{"id":83895,"date":"2023-07-13T19:45:44","date_gmt":"2023-07-13T11:45:44","guid":{"rendered":"https:\/\/dev.flydesk.com\/?p=83895"},"modified":"2023-07-14T01:17:43","modified_gmt":"2023-07-13T17:17:43","slug":"remote-work-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/dev.flydesk.com\/pl\/insights\/remote-work-and-cybersecurity\/","title":{"rendered":"Praca zdalna i cyberbezpiecze\u0144stwo"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"  >Pojawienie si\u0119 pracy zdalnej zrewolucjonizowa\u0142o spos\u00f3b, w jaki pracujemy, oferuj\u0105c elastyczno\u015b\u0107, zwi\u0119kszon\u0105 produktywno\u015b\u0107 i lepsz\u0105 r\u00f3wnowag\u0119 mi\u0119dzy \u017cyciem zawodowym a prywatnym. Jednak ta zmiana przynios\u0142a r\u00f3wnie\u017c nowe wyzwania, szczeg\u00f3lnie w dziedzinie cyberbezpiecze\u0144stwa. Gdy organizacje dostosowuj\u0105 si\u0119 do rozproszonego \u015brodowiska pracy, kluczowe staje si\u0119 wdro\u017cenie solidnych \u015brodk\u00f3w w celu ochrony wra\u017cliwych danych i ochrony przed potencjalnymi zagro\u017ceniami cybernetycznymi. W tym artykule zbadano znaczenie bezpiecze\u0144stwa cybernetycznego w ustawieniach pracy zdalnej i podano podstawowe wskaz\u00f3wki, aby zapewni\u0107 bezpiecze\u0144stwo <a href=\"https:\/\/dev.flydesk.com\/pl\/app\/\" target=\"_blank\" rel=\"noopener\">\u015brodowisko pracy zdalnej<\/a>.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Rozpoznawanie zagro\u017ce\u0144 zwi\u0105zanych z prac\u0105 zdaln\u0105<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Praca zdalna wprowadza szereg unikalnych zagro\u017ce\u0144, z kt\u00f3rymi organizacje musz\u0105 si\u0119 upora\u0107, aby zachowa\u0107 solidne cyberbezpiecze\u0144stwo. Ryzyka te obejmuj\u0105:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\" >\u00a0 \u00a0 \u00a0 \u00a0 1. Luki w sieci domowej<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" >Sieci domowe mog\u0105 nie mie\u0107 takiego samego poziomu bezpiecze\u0144stwa jak sieci biurowe, co czyni je bardziej podatnymi na ataki.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a02. Bezpiecze\u0144stwo punktu ko\u0144cowego<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" >Rozprzestrzenianie si\u0119 urz\u0105dze\u0144 osobistych u\u017cywanych do pracy zdalnej zwi\u0119ksza potencjalne naruszenia bezpiecze\u0144stwa, je\u015bli urz\u0105dzenia nie s\u0105 odpowiednio chronione.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\" >\u00a0 \u00a0 \u00a0 3. Phishing i in\u017cynieria spo\u0142eczna<\/span><\/h3>\n<p><span style=\"font-weight: 400;\"  >Pracownicy zdalni mog\u0105 by\u0107 bardziej nara\u017ceni na ataki phishingowe i oszustwa socjotechniczne ze wzgl\u0119du na brak osobistych kontroli bezpiecze\u0144stwa.<\/span><\/p>\n<p><img decoding=\"async\"   class=\"alignnone size-large wp-image-83899\"   src=\"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:1024\/h:683\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/jefferson-santos-9SoCnyQmkzI-unsplash.jpg\"   alt=\"\"   width=\"1024\"   height=\"683\" \/><\/p>\n<h2><span style=\"font-weight: 400;\" >Wdra\u017canie najlepszych praktyk w zakresie cyberbezpiecze\u0144stwa pracy zdalnej<\/span><\/h2>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a01. Silne has\u0142a i uwierzytelnianie wielosk\u0142adnikowe (MFA)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" > Zach\u0119caj pracownik\u00f3w do u\u017cywania silnych, unikatowych hase\u0142 i umo\u017cliwiaj MFA dodanie dodatkowej warstwy ochrony.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a02. Bezpieczny dost\u0119p zdalny<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" >Upewnij si\u0119, \u017ce pracownicy zdalni korzystaj\u0105 z bezpiecznych <a href=\"https:\/\/dev.flydesk.com\/pl\/insights\/best-vpn-for-remote-teams\/\" target=\"_blank\" rel=\"noopener\">wirtualne sieci prywatne<\/a> (VPN) podczas uzyskiwania dost\u0119pu do zasob\u00f3w firmy w celu szyfrowania transmisji danych i ochrony przed nieautoryzowanym dost\u0119pem.