{"id":246154,"date":"2022-11-16T08:09:30","date_gmt":"2022-11-16T07:09:30","guid":{"rendered":"https:\/\/4itsolutions.com\/data-security-backup-and-the-3-2-1-1-0-rule\/"},"modified":"2023-03-22T11:00:00","modified_gmt":"2023-03-22T10:00:00","slug":"data-security-backup-and-the-3-2-1-1-0-rule","status":"publish","type":"post","link":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/","title":{"rendered":"Data security: backup and the 3-2-1-1-0 rule"},"content":{"rendered":"<h2>Why it is important to have a Disaster Recovery plan.<\/h2>\n<p>A <a href=\"https:\/\/www.4itsolutions.com\/blog\/perche-la-sicurezza-informatica-e-fondamentale-per-il-tuo-business\">corporate data loss<\/a>, whether due to a breakdown, an environmental disaster, a fire, or a hacker attack (such as ransomware), is in most cases a real disaster for the organization, whose operational halt very often results in a collapse of reputation and turnover.<\/p>\n<p>That&#8217;s why, whatever virtual environment your company uses (Vmware, Hyper-V or other), having a backup of your data available is critical. In fact, being able to rely on a reliable recovery point is the only way to carry out an effective <a href=\"https:\/\/www.4itsolutions.com\/blog\/cloud-disaster-recovery\">disaster recovery<\/a> that will allow the company to return to operation immediately without any consequences.<\/p>\n<p>For this to happen in complete safety and efficiency, a good backup strategy, called until recently the &#8220;3-2-1 rule&#8221; and now evolved, thanks to Veeam Backup &amp; Replication, into the &#8220;3-2-1-1-0 rule,&#8221; should be followed.<\/p>\n<p>&nbsp;<\/p>\n<h2>3-2-1-1-0 backup rule: what is it?<\/h2>\n<p>The original &#8220;3-2-1 rule&#8221; was based on a very simple principle regarding computer data storage, namely that one should always:<\/p>\n<ul>\n<li>Own at least 3 copies (also called the &#8220;rule of 3&#8221;)<\/li>\n<li>keep copies on 2 different media<\/li>\n<li>store off-site 1 of the copies<\/li>\n<\/ul>\n<p>The expression &#8220;3 copies&#8221; means that, in addition to the original, at least two additional backups must be available. In this way the risk of them all failing at the same time decreases exponentially, reaching, in the case of one original and two copies, the 1-in-a-million chance index.<\/p>\n<p>This is all valid if there are no common causes of failure, which could be the case if all copies were saved in the same place, as is the case with disks in the same RAID system, for example.<\/p>\n<p>In fact, having multiple copies allows each to be stored in a different physical location, averting the danger posed by accidents such as fire, explosion, and so on.<\/p>\n<p>Again according to the &#8220;3-2-1 rule,&#8221; it is good to keep copies of data on two different types of storage, such as an internal and an external hard drive, possibly, as we said, stored in different locations.<\/p>\n<p>Finally, one of the copies should always be stored off-site, so that it cannot be damaged by a concrete adverse event or be tied to a physical location.<\/p>\n<p>&nbsp;<\/p>\n<h2>How the 3-2-1-1-0 rule works<\/h2>\n<p>The &#8220;3-2-1 rule&#8221; evolves into the &#8220;3-2-1-0 rule&#8221; when applied to VMware or HyperV environments via Veeam Backup &amp; Replication.<\/p>\n<p>The second &#8220;1&#8221; that is added indicates that in addition to an off-line backup copy, an &#8220;immutable&#8221; one must be created . This type of backup allows for faster data storage, the ability to maintain information history, and most importantly, increased security against hacker attacks such as ransomware.<\/p>\n<p>Instead, the &#8220;0&#8221; that is added at the bottom stands for &#8220;zero errors,&#8221; and indicates the fact that during the automatic verification of backup recovery, Veeam&#8217;s SureBackup feature ensures complete compliance and total absence of functional bugs in the process and in the data itself.<\/p>\n<p>This is done through <a href=\"https:\/\/www.4itsolutions.com\/blog\/monitoraggio-proattivo-it-miglior-cura-per-efficienza-e-prevenzione\">constant monitoring<\/a> of backups, which also enables the quickest possible correction of any errors.<\/p>\n<p>Veeam Backup &amp; Replication also meets all the other parameters outlined in the &#8220;rule,&#8221; for at least three reasons:<\/p>\n<ul>\n<li>Thanks to the Backup Jobs feature, it allows the creation of several backups simultaneously<\/li>\n<li>Being storage-independent, it works with all kinds of media, from disks to the cloud<\/li>\n<li>Through Veeam Cloud Connect, off-site <a href=\"https:\/\/www.4itsolutions.com\/blog\/ridurre-rischi-cybersecurity-con-cloud\">cloud<\/a> backups can be achieved directly in a service provider&#8217;s infrastructure.<\/li>\n<\/ul>\n<p>For all these reasons, applying the &#8220;3-2-1-0 rule&#8221; through Veeam is now considered a must by all companies that want to protect their data as best they can to keep their service level and competitiveness high.<\/p>\n<p>The important thing, to take full advantage of its potential, is to refer to a certified and <a href=\"https:\/\/www.4itsolutions.com\/blog\/microsoft-365-tutti-i-vantaggi-di-affidarsi-a-un-gold-cloud-productivity-partner\">trusted partner<\/a> who has the expertise to best implement the right solution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The experience of computer data loss is always a traumatic event, both in the private sphere and, even more so, in the business context. In the latter case, in fact, the event can constitute a major damage and even a not inconsiderable danger, both to the organization and to its customers and suppliers. To prevent it, there are best practices that, however, need the right ways to apply them in order to be reliable.<\/p>\n","protected":false},"author":4,"featured_media":244707,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[37,48],"tags":[],"class_list":["post-246154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-manageddataprotection-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data security: backup and the 3-2-1-1-0 rule<\/title>\n<meta name=\"description\" content=\"What is the &quot;3-2-1-0 backup rule&quot; and why it turns out to be the safest for storing corporate computer data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data security: backup and the 3-2-1-1-0 rule\" \/>\n<meta property=\"og:description\" content=\"What is the &quot;3-2-1-0 backup rule&quot; and why it turns out to be the safest for storing corporate computer data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/\" \/>\n<meta property=\"og:site_name\" content=\"4IT Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/4itsolutions10\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-16T07:09:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"393\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Stefano