{"id":253799,"date":"2025-09-01T08:00:13","date_gmt":"2025-09-01T06:00:13","guid":{"rendered":"https:\/\/4itsolutions.com\/?p=253799"},"modified":"2025-09-01T08:00:13","modified_gmt":"2025-09-01T06:00:13","slug":"vm-and-easm-protect-your-business-from-the-most-insidious-risks","status":"publish","type":"post","link":"https:\/\/4itsolutions.com\/en\/vm-and-easm-protect-your-business-from-the-most-insidious-risks\/","title":{"rendered":"VM and EASM protect your business from the most insidious risks."},"content":{"rendered":"<p>Every asset exposed to the internet \u2013 from websites to cloud servers, microservices to APIs \u2013 can become an entry point for an attack. And often, we don\u2019t realize it until it\u2019s too late. This is where two essential tools for modern security come into play: <strong>Vulnerability Management (VM) <\/strong>and <strong>External Attack Surface Management (EASM).<\/strong> Together, they enable organizations to uncover what typically remains hidden and take action before an attacker does.   <\/p>\n<h2><strong>An attack doesn\u2019t always come through the front door.<\/strong><\/h2>\n<p>Every digital transformation \u2013 from cloud adoption to IoT devices \u2013 expands the attack surface. But as the IT infrastructure grows, visibility often fails to keep up. Shadow IT, forgotten subdomains, accidentally exposed services: it takes only a few overlooked elements to give cybercriminals a way in.  <\/p>\n<p><strong>External Attack Surface Management<\/strong> was created specifically to address this challenge. It doesn&#8217;t just monitor known systems\u2014it continuously scans the entire internet-facing surface, identifying forgotten assets, sudden changes, and risky configurations. In other words, it acts like an attacker would\u2014but in service of your security.  <\/p>\n<h2><strong>Vulnerability is not just a technical issue \u2014 it&#8217;s a matter of context.<\/strong><\/h2>\n<p>Traditional <strong>Vulnerability Management<\/strong> relied on periodic scans and metrics like the CVSS (Common Vulnerability Scoring System). But this approach is no longer enough. Today, we know that over 70% of high-CVSS vulnerabilities are never exploited. At the same time, low-scoring flaws on critical assets can pose a real threat. That\u2019s why the model is shifting toward risk-based vulnerability management, which takes real-world context into account: the criticality of the system, the likelihood of exploitation, and threat actor activity across the global landscape. Only by prioritizing what truly matters can organizations avoid wasting time and resources on negligible risks.     <\/p>\n<h2><strong>From dynamic inventory to proactive defense<\/strong><\/h2>\n<p>One of the most common weaknesses in security strategies is the lack of a complete and up-to-date inventory of exposed assets. Companies often don\u2019t know exactly how many systems they have, where they are, or whether they\u2019re properly configured. EASM bridges this gap: through continuous, automated discovery, it provides real-time mapping of everything externally visible\u2014including cloud-native resources, subdomains, APIs, and legacy infrastructure.  <\/p>\n<p>It\u2019s the essential starting point for any further action: <strong>you can\u2019t protect what you don\u2019t know exists.<\/strong><\/p>\n<h2><strong>The three stages of maturity in vulnerability management<\/strong><\/h2>\n<p>To make a VM strategy truly effective, organizations must move beyond a reactive approach. According to best practices, maturity is built in three stages: <\/p>\n<ol>\n<li> <strong>Accurate identification:<\/strong><br \/>\nData collection must be continuous and thorough, going beyond traditional assets to include containers, cloud environments, IoT, and OT. Modern tools are capable of achieving this even in distributed and hybrid environments.<\/li>\n<li> <strong>Contextual prioritization:<\/strong><br \/>\nVulnerabilities should not be assessed solely based on their \u201ctechnical severity,\u201d but rather on exploitability, public exposure, and the criticality of the asset. A bug on a core system that\u2019s accessible from the internet carries far more weight than a high-severity vulnerability on an isolated server. <\/li>\n<li> <strong>Automated remediation:<\/strong><br \/>\nThe most mature organizations automate corrective actions, minimizing the need for manual intervention. The goal is not only to fix vulnerabilities, but to do so quickly, in a traceable and measurable way. <\/li>\n<\/ol>\n<h2><strong>When risk is hidden in plain sight<\/strong><\/h2>\n<p>One of the main issues highlighted by the data is that many organizations <strong>underestimate the extent of their exposed attack surface.<\/strong> According to a recent survey, 33% of organizations scan too infrequently\u2014or don\u2019t scan at all. Even more concerning is that only 9% consider themselves effective at remediation. This creates a dangerous disconnect: risks may be identified (if at all), but action isn\u2019t taken in time.   <\/p>\n<p>Moreover, most companies rely on hybrid approaches with too <strong>many disconnected tools,<\/strong> leading to fragmented data flows, hampered collaboration between IT and security teams, and slower response times. That\u2019s why the market is now shifting toward integrated solutions that combine EASM and VM into a single automated platform\u2014capable of providing a unified view of priorities. <\/p>\n<h2><strong>Toward measurable and strategic security<\/strong><\/h2>\n<p>The true evolution of vulnerability management lies in its <strong>transformation into a business tool.<\/strong> It&#8217;s no longer just about patching systems, <strong>but about objectively measuring risk,<\/strong> tracking its evolution over time, and demonstrating the impact of security actions to executive leadership. <\/p>\n<p>In this context, EASM is the ideal ally\u2014it helps answer increasingly common boardroom questions such as: \u201c<em>Which parts of our infrastructure are truly exposed?\u201d,<\/em> <em>\u201cWhich vulnerabilities are actually at risk of exploitation?\u201d<\/em>, and <em>\u201cHow much have we improved over the past six months?\u201d<\/em><\/p>\n<h2><strong>The role of 4IT: visibility, prioritization, action<\/strong><\/h2>\n<p>Do you really know what\u2019s exposed on the internet under your company\u2019s name? How many vulnerabilities are you ignoring simply because you can\u2019t see them? <\/p>\n<p><strong>4IT Solutions<\/strong> has developed <strong>Security Essentials<\/strong>\u2014a package designed to turn security into part of your daily operations. The service integrates <strong>EASM, vulnerability management, MXDR, and exposure analysis<\/strong> to bring together visibility, prioritization, and action under a single framework\u2014without disrupting your existing IT stack.<br \/>\nA modular, scalable approach built to help companies protect what truly matters\u2014before it\u2019s too late. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital world, risk doesn\u2019t hide only within internal systems.<\/p>\n","protected":false},"author":15,"featured_media":253797,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[37],"tags":[],"class_list":["post-253799","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VM and EASM protect your business from the most insidious risks. - 4IT Solutions<\/title>\n<meta name=\"description\" content=\"Vulnerability management and EASM help identify exposed assets and hidden threats, enhancing both security and business resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/4itsolutions.com\/?p=253795\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VM and EASM protect your business from the most insidious risks. - 4IT Solutions\" \/>\n<meta property=\"og:description\" content=\"Vulnerability management and EASM help identify exposed assets and hidden threats, enhancing both security and business resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/4itsolutions.com\/?p=253795\" \/>\n<meta property=\"og:site_name\" content=\"4IT Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/4itsolutions10\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-01T06:00:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/08\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex Semenzato\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Semenzato\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795\"},\"author\":{\"name\":\"Alex Semenzato\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/23941a50b563eec2ee83b88c1f3ae4f7\"},\"headline\":\"VM and EASM protect your business from the most insidious risks.\",\"datePublished\":\"2025-09-01T06:00:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795\"},\"wordCount\":853,\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795\",\"name\":\"VM and EASM protect your business from the most insidious risks. - 4IT Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg\",\"datePublished\":\"2025-09-01T06:00:13+00:00\",\"description\":\"Vulnerability management and EASM help identify exposed assets and hidden threats, enhancing both security and business resilience.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/4itsolutions.com\\\/?p=253795\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795#primaryimage\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg\",\"width\":1920,\"height\":1281,\"caption\":\"VM ed EASM proteggono il tuo business dai rischi piu\u0300 insidiosi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/?p=253795#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sicurezza IT\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/category\\\/blog\\\/sicurezzainformatica\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"VM and EASM protect your business from the most insidious risks.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"name\":\"4IT Solutions\",\"description\":\"Soluzioni informatiche per la tua azienda\",\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/4itsolutions.