{"id":2926,"date":"2022-09-10T12:00:00","date_gmt":"2022-09-10T12:00:00","guid":{"rendered":"https:\/\/www.hostrw.com\/kp\/?p=2926"},"modified":"2022-09-10T13:24:26","modified_gmt":"2022-09-10T11:24:26","slug":"6-important-it-policies-any-size-company-should-implement","status":"publish","type":"post","link":"https:\/\/www.hostrw.com\/kp\/en\/6-important-it-policies-any-size-company-should-implement\/","title":{"rendered":"6 Important IT Policies Any Size Company Should Implement"},"content":{"rendered":"<p>Many small businesses make the mistake of skipping policies. They feel that things don\u2019t need to be so formal. They\u2019ll just tell staff what\u2019s expected when it comes up and think that\u2019s good enough.<\/p><p>But this way of thinking can cause issues for small and mid-sized business owners. Employees aren\u2019t mind readers. Things that you think are obvious, might not be to them.<\/p><p>Not having policies can also leave you in poor legal standing should a problem occur. Such as a lawsuit due to misuse of a company device or email account.<\/p><p>Did you know that <a href=\"https:\/\/www.digitalinformationworld.com\/2018\/09\/problems-social-media-workplace.html\" target=\"_blank\" rel=\"noreferrer noopener\">77% of<\/a> employees access their social media accounts while at work? Further, 19% of them average 1 full working hour a day spent on social media. In some cases, employees are ignoring a company policy. But in others, there is no specific policy for them to follow.<\/p><p>IT policies are an important part of your IT security and technology management. So, no matter what size your business is, you should have them. We\u2019ll get you started with some of the most important IT policies your company should have in place.<\/p><h2 class=\"wp-block-heading\">Do You Have These IT Policies? (If Not, You Should)<\/h2><p><\/p><h3 class=\"wp-block-heading\">Password Security Policy<\/h3><p>About <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2020-data-breach-investigations-report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">77% of<\/a> all cloud data breaches originate from compromised passwords. Compromised credentials are also now the number one cause of data breaches globally.<\/p><p>A password security policy will lay out for your team how to handle their login passwords. It should include things like:<\/p><ul class=\"wp-block-list\"><li>How long passwords should be<\/li><li>How to construct passwords (e.g., using at least one number and symbol)<\/li><li>Where and how to store passwords<\/li><li>The use of multi-factor authentication (if it\u2019s required)<\/li><li>How often to change passwords<\/li><\/ul><h3 class=\"wp-block-heading\">Acceptable Use Policy (AUP)<\/h3><p>The Acceptable Use Policy is an overarching policy. It includes how to properly use technology and data in your organization. This policy will govern things like device security. For example, you may need employees to keep devices updated. If this is the case, You should include that in this policy.<\/p><p>Another thing to include in your AUP would be where it is acceptable to use company devices. You may also restrict remote employees from sharing work devices with family members.<\/p><p>Data is another area of the AUP. It should dictate how to store and handle data. The policy might require an encrypted environment for security.<\/p><h3 class=\"wp-block-heading\">Cloud &amp; App Use Policy<\/h3><p>The use of unauthorized cloud applications by employees has become a big problem. It\u2019s estimated that the use of this \u201cshadow IT\u201d ranges from <a href=\"https:\/\/www.cloudcodes.com\/blog\/what-is-shadow-it-and-its-impacts.html\" target=\"_blank\" rel=\"noreferrer noopener\">30% to 60%<\/a> of a company\u2019s cloud use.<\/p><p>Often, employees use cloud apps on their own because they don\u2019t know any better. They don\u2019t realize that using unapproved cloud tools for company data is a major security risk.<\/p><p>A cloud and app use policy will tell employees what cloud and mobile apps are okay to use for business data. It should restrict the use of unapproved applications. It should also provide a way to suggest apps that would enhance productivity.<\/p><h3 class=\"wp-block-heading\">Bring Your Own Device (BYOD) Policy<\/h3><p>Approximately <a href=\"https:\/\/www.zippia.com\/advice\/byod-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">83% of<\/a> companies use a BYOD approach for employee mobile use. Allowing employees to use their own smartphones for work saves companies money. It can also be more convenient for employees because they don\u2019t need to carry around a second device.<\/p><p>But if you don\u2019t have a policy that dictates the use of BYOD, there can be security and other issues. Employee devices may be vulnerable to attack if the operating system isn\u2019t updated. There can also be confusion about compensation for the use of personal devices at work.<\/p><p>The BYOD policy clarifies the use of employee devices for business. Including the required security of those devices. It may also note the required installation of an endpoint management app. It should also cover compensation for business use of personal devices.<\/p><h3 class=\"wp-block-heading\">Wi-Fi Use Policy<\/h3><p>Public Wi-Fi is an issue when it comes to cybersecurity. <a href=\"https:\/\/www.inc.com\/neill-feather\/how-to-protect-your-remote-employees-from-cyber-threats.html\" target=\"_blank\" rel=\"noreferrer noopener\">61% of<\/a> surveyed companies say employees connect to public Wi-Fi from company-owned devices.<\/p><p>Many employees won\u2019t think twice about logging in to a company app or email account. Even when on a public internet connection. This could expose those credentials and lead to a breach of your company network.<\/p><p>Your Wi-Fi use policy will explain how employees are to ensure they have safe connections. It may dictate the use of a company VPN. Your policy may also restrict the activities employees can do when on public Wi-Fi. Such as not entering passwords or payment card details into a form.<\/p><h3 class=\"wp-block-heading\">Social Media Use Policy<\/h3><p>With social media use at work so common, it\u2019s important to address it. Otherwise, endless scrolling and posting could steal hours of productivity every week.<\/p><p>Include details in your social media policy, such as:<\/p><ul class=\"wp-block-list\"><li>Restricting when employees can access personal social media<\/li><li>Restricting what employees can post about the company<\/li><li>Noting \u201csafe selfie zones\u201d or facility areas that are not okay for public images<\/li><\/ul><h2 class=\"wp-block-heading\">Get Help Improving Your IT Policy Documentation &amp; Security<\/h2><p>We can help your organization address IT policy deficiencies and security issues. Reach out today to schedule a consultation to get started.<\/p><p><\/p><p>&#8212;<br><a href=\"https:\/\/unsplash.com\/photos\/5fNmWej4tAA\" target=\"_blank\" rel=\"noreferrer noopener\">Featured Image Credit<\/a><\/p><p>This Article has been Republished with Permission from <a rel=\"canonical noopener noreferrer\" href=\"https:\/\/thetechnologypress.com\/6-important-it-policies-any-size-company-should-implement\/\" title=\"6 Important IT Policies Any Size Company Should Implement\" target=\"_blank\">The Technology Press.