{"id":23508,"date":"2022-10-18T10:17:31","date_gmt":"2022-10-18T08:17:31","guid":{"rendered":"https:\/\/datanets.ro\/5-steps-to-proactively-address-security-breaches\/"},"modified":"2022-10-21T08:52:08","modified_gmt":"2022-10-21T06:52:08","slug":"5-steps-to-proactively-address-security-breaches","status":"publish","type":"post","link":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/","title":{"rendered":"5 steps to proactively address security breaches"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Businesses are constantly looking for new security strategies to keep under control the growing volume of cyber threats as well as the security challenges posed by the adoption of remote working. The practical approach presented by Murat Kaymaz, Managing Director of Cybersecurity Soitron Group, at the <a href=\"https:\/\/www.cioconference.ro\/\">CIO Council 2022<\/a>\u00a0annual conference, is accessible to any organization, regardless of its size, and can ensure end-to-end protection, even at the end-user level. <\/strong><\/p>\n<p style=\"text-align: justify;\">Every day, in Romania, there are detected between 500,000 and 800,000 cybersecurity events, representing 15-18% of the total volume of real threats faced by local organizations (*). The high frequency of computer attacks puts companies in difficulty, the security challenges being amplified by the extensive adoption of remote work and Cloud services, as well as the acceleration of the digital transformation of business processes.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-23499 size-full\" title=\"breselor de securitate\" src=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference.png\" alt=\"\" width=\"1278\" height=\"719\" srcset=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference.png 1278w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference-300x169.png 300w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference-1024x576.png 1024w, https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference-768x432.png 768w\" sizes=\"(max-width: 1278px) 100vw, 1278px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">All these changes at the business level increase the companies\u2019 needs for IT security, as by moving end-users, equipment, and applications outside the network, the security perimeter model becomes ineffective, expanding the attack surface and giving attackers more chances to exploit emerging vulnerabilities.<\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><em>\u201eIt is obvious that any security manager likes to think that their company&#8217;s infrastructure is secure and protected. However, we recommend another approach, by which we proactively assume the existence of security breaches. If we admit their existence from the start, it is easier to go through the necessary steps to find and eliminate the breaches, making us better prepared against the vulnerabilities that will inevitably arise\u201c<\/em>, explained <strong>Murat Kaymaz, Managing Director of Cybersecurity Soitron Group<\/strong>.<\/p>\n<\/blockquote>\n<h2 style=\"text-align: justify;\"><strong>Security breaches protection measures<\/strong><\/h2>\n<p style=\"text-align: justify;\">The recommended approach by the Soitron Group specialist is based on five practical protection measures, which can be applied by any company, regardless of size or field of activity:<\/p>\n<p style=\"text-align: justify;\"><strong>1 \u2013 Discover and inventory all the components that make up the company&#8217;s digital infrastructure.<\/strong> &#8220;Inventory&#8221; should include not only the equipment and applications used by a company but also its end-users. It&#8217;s important to know in real-time all users, applications, and devices accessing your organization&#8217;s resources.<\/p>\n<p style=\"text-align: justify;\"><strong>2 \u2013 Protect the identity of end-users and the applications they use. <\/strong>More and more employees are opting to work remotely, making it increasingly difficult to establish and verify their identities. However, the identity of the end-users has become the new security perimeter of the organizations, and the applications &#8211; which are no longer run inside the on-premises networks &#8211; represent the new network that must be protected.<\/p>\n<p style=\"text-align: justify;\"><strong>3 \u2013 Prevent attacks and limit the extent of damage by segmenting your infrastructure. <\/strong>The larger the attack surface, the more difficult it is to protect it. By segmenting into subnets, the effort becomes lower, and if attackers manage to get past the protection systems, the damage is limited, eliminating the risk of compromising other resources through lateral movement.<\/p>\n<p style=\"text-align: justify;\"><strong>4 \u2013 Invest in advanced threat detection. <\/strong>Businesses need security systems that can collect, correlate and analyze contextual data from multiple sources to detect attack indicators in real-time. But invest not only in solutions but also in creating security policies that allow you to quickly identify risks from end-users.<\/p>\n<p style=\"text-align: justify;\"><strong>5 \u2013 Continuously monitor your network, applications, equipment, and end-users.<\/strong> Constant monitoring is an essential condition for organizations to be able to respond as quickly and effectively as possible to threats and attacks<span style=\"font-size: 16px;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Identifying the necessary solutions, a difficult choice<\/strong><\/h2>\n<p style=\"text-align: justify;\">The responsibility for applying and following all these steps rests with the IT department, but it is the security officer\u2019s responsibility to select from the tens of hundres of cybersecurity products offered by more than 1,500 vendors. These days, the global market for security solutions is highly fragmented and diversified, and choosing the right solution is a challenge, as it requires time, effort, skills, and experience in this niche field.