{"id":2225,"date":"2024-07-22T09:59:15","date_gmt":"2024-07-22T07:59:15","guid":{"rendered":"https:\/\/www.nexq.it\/cybersecurity\/"},"modified":"2025-08-25T15:20:39","modified_gmt":"2025-08-25T13:20:39","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.nexq.it\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2225\" class=\"elementor elementor-2225\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bdde63c e-flex e-con-boxed e-con e-parent\" data-id=\"bdde63c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/youtu.be\\\/vVRULq_tD24&quot;,&quot;background_play_on_mobile&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-video-embed\" role=\"presentation\"><\/div>\n\t\t\t\t\t\t<\/div><div class=\"elementor-element elementor-element-37413e6 e-con-full e-flex e-con e-child\" data-id=\"37413e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee0faec elementor-widget elementor-widget-heading\" data-id=\"ee0faec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CYBERSECURITY<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-container&quot;,&quot;duration&quot;:4000,&quot;startDelay&quot;:500,&quot;delay&quot;:200,&quot;ease&quot;:&quot;bounce.in&quot;,&quot;initValues&quot;:{&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 74.4% 0px&quot;},&quot;animations&quot;:{&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-310019d elementor-widget elementor-widget-heading\" data-id=\"310019d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The <i>method<\/i> that protects every level of your IT infrastructure<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac986ce elementor-widget elementor-widget-spacer\" data-id=\"ac986ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60bd13f elementor-widget elementor-widget-text-editor\" data-id=\"60bd13f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is an integrated approach that permeates every level of the IT infrastructure: from the network to the servers, the devices and the users. At NEXQ, we don&#8217;t just offer consultancy, we actually design and implement custom security solutions, suited to the specific operational needs of our clients. We configure systems to protect company data against intrusions and threats. We promote an approach to security that is renewed every single day through training programs for our collaborators.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ddfdf68 e-flex e-con-boxed e-con e-parent\" data-id=\"ddfdf68\" data-element_type=\"container\" data-e-type=\"container\" id=\"vulnerability\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5831e2 elementor-widget__width-auto elementor-absolute elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"d5831e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e8967b elementor-hidden-desktop elementor-widget elementor-widget-heading\" data-id=\"2e8967b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability assessment<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b9049b elementor-widget elementor-widget-text-editor\" data-id=\"7b9049b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The <strong><em>Vulnerability Assessment<\/em><\/strong> is the first step in assessing the security of your IT systems. We use state-of-the-art tools to scan and analyse your network, servers and applications, identifying weaknesses that could be exploited. This process is essential in keeping the infrastructure secure and protected against potential attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e6fa111 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e6fa111\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-04e44a7\" data-id=\"04e44a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-549a58d animated-slow elementor-invisible elementor-widget elementor-widget-image\" data-id=\"549a58d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.nexq.it\/wp-content\/uploads\/2024\/08\/flusso-02.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"flusso-02\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc4OSwidXJsIjoiaHR0cHM6XC9cL3d3dy5uZXhxLml0XC93cC1jb250ZW50XC91cGxvYWRzXC8yMDI0XC8wOFwvZmx1c3NvLTAyLnBuZyJ9\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"780\" height=\"241\" src=\"https:\/\/www.nexq.it\/wp-content\/uploads\/2024\/08\/flusso-02.png\" class=\"attachment-large size-large wp-image-1789\" alt=\"\" srcset=\"https:\/\/www.nexq.it\/wp-content\/uploads\/2024\/08\/flusso-02.png 829w, https:\/\/www.nexq.it\/wp-content\/uploads\/2024\/08\/flusso-02-300x93.png 300w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-007c51c elementor-widget elementor-widget-heading\" data-id=\"007c51c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">We present the results of the Vulnerability Assessment in a detailed report, with practical and priority recommendations for mitigation of the vulnerabilities identified.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5df1672 elementor-widget elementor-widget-spacer\" data-id=\"5df1672\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-656c90f e-flex e-con-boxed e-con e-parent\" data-id=\"656c90f\" data-element_type=\"container\" data-e-type=\"container\" id=\"penetration\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6df4049 elementor-widget__width-auto elementor-absolute elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"6df4049\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Penetration Test<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4aabb44 elementor-hidden-desktop elementor-widget elementor-widget-heading\" data-id=\"4aabb44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Penetration test<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-462aa29 elementor-widget elementor-widget-text-editor\" data-id=\"462aa29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The <strong><em>Penetration Test<\/em><\/strong> is the second step in our approach to security. Our experts simulate actual attacks in order to examine the integrity of your systems and identify any vulnerabilities. This service allows the weaknesses to be identified and corrected before they can be exploited and cause damage.