{"id":10184,"date":"2023-06-21T10:49:00","date_gmt":"2023-06-21T14:49:00","guid":{"rendered":"https:\/\/nventive.com\/articles\/the-10-essential-cybersecurity-controls\/"},"modified":"2025-05-27T22:34:22","modified_gmt":"2025-05-28T02:34:22","slug":"the-10-essential-cybersecurity-controls","status":"publish","type":"post","link":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/","title":{"rendered":"The 10 Essential Cybersecurity Controls"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10184\" class=\"elementor elementor-10184 elementor-10176\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79048a61 e-flex e-con-boxed e-con e-parent\" data-id=\"79048a61\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d7470ec elementor-widget elementor-widget-text-editor\" data-id=\"1d7470ec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Have you established a cybersecurity plan that you believe to be robust? \u201cExpect a breach anyway, and always assume that a malicious action can occur.\u201d This is how our IT security expert, Francis Venne, approaches each project in order to prevent the worst and anticipate even the slightest event. To help you strengthen your response plan, here are his 10 recommendations to actively combat cyberthreats.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53804713 e-flex e-con-boxed e-con e-parent\" data-id=\"53804713\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7836792 elementor-widget elementor-widget-text-editor\" data-id=\"7836792\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These validation points will allow you to establish a solid foundation on which to build all your other cybersecurity measures. This is just a starting point, a checklist to ensure that your foundations are well protected.<\/p>\n<p>This is a rigorous and continuous process that our team in charge of IT security, headed by Francis Venne, strengthens and accentuates in a preventive and reactive way on a daily basis. Our meticulous procedures protect both nventive and our clients in order to develop secure digital solutions together that are resistant to cyberattacks.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-403d816 e-flex e-con-boxed e-con e-parent\" data-id=\"403d816\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41a1b15 elementor-widget elementor-widget-image\" data-id=\"41a1b15\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1482\" height=\"988\" src=\"https:\/\/nventive.com\/app\/uploads\/discussion-between-digital-security-team-members.webp\" class=\"attachment-full size-full wp-image-10173\" alt=\"Discussion between digital security team members\" srcset=\"https:\/\/nventive.com\/app\/uploads\/discussion-between-digital-security-team-members.webp 1482w, https:\/\/nventive.com\/app\/uploads\/discussion-between-digital-security-team-members-300x200.webp 300w, https:\/\/nventive.com\/app\/uploads\/discussion-between-digital-security-team-members-1024x683.webp 1024w, https:\/\/nventive.com\/app\/uploads\/discussion-between-digital-security-team-members-768x512.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-13ee9cb0 e-flex e-con-boxed e-con e-parent\" data-id=\"13ee9cb0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e6f7830 elementor-widget elementor-widget-heading\" data-id=\"7e6f7830\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Have an incident management plan<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16b8bb7c elementor-widget elementor-widget-text-editor\" data-id=\"16b8bb7c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Although you may feel safe from attacks, it is essential to know how to anticipate them. Establishing an incident response plan to allow your team to identify a wide range of potential cyberthreats ahead of time \u2014and understanding how to properly take the lead if they occur \u2014 is therefore essential.<\/p>\n<p>You will then be better equipped to establish a Business Continuity Plan to remain operational during the incident, including a Disaster Recovery Plan to better defend the affected infrastructure and react faster.<\/p>\n<p>Taking a complete inventory of the IT system and the measures in place is essential, as is keeping an up-to-date log of past incidents with information on how they were resolved.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1cbfe084 e-flex e-con-boxed e-con e-parent\" data-id=\"1cbfe084\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-558738ea elementor-widget elementor-widget-heading\" data-id=\"558738ea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Establish a risk management policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fb222c8 elementor-widget elementor-widget-text-editor\" data-id=\"4fb222c8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>By knowing what the risks are, it is much simpler to minimize them. Establishing a risk management policy guarantees you not only greater vigilance, but also a manual of best practices to consult in the event of a breach, doubt, or question.<\/p>\n<p>This document must then become a living document: when a missing element is noticed or an update is carried out, they must be recorded, then communicated to the whole team.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cb62ab e-flex e-con-boxed e-con e-parent\" data-id=\"4cb62ab\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5931df5 elementor-widget elementor-widget-heading\" data-id=\"5931df5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. Train the employees<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bab148a elementor-widget elementor-widget-text-editor\" data-id=\"bab148a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Most of the time, cyberattacks occur through negligent internal actions that compromise the security of the systems, such as phishing or unintentional data leaks.