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\" >\u00a0 \u00a0 \u00a0 \u00a03. Regularne aktualizacje oprogramowania<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" > Trzyma\u0107 <a href=\"https:\/\/dev.flydesk.com\/pl\/insights\/tool-guide-to-communications-for-remote-teams\/\"   target=\"_blank\"   rel=\"noopener\">ca\u0142e oprogramowanie<\/a>, w tym systemy operacyjne, aplikacje i narz\u0119dzia bezpiecze\u0144stwa, aktualne w celu ograniczenia luk w zabezpieczeniach i wykorzystania zagro\u017ce\u0144.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a04. Bezpiecze\u0144stwo punktu ko\u0144cowego<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" >Wdra\u017caj kompleksowe oprogramowanie zabezpieczaj\u0105ce, w tym zapory ogniowe, oprogramowanie antywirusowe i rozwi\u0105zania chroni\u0105ce przed z\u0142o\u015bliwym oprogramowaniem, na wszystkich urz\u0105dzeniach do pracy zdalnej.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\" >\u00a0 \u00a0 \u00a0 \u00a05. Szyfrowanie danych i bezpieczne udost\u0119pnianie plik\u00f3w<\/span><\/h3>\n<p><span style=\"font-weight: 400;\"> Zach\u0119caj do korzystania z narz\u0119dzi szyfruj\u0105cych w celu zabezpieczenia poufnych danych zar\u00f3wno w stanie spoczynku, jak i podczas przesy\u0142ania. Zaimplementuj bezpieczne rozwi\u0105zania do udost\u0119pniania plik\u00f3w z kontrol\u0105 dost\u0119pu, aby zapobiec nieautoryzowanemu udost\u0119pnianiu.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 6. Szkolenie w zakresie \u015bwiadomo\u015bci bezpiecze\u0144stwa<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Zapewnij pracownikom zdalnym regularne szkolenia w zakresie identyfikowania i unikania typowych cyberzagro\u017ce\u0144, takich jak wiadomo\u015bci e-mail typu phishing, podejrzane strony internetowe i z\u0142o\u015bliwe pliki do pobrania.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Ustanawianie zasad i wytycznych dotycz\u0105cych pracy zdalnej<\/span><\/h2>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 1. Zasady dopuszczalnego u\u017cytkowania<\/span><\/h3>\n<p><span style=\"font-weight: 400;\" >Rozwija\u0107 <a href=\"https:\/\/www.timedoctor.com\/blog\/computer-usage-policy\/\"   target=\"_blank\"   rel=\"noopener nofollow\">jasne wytyczne<\/a> w sprawie korzystania z firmowych urz\u0105dze\u0144, sieci i zasob\u00f3w podczas pracy zdalnej. Zdefiniuj dopuszczalne i zabronione dzia\u0142ania, aby upewni\u0107 si\u0119, \u017ce pracownicy rozumiej\u0105 swoje obowi\u0105zki.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\" >\u00a0 \u00a0 \u00a0 2. Reagowanie na incydenty i zg\u0142aszanie<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Ustan\u00f3w protoko\u0142y zg\u0142aszania incydent\u00f3w zwi\u0105zanych z bezpiecze\u0144stwem, takich jak naruszenia danych lub podejrzane dzia\u0142ania, oraz opisz kroki, kt\u00f3re pracownicy powinni wykona\u0107.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\" >\u00a0 \u00a0 \u00a0 3. Bezpieczne kana\u0142y komunikacji<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Zach\u0119caj do korzystania z szyfrowanych narz\u0119dzi komunikacyjnych, takich jak wirtualne spotkania i platformy do przesy\u0142ania wiadomo\u015bci, w celu ochrony poufnych rozm\u00f3w i udost\u0119pniania danych.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a04. Kopia zapasowa danych i Recovery<\/span><\/h3>\n<p><span style=\"font-weight: 400;\"  >Podkre\u015bl znaczenie regularnych kopii zapasowych danych i ustal protoko\u0142y dla pracownik\u00f3w zdalnych w celu bezpiecznego przechowywania i pobierania plik\u00f3w kopii zapasowych.<\/span><\/p>\n<h2><img decoding=\"async\"   class=\"alignnone size-full wp-image-83900\"   src=\"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/article-cybersecurity-and-protecting-yourself-when-remote.jpg\"   alt=\"\"   width=\"1024\"   height=\"576\" \/><span style=\"font-weight: 400;\">Regularne audyty i oceny bezpiecze\u0144stwa<\/span><\/h2>\n<p><span style=\"font-weight: 400;\" >Przeprowadzaj regularne audyty i oceny bezpiecze\u0144stwa, aby zidentyfikowa\u0107 s\u0142abe punkty i luki w \u015brodkach bezpiecze\u0144stwa pracy zdalnej. Oceny te mog\u0105 pom\u00f3c organizacjom w proaktywnym reagowaniu na pojawiaj\u0105ce si\u0119 zagro\u017cenia i wprowadzaniu niezb\u0119dnych dostosowa\u0144 w celu zwi\u0119kszenia cyberbezpiecze\u0144stwa.