Papaleo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefano Papaleo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/\"},\"author\":{\"name\":\"Stefano Papaleo\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/00e74235300c4565c3d41e8f097a5d74\"},\"headline\":\"Data security: backup and the 3-2-1-1-0 rule\",\"datePublished\":\"2022-11-16T07:09:30+00:00\",\"dateModified\":\"2023-03-22T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png\",\"articleSection\":[\"IT Security\",\"Managed Data Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/\",\"name\":\"Data security: backup and the 3-2-1-1-0 rule\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png\",\"datePublished\":\"2022-11-16T07:09:30+00:00\",\"dateModified\":\"2023-03-22T10:00:00+00:00\",\"description\":\"What is the \\\"3-2-1-0 backup rule\\\" and why it turns out to be the safest for storing corporate computer data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/#primaryimage\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png\",\"width\":750,\"height\":393,\"caption\":\"Sicurezza dei dati_ il backup e la regola del 3-2-1-1-0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/data-security-backup-and-the-3-2-1-1-0-rule\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/category\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/category\\\/blog-en\\\/it-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Data security: backup and the 3-2-1-1-0 rule\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"name\":\"4IT Solutions\",\"description\":\"Soluzioni informatiche per la tua azienda\",\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/4itsolutions.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\",\"name\":\"4IT Solutions\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"4IT Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/4itsolutions10\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/4it-solutions\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/00e74235300c4565c3d41e8f097a5d74\",\"name\":\"Stefano Papaleo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"caption\":\"Stefano Papaleo\"},\"description\":\"CTO - Chief Technology Officer\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/author\\\/stefano_papaleo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data security: backup and the 3-2-1-1-0 rule","description":"What is the \"3-2-1-0 backup rule\" and why it turns out to be the safest for storing corporate computer data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/","og_locale":"en_US","og_type":"article","og_title":"Data security: backup and the 3-2-1-1-0 rule","og_description":"What is the \"3-2-1-0 backup rule\" and why it turns out to be the safest for storing corporate computer data.","og_url":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/","og_site_name":"4IT Solutions","article_publisher":"https:\/\/www.facebook.com\/4itsolutions10","article_published_time":"2022-11-16T07:09:30+00:00","article_modified_time":"2023-03-22T10:00:00+00:00","og_image":[{"width":750,"height":393,"url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png","type":"image\/png"}],"author":"Stefano Papaleo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Stefano Papaleo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/#article","isPartOf":{"@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/"},"author":{"name":"Stefano Papaleo","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/00e74235300c4565c3d41e8f097a5d74"},"headline":"Data security: backup and the 3-2-1-1-0 rule","datePublished":"2022-11-16T07:09:30+00:00","dateModified":"2023-03-22T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/"},"wordCount":659,"publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png","articleSection":["IT Security","Managed Data Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/","url":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/","name":"Data security: backup and the 3-2-1-1-0 rule","isPartOf":{"@id":"https:\/\/4itsolutions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/#primaryimage"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png","datePublished":"2022-11-16T07:09:30+00:00","dateModified":"2023-03-22T10:00:00+00:00","description":"What is the \"3-2-1-0 backup rule\" and why it turns out to be the safest for storing corporate computer data.","breadcrumb":{"@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/#primaryimage","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/Sicurezza-dei-dati_-il-backup-e-la-regola-del-3-2-1-1-0.png","width":750,"height":393,"caption":"Sicurezza dei dati_ il backup e la regola del 3-2-1-1-0"},{"@type":"BreadcrumbList","@id":"https:\/\/4itsolutions.com\/en\/data-security-backup-and-the-3-2-1-1-0-rule\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/4itsolutions.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/4itsolutions.com\/en\/category\/blog-en\/"},{"@type":"ListItem","position":3,"name":"IT Security","item":"https:\/\/4itsolutions.com\/en\/category\/blog-en\/it-security\/"},{"@type":"ListItem","position":4,"name":"Data security: backup and the 3-2-1-1-0 rule"}]},{"@type":"WebSite","@id":"https:\/\/4itsolutions.com\/#website","url":"https:\/\/4itsolutions.com\/","name":"4IT Solutions","description":"Soluzioni informatiche per la tua azienda","publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/4itsolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/4itsolutions.com\/#organization","name":"4IT Solutions","url":"https:\/\/4itsolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","width":512,"height":512,"caption":"4IT Solutions"},"image":{"@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/4itsolutions10","https:\/\/www.linkedin.com\/company\/4it-solutions\/"]},{"@type":"Person","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/00e74235300c4565c3d41e8f097a5d74","name":"Stefano Papaleo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","caption":"Stefano Papaleo"},"description":"CTO - Chief Technology Officer","url":"https:\/\/4itsolutions.com\/en\/author\/stefano_papaleo\/"}]}},"_links":{"self":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/246154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/comments?post=246154"}],"version-history":[{"count":1,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/246154\/revisions"}],"predecessor-version":[{"id":246155,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/246154\/revisions\/246155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media\/244707"}],"wp:attachment":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media?parent=246154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/categories?post=246154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/tags?post=246154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}