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38825112 e-flex e-con-boxed e-con e-parent\" data-id=\"38825112\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7583e2c3 e-con-full e-flex e-con e-child\" data-id=\"7583e2c3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69b8c3df elementor-widget elementor-widget-text-editor\" data-id=\"69b8c3df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>&#8220;A chain is only as strong as its weakest link. If you have armoured doors but your employees leave them wide open, you can\u2019t be protected.&#8221;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50a3fe83 elementor-widget elementor-widget-text-editor\" data-id=\"50a3fe83\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Francis Venne<br \/>\nHead of IT security<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45048d7b e-flex e-con-boxed e-con e-parent\" data-id=\"45048d7b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67e570a6 elementor-widget elementor-widget-text-editor\" data-id=\"67e570a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With the implementation of regular training, the staff will be even more aware and alert to malicious threats, allowing your organization to avoid careless mistakes.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-006f0bc e-flex e-con-boxed e-con e-parent\" data-id=\"006f0bc\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e497c0 elementor-widget elementor-widget-heading\" data-id=\"9e497c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. Conduct the right checks upon hiring<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c59f82 elementor-widget elementor-widget-text-editor\" data-id=\"8c59f82\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Beyond the internal measures during the onboarding of a new employee, it is essential to put controls in place during recruitment. This is why a criminal record check is one of the necessary steps in the hiring process in the technology field.<\/p>\n<p>The company must also ensure that the measures in place are not disclosed to malicious sources. It is therefore strongly recommended to have all your staff sign a non-disclosure agreement to ensure that any confidential information remains confidential.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e3ecc15 e-flex e-con-boxed e-con e-parent\" data-id=\"e3ecc15\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-762b86de elementor-widget elementor-widget-image\" data-id=\"762b86de\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1482\" height=\"988\" src=\"https:\/\/nventive.com\/app\/uploads\/new-employee-arriving-at-work.webp\" class=\"attachment-full size-full wp-image-10175\" alt=\"New employee arriving at work\" srcset=\"https:\/\/nventive.com\/app\/uploads\/new-employee-arriving-at-work.webp 1482w, https:\/\/nventive.com\/app\/uploads\/new-employee-arriving-at-work-300x200.webp 300w, https:\/\/nventive.com\/app\/uploads\/new-employee-arriving-at-work-1024x683.webp 1024w, https:\/\/nventive.com\/app\/uploads\/new-employee-arriving-at-work-768x512.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4eeb6513 e-flex e-con-boxed e-con e-parent\" data-id=\"4eeb6513\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cec689d elementor-widget elementor-widget-heading\" data-id=\"4cec689d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5. Control access to the building, devices, and network<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46fdf448 elementor-widget elementor-widget-text-editor\" data-id=\"46fdf448\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It goes without saying that the security of your company goes beyond IT security. It should start with the physical security of the building and the devices that operate your system.<\/p>\n<p>Limiting access to the office using cards, keys, or turnstiles helps ensure that only the right people are allowed to enter. Once inside, it is essential to control who can have access to the secure WiFi and the software shared with clients.<\/p>\n<p>In the era of hybrid work mode, remote access must also be secured by protecting the company with robust remote work policies. Only controlled devices can be used in development.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ed15d1 e-flex e-con-boxed e-con e-parent\" data-id=\"4ed15d1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9bf3ae elementor-widget elementor-widget-heading\" data-id=\"a9bf3ae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6. Apply the principle of least privilege<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77943f2 elementor-widget elementor-widget-text-editor\" data-id=\"77943f2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Identity and access management (IAM) must be a fundamental pillar of your cybersecurity plan. This is a process that makes it possible to properly designate which roles require certain levels of access and which can do without them.<\/p>\n<p>This is the idea of role-based access control (RBAC), which greatly reduces the probability of an accident. It is therefore essential to properly define the roles and regularly re-evaluate them if there is turnover in the team.<\/p>\n<p>Limiting the downloading of software and restricting the use of machines for work become essential elements to avoid serious errors. In addition, if complex multi-factor password and encryption policies are simultaneously introduced, solid bricks are added to our fortress.