<\/span><\/p>\n<p><span style=\"font-weight: 400;\" >Praca zdalna oferuje wiele korzy\u015bci, ale wprowadza r\u00f3wnie\u017c nowe wyzwania w zakresie bezpiecze\u0144stwa cybernetycznego, kt\u00f3rym organizacje musz\u0105 stawi\u0107 czo\u0142a. Wdra\u017caj\u0105c solidne ramy bezpiecze\u0144stwa cybernetycznego, organizacje mog\u0105 chroni\u0107 wra\u017cliwe dane, ogranicza\u0107 ryzyko i zapewnia\u0107 bezpieczne \u015brodowisko pracy zdalnej. Wymaga po\u0142\u0105czenia \u015brodk\u00f3w technologicznych, edukacji pracownik\u00f3w i egzekwowania zasad w celu ochrony przed ewoluuj\u0105cymi zagro\u017ceniami cybernetycznymi. Zachowuj\u0105c czujno\u015b\u0107 i proaktywno\u015b\u0107, organizacje mog\u0105 przyj\u0105\u0107 prac\u0119 zdaln\u0105, zachowuj\u0105c jednocze\u015bnie poufno\u015b\u0107, integralno\u015b\u0107 i dost\u0119pno\u015b\u0107 swoich danych i system\u00f3w.<\/span><\/p>\n<p>Z ufno\u015bci\u0105 ogarnij rewolucj\u0119 pracy zdalnej. Odwiedza\u0107 <a href=\"https:\/\/dev.flydesk.com\/pl\/\">FLYDESK<\/a> ju\u017c dzi\u015b i dowiedz si\u0119 wi\u0119cej o naszych bezpiecznych rozwi\u0105zaniach do pracy zdalnej.<\/p>","protected":false},"excerpt":{"rendered":"<p>Pojawienie si\u0119 pracy zdalnej zrewolucjonizowa\u0142o spos\u00f3b, w jaki pracujemy, oferuj\u0105c elastyczno\u015b\u0107, zwi\u0119kszon\u0105 produktywno\u015b\u0107 i lepsz\u0105 r\u00f3wnowag\u0119 mi\u0119dzy \u017cyciem zawodowym a prywatnym. Jednak ta zmiana przynios\u0142a r\u00f3wnie\u017c nowe wyzwania, szczeg\u00f3lnie w dziedzinie cyberbezpiecze\u0144stwa. Gdy organizacje dostosowuj\u0105 si\u0119 do rozproszonego \u015brodowiska pracy, kluczowe staje si\u0119 wdro\u017cenie solidnych \u015brodk\u00f3w w celu ochrony wra\u017cliwych danych i ochrony\u2026<\/p>","protected":false},"author":7,"featured_media":83898,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[50,273,485,370,590,605,609,509,611,607,237,1520,608,610,606],"class_list":["post-83895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","tag-coworking","tag-digital-nomad","tag-flexible-office","tag-flexible-work","tag-flexible-working","tag-happy","tag-healthy","tag-hybrid-work","tag-positive","tag-productive","tag-remote-work","tag-security","tag-wellness","tag-work-life-balance","tag-workplace"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Remote Work and Cybersecurity &mdash; FLYDESK<\/title>\n<meta name=\"description\"  content=\"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.\" \/>\n<meta name=\"robots\"  content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\"  href=\"https:\/\/dev.flydesk.com\/pl\/insights\/remote-work-and-cybersecurity\/\" \/>\n<meta property=\"og:locale\"  content=\"pl_PL\" \/>\n<meta property=\"og:type\"  content=\"article\" \/>\n<meta property=\"og:title\"  content=\"Remote Work and Cybersecurity &mdash; FLYDESK\" \/>\n<meta property=\"og:description\"  content=\"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.\" \/>\n<meta property=\"og:url\"  content=\"https:\/\/dev.flydesk.com\/pl\/insights\/remote-work-and-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"FLYDESK\" \/>\n<meta property=\"article:published_time\"  content=\"2023-07-13T11:45:44+00:00\" \/>\n<meta property=\"article:modified_time\"  content=\"2023-07-13T17:17:43+00:00\" \/>\n<meta property=\"og:image\"  content=\"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\"  content=\"FLYDESK\"  \/>\n\t<meta name=\"twitter:label2\"  content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\"  content=\"3 minuty\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote Work and Cybersecurity &mdash; FLYDESK","description":"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.flydesk.com\/pl\/insights\/remote-work-and-cybersecurity\/","og_locale":"pl_PL","og_type":"article","og_title":"Remote Work and Cybersecurity &mdash; FLYDESK","og_description":"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.","og_url":"https:\/\/dev.flydesk.com\/pl\/insights\/remote-work-and-cybersecurity\/","og_site_name":"FLYDESK","article_published_time":"2023-07-13T11:45:44+00:00","article_modified_time":"2023-07-13T17:17:43+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","path":"\/sites\/flydesk.com\/files\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","size":"full","id":83898,"alt":"","pixels":921600,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Napisane