<\/p>\n<p style=\"text-align: justify;\">The challenge is worsened by the limited available labor market resources which have been experiencing a chronic shortage <a href=\"https:\/\/datanets.ro\/tehnologii-si-solutii-it\/\">cybersecurity <\/a>professionals for several years. High salary costs with specialists in the field create a budget problem for many companies, which have real difficulties in finding the necessary funds to hire the professionals they need but also to purchase the necessary security solutions. In most cases, the IT security budgets allocated within organizations are insufficient, which leads to repeated delays and postponements of projects, thus generating a further increase in the level of risk.<\/p>\n<p style=\"text-align: justify;\">IT departments can reach out to services provided by security solution vendors, but each manufacturer&#8217;s expertise is focused on covering a limited area of a company&#8217;s needs. This creates a new challenge for security managers in organizations \u2013 to bring together all the solutions they have and make them work together, coherently, to ensure the protection of the entire organization.<\/p>\n<blockquote><p><em>\u201eWithin the Soitron group, we have a team of over 50 security specialists who can help you overcome these challenges. We start all the projects by carrying out a consultation and design phase that gives our customers the guarantee that the solutions we propose meet their needs, allow them to capitalize on already purchased security solutions, and meet compliance requirements. This is also facilitated by our system integrator capabilities, as well as our accumulated multi-vendor skills \u2013 we offer a broad portfolio of solutions through which we can cover customer needs. We also provide operational security support services to help our customers develop and manage their security infrastructures. Through our Security Operation Center services, we ensure monitoring and response to incidents 24\/7\/365. We offer all this range of services also in Romania through Datanet Systems company, which has its own local team of specialists, and which, in order to better meet the needs of customers, can access the resources available in the other countries within the Soitron group\u201c<\/em>, mentioned <strong>Murat Kaymaz, Managing Director of Cybersecurity Soitron Group.<\/strong><\/p><\/blockquote>\n<p style=\"text-align: justify;\">For more details about the practical security approach proposed by the Soitron Group specialist, you can watch the CIO Council 2022 Conference presentation (below) and\/or contact us at <a href=\"mailto:sales@datanets.ro\">sales@datanets.ro<\/a>.<\/p>\n<div class=\"ast-oembed-container\"><iframe title=\"Murat Kaymaz | Reconsidering Cybersecurity Plan as Breaches Become Inevitable\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/vpxu849mEcY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p style=\"text-align: justify;\">______________________<\/p>\n<p style=\"text-align: justify;\"><em>* According to the National Cyber Security Directorate<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About security breaches protection measures at CIO Council National Conference!<\/p>\n","protected":false},"author":9,"featured_media":23500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[37],"tags":[250,248,165],"class_list":["post-23508","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lastest-news","tag-automation-en","tag-cybersecurity-en-2","tag-efficiency"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 steps to proactively address security breaches<\/title>\n<meta name=\"description\" content=\"Soitron presentation at CIO Council National Conference: 5 steps to proactively address security breaches\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 steps to proactively address security breaches\" \/>\n<meta property=\"og:description\" content=\"5 steps to proactively address security breaches\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Datanet Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-18T08:17:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-21T06:52:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1278\" \/>\n\t<meta property=\"og:image:height\" content=\"719\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vasile Gabriel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vasile Gabriel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/\"},\"author\":{\"name\":\"Vasile Gabriel\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\"},\"headline\":\"5 steps to proactively address security breaches\",\"datePublished\":\"2022-10-18T08:17:31+00:00\",\"dateModified\":\"2022-10-21T06:52:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/\"},\"wordCount\":987,\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CIO-Conference.png\",\"keywords\":[\"Automation\",\"Cybersecurity\",\"Efficiency\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/\",\"name\":\"5 steps to proactively address security breaches\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CIO-Conference.png\",\"datePublished\":\"2022-10-18T08:17:31+00:00\",\"dateModified\":\"2022-10-21T06:52:08+00:00\",\"description\":\"Soitron presentation at CIO Council National Conference: 5 steps to proactively address security breaches\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CIO-Conference.