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2abdbb9 e-flex e-con-boxed e-con e-parent\" data-id=\"2abdbb9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8fc6b76 elementor-widget elementor-widget-heading\" data-id=\"8fc6b76\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7. Secure the software development cycle<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d49120e elementor-widget elementor-widget-text-editor\" data-id=\"d49120e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Any IT company must also make sure to have a secure development process that is respected internally to guarantee voluntary actions and prevent flaws in the supply chain.<\/p>\n<p>By following AGILE methodology, the code can be peer reviewed to identify design flaws, while optimizing it so that it is up to date and secure. Then, the applications are deployed in pipelines to minimize the risk of human error during production. Thanks to static code analysis (SAST) with reputable tools such as Snyk, it is possible to automatically identify vulnerabilities that may have escaped the vigilant eyes of the developers. This type of tool also allows you to scan project dependencies and infrastructure as code (IaC).<\/p>\n<p>Before even writing a line of code or embarking on data collection, our team considers the most secure and efficient way to proceed. During the development of digital solutions, access to the code repositories is limited and assigned to authorized experts. If a transition occurs within the team, the employee should no longer have the ability to modify the source code of a project if their role no longer requires it. The IT and security teams should conduct an internal audit every six months to clean up access.<\/p>\n<p>A developer therefore cannot choose to make a modification without it being documented, reviewed by their peers, and approved by the client. The same goes for the online release: a digital solution will never be deployed without being validated and properly evaluated by the client beforehand.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1af207a2 e-flex e-con-boxed e-con e-parent\" data-id=\"1af207a2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d16b4b9 elementor-widget elementor-widget-image\" data-id=\"4d16b4b9\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1482\" height=\"1066\" src=\"https:\/\/nventive.com\/app\/uploads\/developer-working-on-digital-project-1.webp\" class=\"attachment-full size-full wp-image-10171\" alt=\"Developer working on digital project\" srcset=\"https:\/\/nventive.com\/app\/uploads\/developer-working-on-digital-project-1.webp 1482w, https:\/\/nventive.com\/app\/uploads\/developer-working-on-digital-project-1-300x216.webp 300w, https:\/\/nventive.com\/app\/uploads\/developer-working-on-digital-project-1-1024x737.webp 1024w, https:\/\/nventive.com\/app\/uploads\/developer-working-on-digital-project-1-768x552.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ee3d18b e-flex e-con-boxed e-con e-parent\" data-id=\"1ee3d18b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8fd68ac elementor-widget elementor-widget-heading\" data-id=\"8fd68ac\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">8. Keep your antivirus, firewall, and computer equipment up to date<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6213a5ae elementor-widget elementor-widget-text-editor\" data-id=\"6213a5ae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For Francis Venne, updating the systems is stating the obvious. \u201c<em>Having good IT hygiene is essential. Updates exist due to vulnerabilities discovered by researchers.<\/em>\u201d The fortress is only as strong as the defence of its perimeter.<\/p>\n<p>In addition, these measures are often external options for which a certain amount of money is paid. Properly configuring your tools allows you to avoid paying for a feature that only works halfway.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06c08e6 e-flex e-con-boxed e-con e-parent\" data-id=\"06c08e6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eec7675 elementor-widget elementor-widget-heading\" data-id=\"eec7675\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">9. Create backups (and don\u2019t forget to test them!)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56534b7 elementor-widget elementor-widget-text-editor\" data-id=\"56534b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Establishing backups is good, but ensuring that they work and are accessible in case of an emergency is better! How long does it take to download it? And for critical data, how long can you live without it? Can the company operate while it is being recovered?<\/p>\n<p>Once the backup has been created, it is obviously necessary to ensure that it is properly secured and encrypted. It is also helpful to provide an estimate of the system\u2019s value by detailing the purchase of new hardware, the time it takes to operate it, and the value of the data that it contains. That way, you will be in a better position to determine which system to prioritize in the event of an outage or attack.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9215d20 e-flex e-con-boxed e-con e-parent\" data-id=\"9215d20\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e224d76 elementor-widget elementor-widget-heading\" data-id=\"e224d76\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">10. Managing the end of life of devices<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aed78bb elementor-widget elementor-widget-text-editor\" data-id=\"aed78bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To ensure an effective digital solution, it is essential to properly equip our experts and to be able to test it on state-of-the-art devices. It then becomes necessary to acquire new devices and get rid of obsolete machines.