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\",\"name\":\"4IT Solutions\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"4IT Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/4itsolutions10\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/4it-solutions\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/23941a50b563eec2ee83b88c1f3ae4f7\",\"name\":\"Alex Semenzato\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png\",\"caption\":\"Alex Semenzato\"},\"description\":\"Security Architect\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/author\\\/alex_semenzato\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VM and EASM protect your business from the most insidious risks. - 4IT Solutions","description":"Vulnerability management and EASM help identify exposed assets and hidden threats, enhancing both security and business resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/4itsolutions.com\/?p=253795","og_locale":"en_US","og_type":"article","og_title":"VM and EASM protect your business from the most insidious risks. - 4IT Solutions","og_description":"Vulnerability management and EASM help identify exposed assets and hidden threats, enhancing both security and business resilience.","og_url":"https:\/\/4itsolutions.com\/?p=253795","og_site_name":"4IT Solutions","article_publisher":"https:\/\/www.facebook.com\/4itsolutions10","article_published_time":"2025-09-01T06:00:13+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/08\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg","type":"image\/jpeg"}],"author":"Alex Semenzato","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alex Semenzato","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/4itsolutions.com\/?p=253795#article","isPartOf":{"@id":"https:\/\/4itsolutions.com\/?p=253795"},"author":{"name":"Alex Semenzato","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/23941a50b563eec2ee83b88c1f3ae4f7"},"headline":"VM and EASM protect your business from the most insidious risks.","datePublished":"2025-09-01T06:00:13+00:00","mainEntityOfPage":{"@id":"https:\/\/4itsolutions.com\/?p=253795"},"wordCount":853,"publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"image":{"@id":"https:\/\/4itsolutions.com\/?p=253795#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/08\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg","articleSection":["IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/4itsolutions.com\/?p=253795","url":"https:\/\/4itsolutions.com\/?p=253795","name":"VM and EASM protect your business from the most insidious risks. - 4IT Solutions","isPartOf":{"@id":"https:\/\/4itsolutions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/4itsolutions.com\/?p=253795#primaryimage"},"image":{"@id":"https:\/\/4itsolutions.com\/?p=253795#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/08\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg","datePublished":"2025-09-01T06:00:13+00:00","description":"Vulnerability management and EASM help identify exposed assets and hidden threats, enhancing both security and business resilience.","breadcrumb":{"@id":"https:\/\/4itsolutions.com\/?p=253795#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/4itsolutions.com\/?p=253795"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/?p=253795#primaryimage","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/08\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/08\/VM-ed-EASM-proteggono-il-tuo-business-dai-rischi-piu-insidiosi.jpg","width":1920,"height":1281,"caption":"VM ed EASM proteggono il tuo business dai rischi piu\u0300 insidiosi"},{"@type":"BreadcrumbList","@id":"https:\/\/4itsolutions.com\/?p=253795#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/4itsolutions.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/4itsolutions.com\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Sicurezza IT","item":"https:\/\/4itsolutions.com\/category\/blog\/sicurezzainformatica\/"},{"@type":"ListItem","position":4,"name":"VM and EASM protect your business from the most insidious risks."}]},{"@type":"WebSite","@id":"https:\/\/4itsolutions.com\/#website","url":"https:\/\/4itsolutions.com\/","name":"4IT Solutions","description":"Soluzioni informatiche per la tua azienda","publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/4itsolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/4itsolutions.com\/#organization","name":"4IT Solutions","url":"https:\/\/4itsolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","width":512,"height":512,"caption":"4IT Solutions"},"image":{"@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/4itsolutions10","https:\/\/www.linkedin.com\/company\/4it-solutions\/"]},{"@type":"Person","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/23941a50b563eec2ee83b88c1f3ae4f7","name":"Alex Semenzato","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Progetto-senza-titolo-2025-02-10T135357.528-96x96.png","caption":"Alex Semenzato"},"description":"Security Architect","url":"https:\/\/4itsolutions.com\/en\/author\/alex_semenzato\/"}]}},"_links":{"self":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/253799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/comments?post=253799"}],"version-history":[{"count":1,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/253799\/revisions"}],"predecessor-version":[{"id":254023,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/253799\/revisions\/254023"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media\/253797"}],"wp:attachment":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media?parent=253799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/categories?post=253799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/tags?post=253799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}