{"id":83935,"date":"2012-11-30T06:00:22","date_gmt":"2012-11-30T14:00:22","guid":{"rendered":"https:\/\/www.faronics.com\/?page_id=83935"},"modified":"2012-11-30T07:17:42","modified_gmt":"2012-11-30T15:17:42","slug":"ponemon-results","status":"publish","type":"page","link":"https:\/\/www.faronics.com\/en-uk\/ponemon-results","title":{"rendered":"Ponemon Results"},"content":{"rendered":"<p><a href=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-83941 alignleft\" title=\"banner_ponemonresults\" src=\"https:\/\/www.faronics.com\/assets\/banner_ponemonresults.png\" alt=\"\" width=\"647\" height=\"244\" srcset=\"https:\/\/www.faronics.com\/assets\/banner_ponemonresults.png 647w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-150x56.png 150w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-300x113.png 300w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-350x131.png 350w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-130x49.png 130w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-117x44.png 117w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-240x90.png 240w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/a><\/p>\n<p>Thank you!<\/p>\n<p>You now have full access to the Cyber Security Readiness Report, conduct by the Ponemon Institute and sponsored by Faronics. You can download the reports and read the whitepapers below:<\/p>\n<p>&nbsp;<\/p>\n<p><strong>SMB State of Cyber Security Readiness Report<\/strong><\/p>\n<p>In this study, we surveyed 544 individuals in organisations with a headcount between 50 and\u00a03,000 employees. Fifty-eight percent of respondents are at the supervisor level or higher with an\u00a0average of more than 12 years experience. All respondents are familiar with their organisation\u2019s\u00a0security mission.<\/p>\n<p>Some of the key findings from the cyber security study include:<\/p>\n<ul>\n<li>Compliance is an important objective for organisations because only 15 percent want to do the minimum with regulations<\/li>\n<li>Laptops and mobile devices are vulnerable and lack cyber security readiness<\/li>\n<li>73 % say file and full disk encryption technologies are either not deployed or only partially deployed on endpoints<\/li>\n<li>Proliferation of end-user devices, including BYOD, is the most serious security threat<\/li>\n<li>74 % say security risks are only identified by informal observations<\/li>\n<\/ul>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<table style=\"background-color: #d30709; border: solid 1px #3a6f21; font-family: Arial, Helvetica, sans-serif; color: white; font-weight: bold; font-size: 18px; line-height: 20px;\" width=\"170\" border=\"0\" cellspacing=\"0\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"background-color: #d30709; border-style: solid; border-width: 1px; border-color: #ff0000 #8a0709 #8a0709 #ff0000; text-align: center;\" align=\"center\"><a style=\"text-decoration: none; color: white; padding: 10px; font-size: 14px;\" href=\"https:\/\/www.faronics.com\/assets\/UK-Faronics-FINAL-1.pdf\" target=\"_blank\">Download Report<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"text-decoration: underline;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/p>\n<p><strong>Data Breaches &#8211; Expectation &amp; Reality<\/strong><\/p>\n<p>Data security breaches can occur in any number of ways. If you were to ask the majority of the general public where they expected a data breach would be most likely to originate, they\u2019d tell you that malware attacks and online data theft were the greatest threats to corporate data security. While data theft is a genuine problem that many small-to-medium businesses will have to defend themselves against in time, we have found that the majority of corporate data breaches are the result of mistakes or malpractice on behalf of the end user. 55% of those questioned identified \u2018employee mistakes, incompetence or negligence\u2019 as the greatest contributing factor to digital security breaches, while 32% also selected a \u2018lack of guidance from management\u2019 as a major problem in the preparation against data security threats, suggesting the issue runs deeper than the odd employee mistake.<\/p>\n<p>&nbsp;<\/p>\n<table style=\"background-color: #d30709; border: solid 1px #3a6f21; font-family: Arial, Helvetica, sans-serif; color: white; font-weight: bold; font-size: 18px; line-height: 20px;\" width=\"170\" border=\"0\" cellspacing=\"0\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"background-color: #d30709; border-style: solid; border-width: 1px; border-color: #ff0000 #8a0709 #8a0709 #ff0000; text-align: center;\" align=\"center\"><a style=\"text-decoration: none; color: white; padding: 10px; font-size: 14px;\" href=\"https:\/\/www.faronics.com\/assets\/Data-Breaches-Expectation-and-Reality.pdf\" target=\"_blank\">Download Whitepaper<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"text-decoration: underline;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0<\/span><\/p>\n<p><strong>Small Businesses face failure through data breaches<\/strong><\/p>\n<p>This White Paper profiles two small businesses that we studied alongside the wider survey; their habits and the consequences of their data breaches reflect a number of similar stories told by other small businesses uncovered in our survey\u2019s research. The eventual failing of both businesses less than a year after the breach should act as a shocking indication of the risks that many small businesses face, and what steps other businesses should take to prevent the same actions and patterns from being repeated in their own firms.