<\/p>\n<p>Before depositing them at the collection point, it is imperative to ensure that they are empty and that no client data remains stored on them. Once you are sure of this, you can do business with a certified supplier and obtain a certificate of destruction.<\/p>\n<p>It goes without saying that the same principle must be applied to paper documents! It is essential to have a shredder to properly dispose of confidential documents.<\/p>\n<p><strong>Cybersecurity procedures cannot be an afterthought. This is a continuous process where they must be constantly improved, optimized, and updated. What was secure yesterday may no longer be secure today. Our daily internal validations are based on these main principles, so our clients can work with us to create their digital solutions in total confidence.<\/strong><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d047e13 e-con-full e-flex e-con e-parent\" data-id=\"d047e13\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-824fc8f elementor-widget elementor-widget-template\" data-id=\"824fc8f\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"12208\" class=\"elementor elementor-12208 elementor-12184\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40d5957e e-flex e-con-boxed e-con e-parent\" data-id=\"40d5957e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b78efbf e-con-full e-flex e-con e-child\" data-id=\"1b78efbf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e14a4ef elementor-widget elementor-widget-heading\" data-id=\"7e14a4ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Featured articles<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2902db16 elementor-widget elementor-widget-nv-button\" data-id=\"2902db16\" data-element_type=\"widget\" data-widget_type=\"nv-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                <a\n            class=\"nv-button  nv-button--style--desktop--outline-icon nv-button--style--laptop--outline-icon nv-button--style--tablet--outline-icon nv-button--style--mobile--outline-icon nv-button--theme--desktop--dark nv-button--theme--laptop--dark nv-button--theme--tablet--dark nv-button--theme--mobile--dark\" href=\"https:\/\/nventive.com\/fr\/blogue\/\" aria-label=\"See more articles\"        >\n            <span class=\"nv-button__text\">See more articles<\/span>\n            <span class=\"nv-button__icon\">\n                <i aria-hidden=\"true\" class=\"myemoji-icon my-emoji-iconarrow_right_alt\"><\/i>            <\/span>\n        <\/a>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3d033e elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"2e3d033e\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:5334,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Have you established a cybersecurity plan that you believe to be robust? \u201cExpect a breach anyway, and always assume that a malicious action can occur.\u201d <\/p>\n","protected":false},"author":21,"featured_media":10169,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[35],"tags":[65],"class_list":["post-10184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-experts-en","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The 10 Essential Cybersecurity Controls | nventive<\/title>\n<meta name=\"description\" content=\"Learn about the 10 essential cybersecurity controls every organization needs to protect digital assets, ensure compliance, and mitigate security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 10 Essential Cybersecurity Controls | nventive\" \/>\n<meta property=\"og:description\" content=\"Learn about the 10 essential cybersecurity controls every organization needs to protect digital assets, ensure compliance, and mitigate security risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/\" \/>\n<meta property=\"og:site_name\" content=\"nventive\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-21T14:49:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T02:34:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"561\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Francis Venne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francis Venne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"122 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/\"},\"author\":{\"name\":\"Francis Venne\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/person\/61b97571c1c30c044d10acf524bb26a7\"},\"headline\":\"The 10 Essential Cybersecurity Controls\",\"datePublished\":\"2023-06-21T14:49:00+00:00\",\"dateModified\":\"2025-05-28T02:34:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/\"},\"wordCount\":1394,\"publisher\":{\"@id\":\"https:\/\/nventive.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Experts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/\",\"url\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/\",\"name\":\"The 10 Essential Cybersecurity Controls | nventive\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp\",\"datePublished\":\"2023-06-21T14:49:00+00:00\",\"dateModified\":\"2025-05-28T02:34:22+00:00\",\"description\":\"Learn about the 10 essential cybersecurity controls every organization needs to protect digital assets, ensure compliance, and mitigate security risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#primaryimage\",\"url\":\"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp\",\"contentUrl\":\"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp\",\"width\":842,\"height\":561,\"caption\":\"The 10 Essential Cybersecurity Controls\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/nventive.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 10 Essential Cybersecurity Controls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nventive.com\/en\/#website\",\"url\":\"https:\/\/nventive.com\/en\/\",\"name\":\"nventive\",\"description\":\"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al\",\"publisher\":{\"@id\":\"https:\/\/nventive.