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Many small businesses make the mistake of skipping policies. They feel that things don\u2019t need to be so formal. They\u2019ll just tell staff what\u2019s expected when it comes up and think that\u2019s good enough.But this way of thinking can cause issues for small and mid-sized business owners. Employees aren\u2019t mind readers. Things that you think &#8230;<\/p>\n","protected":false},"author":1,"featured_media":2927,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[78],"tags":[],"class_list":["post-2926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Important IT Policies Any Size Company Should Implement - HostRW Computer Service<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Important IT Policies Any Size Company Should Implement - HostRW Computer Service\" \/>\n<meta property=\"og:description\" content=\"Many small businesses make the mistake of skipping policies. They feel that things don\u2019t need to be so formal. They\u2019ll just tell staff what\u2019s expected when it comes up and think that\u2019s good enough.But this way of thinking can cause issues for small and mid-sized business owners. Employees aren\u2019t mind readers. Things that you think ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/\" \/>\n<meta property=\"og:site_name\" content=\"HostRW Computer Service\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-10T12:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/08\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roelof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hostrw\" \/>\n<meta name=\"twitter:site\" content=\"@hostrw\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roelof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/\"},\"author\":{\"name\":\"Roelof\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\"},\"headline\":\"6 Important IT Policies Any Size Company Should Implement\",\"datePublished\":\"2022-09-10T12:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/\"},\"wordCount\":878,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg\",\"articleSection\":[\"IT Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/\",\"name\":\"6 Important IT Policies Any Size Company Should Implement - HostRW Computer Service\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg\",\"datePublished\":\"2022-09-10T12:00:00+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-important-it-policies-any-size-company-should-implement\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg\",\"width\":2560,\"height\":1709,\"caption\":\"person holding pencil near laptop computer\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"name\":\"HostRW Computer Service\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\",\"name\":\"HostRW Computer Service\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"width\":189,\"height\":57,\"caption\":\"HostRW Computer Service\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/hostrw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\",\"name\":\"Roelof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"caption\":\"Roelof\"},\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/author\\\/roelof\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Important IT Policies Any Size Company Should Implement - HostRW Computer Service","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/","og_locale":"en_US","og_type":"article","og_title":"6 Important IT Policies Any Size Company Should Implement - HostRW Computer Service","og_description":"Many small businesses make the mistake of skipping policies. They feel that things don\u2019t need to be so formal. They\u2019ll just tell staff what\u2019s expected when it comes up and think that\u2019s good enough.But this way of thinking can cause issues for small and mid-sized business owners. Employees aren\u2019t mind readers. Things that you think ...","og_url":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/","og_site_name":"HostRW Computer Service","article_published_time":"2022-09-10T12:00:00+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/08\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg","type":"image\/jpeg"}],"author":"Roelof","twitter_card":"summary_large_image","twitter_creator":"@hostrw","twitter_site":"@hostrw","twitter_misc":{"Written by":"Roelof","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/#article","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/"},"author":{"name":"Roelof","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc"},"headline":"6 Important IT Policies Any Size Company Should Implement","datePublished":"2022-09-10T12:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/"},"wordCount":878,"publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/08\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg","articleSection":["IT Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/","url":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/","name":"6 Important IT Policies Any Size Company Should Implement - HostRW Computer Service","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/#primaryimage"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/08\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg","datePublished":"2022-09-10T12:00:00+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostrw.com\/kp\/6-important-it-policies-any-size-company-should-implement\/#primaryimage","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/08\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/08\/TTT_6-Important-IT-Policies-Any-Size-Company-Should-Implement-Featured-Image-scaled-1.jpg","width":2560,"height":1709,"caption":"person holding pencil near laptop computer"},{"@type":"WebSite","@id":"https:\/\/www.hostrw.com\/kp\/en\/#website","url":"https:\/\/www.hostrw.com\/kp\/en\/","name":"HostRW Computer Service","description":"","publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostrw.com\/kp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization","name":"HostRW Computer Service","url":"https:\/\/www.hostrw.com\/kp\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","width":189,"height":57,"caption":"HostRW Computer Service"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/hostrw"]},{"@type":"Person","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc","name":"Roelof","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","caption":"Roelof"},"url":"https:\/\/www.hostrw.com\/kp\/en\/author\/roelof\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/posts\/2926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/comments?post=2926"}],"version-history":[{"count":1,"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/posts\/2926\/revisions"}],"predecessor-version":[{"id":2928,"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/posts\/2926\/revisions\/2928"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/media\/2927"}],"wp:attachment":[{"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/media?parent=2926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/categories?post=2926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/en\/wp-json\/wp\/v2\/tags?post=2926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}