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/CIO-Conference.png\",\"width\":1278,\"height\":719},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/en\\\/5-steps-to-proactively-address-security-breaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Datanet\",\"item\":\"https:\\\/\\\/datanets.ro\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NOUT\u0102\u021aI \u0218I EVENIMENTE\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u0218tiri \u0219i nout\u0103\u021bi\",\"item\":\"https:\\\/\\\/datanets.ro\\\/categorie\\\/toate-articolele\\\/stiri-si-noutati\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"5 steps to proactively address security breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#website\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"name\":\"Datanet Systems\",\"description\":\"datanets.ro\",\"publisher\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datanets.ro\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#organization\",\"name\":\"Datanet Systems\",\"url\":\"https:\\\/\\\/datanets.ro\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"contentUrl\":\"https:\\\/\\\/datanets.ro\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Logo-DNS-yoast.png\",\"width\":329,\"height\":370,\"caption\":\"Datanet Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Datanet-Systems-185156648181921\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/68182\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCD23bHjSjNTgqZve9Lcdfzw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datanets.ro\\\/#\\\/schema\\\/person\\\/ff8243187e95c6f9b6e95ca18f9e636b\",\"name\":\"Vasile Gabriel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g\",\"caption\":\"Vasile Gabriel\"},\"sameAs\":[\"https:\\\/\\\/datanets.ro\"],\"url\":\"https:\\\/\\\/datanets.ro\\\/en\\\/author\\\/gabrielv\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 steps to proactively address security breaches","description":"Soitron presentation at CIO Council National Conference: 5 steps to proactively address security breaches","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/","og_locale":"en_US","og_type":"article","og_title":"5 steps to proactively address security breaches","og_description":"5 steps to proactively address security breaches","og_url":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/","og_site_name":"Datanet Systems","article_publisher":"https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","article_published_time":"2022-10-18T08:17:31+00:00","article_modified_time":"2022-10-21T06:52:08+00:00","og_image":[{"width":1278,"height":719,"url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference.png","type":"image\/png"}],"author":"Vasile Gabriel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vasile Gabriel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/#article","isPartOf":{"@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/"},"author":{"name":"Vasile Gabriel","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b"},"headline":"5 steps to proactively address security breaches","datePublished":"2022-10-18T08:17:31+00:00","dateModified":"2022-10-21T06:52:08+00:00","mainEntityOfPage":{"@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/"},"wordCount":987,"publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"image":{"@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference.png","keywords":["Automation","Cybersecurity","Efficiency"],"articleSection":["Latest News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/","url":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/","name":"5 steps to proactively address security breaches","isPartOf":{"@id":"https:\/\/datanets.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/#primaryimage"},"image":{"@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference.png","datePublished":"2022-10-18T08:17:31+00:00","dateModified":"2022-10-21T06:52:08+00:00","description":"Soitron presentation at CIO Council National Conference: 5 steps to proactively address security breaches","breadcrumb":{"@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/#primaryimage","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2022\/10\/CIO-Conference.png","width":1278,"height":719},{"@type":"BreadcrumbList","@id":"https:\/\/datanets.ro\/en\/5-steps-to-proactively-address-security-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Datanet","item":"https:\/\/datanets.ro\/en\/"},{"@type":"ListItem","position":2,"name":"NOUT\u0102\u021aI \u0218I EVENIMENTE","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/"},{"@type":"ListItem","position":3,"name":"\u0218tiri \u0219i nout\u0103\u021bi","item":"https:\/\/datanets.ro\/categorie\/toate-articolele\/stiri-si-noutati\/"},{"@type":"ListItem","position":4,"name":"5 steps to proactively address security breaches"}]},{"@type":"WebSite","@id":"https:\/\/datanets.ro\/#website","url":"https:\/\/datanets.ro\/","name":"Datanet Systems","description":"datanets.ro","publisher":{"@id":"https:\/\/datanets.ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datanets.ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datanets.ro\/#organization","name":"Datanet Systems","url":"https:\/\/datanets.ro\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/","url":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","contentUrl":"https:\/\/datanets.ro\/wp-content\/uploads\/2020\/04\/Logo-DNS-yoast.png","width":329,"height":370,"caption":"Datanet Systems"},"image":{"@id":"https:\/\/datanets.ro\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Datanet-Systems-185156648181921","https:\/\/www.linkedin.com\/company\/68182","https:\/\/www.youtube.com\/channel\/UCD23bHjSjNTgqZve9Lcdfzw"]},{"@type":"Person","@id":"https:\/\/datanets.ro\/#\/schema\/person\/ff8243187e95c6f9b6e95ca18f9e636b","name":"Vasile Gabriel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/96b5a2985123c6a7efcd82b980772884cf57634a6543126d3374bda4d8dbc887?s=96&d=mm&r=g","caption":"Vasile Gabriel"},"sameAs":["https:\/\/datanets.ro"],"url":"https:\/\/datanets.ro\/en\/author\/gabrielv\/"}]}},"modified_by":"Diana Zaharia","_links":{"self":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/comments?post=23508"}],"version-history":[{"count":5,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23508\/revisions"}],"predecessor-version":[{"id":23529,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/posts\/23508\/revisions\/23529"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media\/23500"}],"wp:attachment":[{"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/media?parent=23508"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/categories?post=23508"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datanets.ro\/en\/wp-json\/wp\/v2\/tags?post=23508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}