2021-02-19T16:31:43+00:00\",\"dateModified\":\"2021-03-12T08:45:22+00:00\",\"description\":\"Here we rectify some of the most frequent mistakes regarding OT (operational technology) and IT (information technology) security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#primaryimage\",\"url\":\"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png\",\"contentUrl\":\"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png\",\"width\":640,\"height\":305,\"caption\":\"it and ot mistakes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.4next.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/www.4next.eu\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Blog\",\"item\":\"https:\/\/www.4next.eu\/news\/blog\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The most common OT and IT mistakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.4next.eu\/en\/#website\",\"url\":\"https:\/\/www.4next.eu\/en\/\",\"name\":\"4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M\",\"description\":\"4neXt prodotti M2M e IoT per la raccolta dati e il trattamento dei dati: Datalogger, Gateway Bridge, convertitori di protocollo e moduli di I\/O\",\"publisher\":{\"@id\":\"https:\/\/www.4next.eu\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.4next.eu\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.4next.eu\/en\/#organization\",\"name\":\"4neXt S.r.l.s.\",\"url\":\"https:\/\/www.4next.eu\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.4next.eu\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.4next.eu\/wp-content\/uploads\/2020\/12\/4next.png\",\"contentUrl\":\"https:\/\/www.4next.eu\/wp-content\/uploads\/2020\/12\/4next.png\",\"width\":842,\"height\":271,\"caption\":\"4neXt S.r.l.s.\"},\"image\":{\"@id\":\"https:\/\/www.4next.eu\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/4neXt.eu\",\"https:\/\/www.linkedin.com\/company\/4next\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.4next.eu\/en\/#\/schema\/person\/d8645c58d31e4a18a881eb99f91e88e7\",\"name\":\"Gino Cecchettin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.4next.eu\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a99cf3684bac9c8d1b62436409125987e451412a66506aa22d565a68243a6e01?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a99cf3684bac9c8d1b62436409125987e451412a66506aa22d565a68243a6e01?s=96&d=mm&r=g\",\"caption\":\"Gino Cecchettin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The most common OT and IT mistakes : 4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M","description":"Here we rectify some of the most frequent mistakes regarding OT (operational technology) and IT (information technology) security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/","og_locale":"en_US","og_type":"article","og_title":"The most common OT and IT mistakes : 4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M","og_description":"Here we rectify some of the most frequent mistakes regarding OT (operational technology) and IT (information technology) security.","og_url":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/","og_site_name":"4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M","article_publisher":"https:\/\/www.facebook.com\/4neXt.eu","article_published_time":"2021-02-19T16:31:43+00:00","article_modified_time":"2021-03-12T08:45:22+00:00","og_image":[{"width":640,"height":305,"url":"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png","type":"image\/png"}],"author":"Gino Cecchettin","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#article","isPartOf":{"@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/"},"author":{"name":"Gino Cecchettin","@id":"https:\/\/www.4next.eu\/en\/#\/schema\/person\/d8645c58d31e4a18a881eb99f91e88e7"},"headline":"The most common OT and IT mistakes","datePublished":"2021-02-19T16:31:43+00:00","dateModified":"2021-03-12T08:45:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/"},"wordCount":489,"commentCount":0,"publisher":{"@id":"https:\/\/www.4next.eu\/en\/#organization"},"image":{"@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png","articleSection":["Blog","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/","url":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/","name":"The most common OT and IT mistakes : 4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M","isPartOf":{"@id":"https:\/\/www.4next.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#primaryimage"},"image":{"@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png","datePublished":"2021-02-19T16:31:43+00:00","dateModified":"2021-03-12T08:45:22+00:00","description":"Here we rectify some of the most frequent mistakes regarding OT (operational technology) and IT (information technology) security.","breadcrumb":{"@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#primaryimage","url":"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png","contentUrl":"https:\/\/www.4next.eu\/wp-content\/uploads\/Cyber-Attack.png","width":640,"height":305,"caption":"it and ot mistakes"},{"@type":"BreadcrumbList","@id":"https:\/\/www.4next.eu\/news\/blog\/gli-errori-piu-comuni-dell-ot-e-dell-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.4next.eu\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.4next.eu\/news\/"},{"@type":"ListItem","position":3,"name":"Blog","item":"https:\/\/www.4next.eu\/news\/blog\/"},{"@type":"ListItem","position":4,"name":"The most common OT and IT mistakes"}]},{"@type":"WebSite","@id":"https:\/\/www.4next.eu\/en\/#website","url":"https:\/\/www.4next.eu\/en\/","name":"4neXt Technology Systems | Prodotti e Soluzioni IoT e M2M","description":"4neXt prodotti M2M e IoT per la raccolta dati e il trattamento dei dati: Datalogger, Gateway Bridge, convertitori di protocollo e moduli di I\/O","publisher":{"@id":"https:\/\/www.4next.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.4next.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.4next.eu\/en\/#organization","name":"4neXt S.r.l.s.","url":"https:\/\/www.4next.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.4next.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.4next.eu\/wp-content\/uploads\/2020\/12\/4next.png","contentUrl":"https:\/\/www.4next.eu\/wp-content\/uploads\/2020\/12\/4next.png","width":842,"height":271,"caption":"4neXt S.r.l.s."},"image":{"@id":"https:\/\/www.4next.eu\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/4neXt.eu","https:\/\/www.linkedin.com\/company\/4next\/"]},{"@type":"Person","@id":"https:\/\/www.4next.eu\/en\/#\/schema\/person\/d8645c58d31e4a18a881eb99f91e88e7","name":"Gino Cecchettin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.4next.eu\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a99cf3684bac9c8d1b62436409125987e451412a66506aa22d565a68243a6e01?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a99cf3684bac9c8d1b62436409125987e451412a66506aa22d565a68243a6e01?s=96&d=mm&r=g","caption":"Gino Cecchettin"}}]}},"_links":{"self":[{"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/posts\/831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/comments?post=831"}],"version-history":[{"count":3,"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/posts\/831\/revisions"}],"predecessor-version":[{"id":1121,"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/posts\/831\/revisions\/1121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/media\/828"}],"wp:attachment":[{"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/media?parent=831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/categories?post=831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/tags?post=831"},{"taxonomy":"applicazioni","embeddable":true,"href":"https:\/\/www.4next.eu\/en\/wp-json\/wp\/v2\/applicazioni?post=831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}