przez":"FLYDESK","Szacowany czas czytania":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/dev.flydesk.com\/#organization","name":"FLYDESK","url":"https:\/\/dev.flydesk.com\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/dev.flydesk.com\/#logo","inLanguage":"pl-PL","url":"","contentUrl":"","caption":"FLYDESK"},"image":{"@id":"https:\/\/dev.flydesk.com\/#logo"}},{"@type":"WebSite","@id":"https:\/\/dev.flydesk.com\/#website","url":"https:\/\/dev.flydesk.com\/","name":"FLYDESK","description":"Fly your work with style","publisher":{"@id":"https:\/\/dev.flydesk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.flydesk.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pl-PL"},{"@type":"ImageObject","@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#primaryimage","inLanguage":"pl-PL","url":"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","contentUrl":"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","width":1280,"height":720,"caption":"Remote Work and Cybersecurity"},{"@type":"WebPage","@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#webpage","url":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/","name":"Remote Work and Cybersecurity &mdash; FLYDESK","isPartOf":{"@id":"https:\/\/dev.flydesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#primaryimage"},"datePublished":"2023-07-13T11:45:44+00:00","dateModified":"2023-07-13T17:17:43+00:00","description":"This article explores the significance of cyber security in remote work and provides how to ensure a secure remote work environment.","breadcrumb":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.flydesk.com\/"},{"@type":"ListItem","position":2,"name":"Remote Work and Cybersecurity"}]},{"@type":"Article","@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#webpage"},"author":{"@id":"https:\/\/dev.flydesk.com\/#\/schema\/person\/298930a0535efd94b35b8dbd19d47dbd"},"headline":"Remote Work and Cybersecurity","datePublished":"2023-07-13T11:45:44+00:00","dateModified":"2023-07-13T17:17:43+00:00","mainEntityOfPage":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#webpage"},"wordCount":574,"commentCount":0,"publisher":{"@id":"https:\/\/dev.flydesk.com\/#organization"},"image":{"@id":"https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/mlgucbjxeu1m.i.optimole.com\/cb:B7VA.3e989\/w:auto\/h:auto\/q:mauto\/ig:avif\/f:best\/https:\/\/dev.flydesk.com\/wp-content\/uploads\/2023\/07\/cybersecurity-remote-work-1280-shutterstock_1202221816-1.jpg","keywords":["Coworking space","Digital nomad","Flexible Office","Flexible work","flexible working","happy","healthy","hybrid work","positive.","productive","Remote work","security","wellness","work-life balance","workplace"],"articleSection":["Management"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dev.flydesk.com\/insights\/remote-work-and-cybersecurity\/#respond"]}]},{"@type":"Person","@id":"https:\/\/dev.flydesk.com\/#\/schema\/person\/298930a0535efd94b35b8dbd19d47dbd","name":"FLYDESK","image":{"@type":"ImageObject","@id":"https:\/\/dev.flydesk.com\/#personlogo","inLanguage":"pl-PL","url":"https:\/\/secure.gravatar.com\/avatar\/5c58c405d216524d5ddef9079bd77ab037f9583c3cd3769a446c306b0dc1f432?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c58c405d216524d5ddef9079bd77ab037f9583c3cd3769a446c306b0dc1f432?s=96&d=mm&r=g","caption":"FLYDESK"}}]}},"_links":{"self":[{"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/posts\/83895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/comments?post=83895"}],"version-history":[{"count":3,"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/posts\/83895\/revisions"}],"predecessor-version":[{"id":83910,"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/posts\/83895\/revisions\/83910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/media\/83898"}],"wp:attachment":[{"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/media?parent=83895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/categories?post=83895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.flydesk.com\/pl\/wp-json\/wp\/v2\/tags?post=83895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}