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nventive.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nventive.com\/en\/#organization\",\"name\":\"nventive\",\"url\":\"https:\/\/nventive.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"nventive\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/nventive\/\",\"https:\/\/www.instagram.com\/hellonventive\/\",\"https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/person\/61b97571c1c30c044d10acf524bb26a7\",\"name\":\"Francis Venne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nventive.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ceefd5e63578460a2757c33f075d4ee6f2ab0743a4d7853e6b9e6f55a9a496dd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ceefd5e63578460a2757c33f075d4ee6f2ab0743a4d7853e6b9e6f55a9a496dd?s=96&d=mm&r=g\",\"caption\":\"Francis Venne\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 10 Essential Cybersecurity Controls | nventive","description":"Learn about the 10 essential cybersecurity controls every organization needs to protect digital assets, ensure compliance, and mitigate security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/","og_locale":"en_US","og_type":"article","og_title":"The 10 Essential Cybersecurity Controls | nventive","og_description":"Learn about the 10 essential cybersecurity controls every organization needs to protect digital assets, ensure compliance, and mitigate security risks.","og_url":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/","og_site_name":"nventive","article_published_time":"2023-06-21T14:49:00+00:00","article_modified_time":"2025-05-28T02:34:22+00:00","og_image":[{"width":842,"height":561,"url":"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp","type":"image\/webp"}],"author":"Francis Venne","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Francis Venne","Est. reading time":"122 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#article","isPartOf":{"@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/"},"author":{"name":"Francis Venne","@id":"https:\/\/nventive.com\/en\/#\/schema\/person\/61b97571c1c30c044d10acf524bb26a7"},"headline":"The 10 Essential Cybersecurity Controls","datePublished":"2023-06-21T14:49:00+00:00","dateModified":"2025-05-28T02:34:22+00:00","mainEntityOfPage":{"@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/"},"wordCount":1394,"publisher":{"@id":"https:\/\/nventive.com\/en\/#organization"},"image":{"@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp","keywords":["Cybersecurity"],"articleSection":["Experts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/","url":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/","name":"The 10 Essential Cybersecurity Controls | nventive","isPartOf":{"@id":"https:\/\/nventive.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#primaryimage"},"image":{"@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp","datePublished":"2023-06-21T14:49:00+00:00","dateModified":"2025-05-28T02:34:22+00:00","description":"Learn about the 10 essential cybersecurity controls every organization needs to protect digital assets, ensure compliance, and mitigate security risks.","breadcrumb":{"@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#primaryimage","url":"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp","contentUrl":"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp","width":842,"height":561,"caption":"The 10 Essential Cybersecurity Controls"},{"@type":"BreadcrumbList","@id":"https:\/\/nventive.com\/en\/articles\/the-10-essential-cybersecurity-controls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/nventive.com\/en\/"},{"@type":"ListItem","position":2,"name":"The 10 Essential Cybersecurity Controls"}]},{"@type":"WebSite","@id":"https:\/\/nventive.com\/en\/#website","url":"https:\/\/nventive.com\/en\/","name":"nventive","description":"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al","publisher":{"@id":"https:\/\/nventive.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nventive.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nventive.com\/en\/#organization","name":"nventive","url":"https:\/\/nventive.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"nventive"},"image":{"@id":"https:\/\/nventive.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/nventive\/","https:\/\/www.instagram.com\/hellonventive\/","https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w"]},{"@type":"Person","@id":"https:\/\/nventive.com\/en\/#\/schema\/person\/61b97571c1c30c044d10acf524bb26a7","name":"Francis Venne","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nventive.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ceefd5e63578460a2757c33f075d4ee6f2ab0743a4d7853e6b9e6f55a9a496dd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ceefd5e63578460a2757c33f075d4ee6f2ab0743a4d7853e6b9e6f55a9a496dd?s=96&d=mm&r=g","caption":"Francis Venne"}}]}},"jetpack_featured_media_url":"https:\/\/nventive.com\/app\/uploads\/10-essential-cybersecurity-controls.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts\/10184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/comments?post=10184"}],"version-history":[{"count":1,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts\/10184\/revisions"}],"predecessor-version":[{"id":15789,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/posts\/10184\/revisions\/15789"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/media\/10169"}],"wp:attachment":[{"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/media?parent=10184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/categories?post=10184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nventive.com\/en\/wp-json\/wp\/v2\/tags?post=10184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}