<\/p>\n<p>&nbsp;<\/p>\n<table style=\"background-color: #d30709; border: solid 1px #3a6f21; font-family: Arial, Helvetica, sans-serif; color: white; font-weight: bold; font-size: 18px; line-height: 20px;\" width=\"170\" border=\"0\" cellspacing=\"0\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"background-color: #d30709; border-style: solid; border-width: 1px; border-color: #ff0000 #8a0709 #8a0709 #ff0000; text-align: center;\" align=\"center\"><a style=\"text-decoration: none; color: white; padding: 10px; font-size: 14px;\" href=\"https:\/\/www.faronics.com\/assets\/White-Paper-Small-businesses-face-failure-through-data-breaches.pdf\" target=\"_blank\">Download Whitepaper<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p><a href=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-83941 alignleft\" title=\"banner_ponemonresults\" src=\"https:\/\/www.faronics.com\/assets\/banner_ponemonresults.png\" alt=\"\" width=\"647\" height=\"244\" srcset=\"https:\/\/www.faronics.com\/assets\/banner_ponemonresults.png 647w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-150x56.png 150w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-300x113.png 300w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-350x131.png 350w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-130x49.png 130w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-117x44.png 117w, https:\/\/www.faronics.com\/assets\/banner_ponemonresults-240x90.png 240w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/a><\/p>\n<p>Thank you!<\/p>\n<p>You now have full access to the Cyber Security Readiness Report, conduct by the Ponemon Institute and sponsored by Faronics. You can download the reports and read the whitepapers below:<\/p>\n<p>&nbsp;<\/p>\n<p><strong>SMB State of Cyber Security Readiness Report<\/strong><\/p>\n<p>In this study, we surveyed 544 individuals in organisations with a headcount between 50 and\u00a03,000 employees. Fifty-eight percent of respondents are at the supervisor level or higher with an\u00a0average of more than 12 years experience. All respondents are familiar with their organisation\u2019s\u00a0security mission.<\/p>\n<p>Some of the key findings from the cyber security study include:<\/p>\n<ul>\n<li>Compliance is an important objective for organisations because only 15 percent want to do the minimum with regulations<\/li>\n<li>Laptops and mobile devices are vulnerable and lack cyber security readiness<\/li>\n<li>73 % say file and full disk encryption technologies are either not deployed or only partially deployed on endpoints<\/li>\n<li>Proliferation of end-user devices, including BYOD, is the most serious security threat<\/li>\n<li>74 % say security risks are only identified by informal observations<\/li>\n<\/ul>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<p> <a style=\"text-decoration: none; color: white; padding: 10px; font-size: 14px;\" href=\"https:\/\/www.faronics.com\/assets\/UK-Faronics-FINAL-1.pdf\" target=\"_blank\">Download Report<\/a> <\/p>\n<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/p>\n<div class=\"more\"><a href=\"https:\/\/www.faronics.com\/en-uk\/ponemon-results\">Continue Reading&#8230;<\/a><\/div>\n","protected":false},"author":108,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-83935","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ponemon Results - Faronics<\/title>\n<meta name=\"description\" content=\"Thank you! You now have full access to the Cyber Security Readiness Report, conduct by the Ponemon Institute and sponsored by Faronics. You can download\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faronics.com\/en-uk\/ponemon-results\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ponemon Results\" \/>\n<meta property=\"og:description\" content=\"Thank you! You now have full access to the Cyber Security Readiness Report, conduct by the Ponemon Institute and sponsored by Faronics. You can download\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faronics.com\/en-uk\/ponemon-results\" \/>\n<meta property=\"og:site_name\" content=\"Faronics\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/faronics\" \/>\n<meta property=\"article:modified_time\" content=\"2012-11-30T15:17:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.faronics.com\/assets\/banner_ponemonresults.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@faronics\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/ponemon-results\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/ponemon-results\",\"name\":\"Ponemon Results - Faronics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/ponemon-results#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/ponemon-results#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/banner_ponemonresults.png\",\"datePublished\":\"2012-11-30T14:00:22+00:00\",\"dateModified\":\"2012-11-30T15:17:42+00:00\",\"description\":\"Thank you! You now have full access to the Cyber Security Readiness Report, conduct by the Ponemon Institute and sponsored by Faronics. You can download\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/ponemon-results#breadcrumb\"},\"inLanguage\":\"en-UK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/ponemon-results\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-UK\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/ponemon-results#primaryimage\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/banner_ponemonresults.