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f82e0a3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f82e0a3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a8469f4\" data-id=\"a8469f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a0d248 elementor-widget elementor-widget-heading\" data-id=\"9a0d248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Each Penetration Test is customised to reflect the specific threats that your company could face, providing a clear picture of its current defences and practical advice on how to improve them.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-214af2b elementor-widget elementor-widget-spacer\" data-id=\"214af2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-237e093 e-flex e-con-boxed e-con e-parent\" data-id=\"237e093\" data-element_type=\"container\" data-e-type=\"container\" id=\"sanity\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7992208 elementor-widget__width-auto elementor-absolute elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"7992208\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sanity Check<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46410a2 elementor-hidden-desktop elementor-widget elementor-widget-heading\" data-id=\"46410a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sanity check<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b91339 elementor-widget elementor-widget-text-editor\" data-id=\"1b91339\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The <strong><em>Sanity Check<\/em><\/strong> is a periodic activity. This service ensures that all the security measures are updated and operational, ensuring protection remains constant over time. It includes a check on the security configurations, updating of the security software and analysis of emerging threats, in order to ensure that your infrastructure is always ready to defend itself against attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c5f4c8b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c5f4c8b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a2f170c\" data-id=\"a2f170c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-061ae2c elementor-widget elementor-widget-heading\" data-id=\"061ae2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">We use the Sanity Check to provide a continual review of your security policies and periodically suggest improvements based on the latest trends and technologies in cybersecurity.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c80bbe4 elementor-widget elementor-widget-spacer\" data-id=\"c80bbe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-8b22860 e-flex e-con-boxed e-con e-parent\" data-id=\"8b22860\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d67fb00 e-con-full e-flex e-con e-child\" data-id=\"d67fb00\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1782e69 elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-icon-box\" data-id=\"1782e69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMAKE <i>IT<\/i> SAFE\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tHow secure is your IT infrastructure? \nWe can work together to identify vulnerabilities, strengthen your defences and protect your data.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a7c6b1 elementor-align-right elementor-widget__width-initial animated-slow elementor-invisible elementor-widget elementor-widget-ld_button\" data-id=\"4a7c6b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"ld_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<a\n\t\t\t\thref=\"\/en\/contacts\/\"class=\"elementor-button btn btn-solid btn-hover-txt-liquid-x btn-icon-right btn-icon-circle btn-icon-lg btn-icon-shaped btn-icon-solid btn-icon-ripple btn-has-label\"\t\t\t>\n\t\t\t\t\t\t\t\t\t<span data-text=\"Contact us for more information \" class=\"btn-txt\" data-transition-delay=\"true\" data-delay-options=\"{&quot;elements&quot;: &quot;.lqd-chars&quot;, &quot;delayType&quot;: &quot;animation&quot;, &quot;startDelay&quot;: 0, &quot;delayBetween&quot;: 32.5}\" data-split-text=\"true\" data-split-options=\"{&quot;type&quot;: &quot;chars, words&quot;}\">\n\t\t\t\t\t\tContact us for more information \t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"btn-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-round-forward\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CYBERSECURITY The method that protects every level of your IT infrastructure Cybersecurity is an integrated approach that permeates every level of the IT infrastructure: from the network to the servers, the devices and the users. At NEXQ, we don&#8217;t just offer consultancy, we actually design and implement custom security solutions, suited to the specific operational [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2225","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.nexq.it\/en\/wp-json\/wp\/v2\/pages\/2225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nexq.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nexq.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nexq.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nexq.it\/en\/wp-json\/wp\/v2\/comments?post=2225"}],"version-history":[{"count":0,"href":"https:\/\/www.nexq.it\/en\/wp-json\/wp\/v2\/pages\/2225\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.nexq.it\/en\/wp-json\/wp\/v2\/media?parent=2225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}