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/banner_ponemonresults.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/ponemon-results#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ponemon Results\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/ponemon-results\\\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#website\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\",\"name\":\"Faronics\",\"description\":\"Simplifying Computer Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faronics.com\\\/en-uk?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-UK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#organization\",\"name\":\"Faronics\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-UK\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"width\":155,\"height\":44,\"caption\":\"Faronics\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/faronics\",\"https:\\\/\\\/x.com\\\/faronics\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ponemon Results - Faronics","description":"Thank you! You now have full access to the Cyber Security Readiness Report, conduct by the Ponemon Institute and sponsored by Faronics. You can download","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faronics.com\/en-uk\/ponemon-results","og_locale":"en_US","og_type":"article","og_title":"Ponemon Results","og_description":"Thank you! You now have full access to the Cyber Security Readiness Report, conduct by the Ponemon Institute and sponsored by Faronics. You can download","og_url":"https:\/\/www.faronics.com\/en-uk\/ponemon-results","og_site_name":"Faronics","article_publisher":"https:\/\/www.facebook.com\/faronics","article_modified_time":"2012-11-30T15:17:42+00:00","og_image":[{"url":"https:\/\/www.faronics.com\/assets\/banner_ponemonresults.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@faronics","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.faronics.com\/en-uk\/ponemon-results","url":"https:\/\/www.faronics.com\/en-uk\/ponemon-results","name":"Ponemon Results - Faronics","isPartOf":{"@id":"https:\/\/www.faronics.com\/en-uk#website"},"primaryImageOfPage":{"@id":"https:\/\/www.faronics.com\/en-uk\/ponemon-results#primaryimage"},"image":{"@id":"https:\/\/www.faronics.com\/en-uk\/ponemon-results#primaryimage"},"thumbnailUrl":"https:\/\/www.faronics.com\/assets\/banner_ponemonresults.png","datePublished":"2012-11-30T14:00:22+00:00","dateModified":"2012-11-30T15:17:42+00:00","description":"Thank you! You now have full access to the Cyber Security Readiness Report, conduct by the Ponemon Institute and sponsored by Faronics. You can download","breadcrumb":{"@id":"https:\/\/www.faronics.com\/en-uk\/ponemon-results#breadcrumb"},"inLanguage":"en-UK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faronics.com\/en-uk\/ponemon-results"]}]},{"@type":"ImageObject","inLanguage":"en-UK","@id":"https:\/\/www.faronics.com\/en-uk\/ponemon-results#primaryimage","url":"https:\/\/www.faronics.com\/assets\/banner_ponemonresults.png","contentUrl":"https:\/\/www.faronics.com\/assets\/banner_ponemonresults.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.faronics.com\/en-uk\/ponemon-results#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.faronics.com\/en-uk"},{"@type":"ListItem","position":2,"name":"Ponemon Results","item":"https:\/\/www.faronics.com\/en-uk\/ponemon-results\/"}]},{"@type":"WebSite","@id":"https:\/\/www.faronics.com\/en-uk#website","url":"https:\/\/www.faronics.com\/en-uk","name":"Faronics","description":"Simplifying Computer Management","publisher":{"@id":"https:\/\/www.faronics.com\/en-uk#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faronics.com\/en-uk?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-UK"},{"@type":"Organization","@id":"https:\/\/www.faronics.com\/en-uk#organization","name":"Faronics","url":"https:\/\/www.faronics.com\/en-uk","logo":{"@type":"ImageObject","inLanguage":"en-UK","@id":"https:\/\/www.faronics.com\/en-uk#\/schema\/logo\/image\/","url":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","contentUrl":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","width":155,"height":44,"caption":"Faronics"},"image":{"@id":"https:\/\/www.faronics.com\/en-uk#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/faronics","https:\/\/x.com\/faronics"]}]}},"_links":{"self":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/pages\/83935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/users\/108"}],"replies":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/comments?post=83935"}],"version-history":[{"count":0,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/pages\/83935\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/media?parent=83935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}