{"id":21,"count":67,"description":"Sensitive corporate data, including in SAP systems, is an attractive target for hackers.  How can companies protect themselves most effectively against the latest methods used by cybercriminals?","link":"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/opinion\/it-security\/","name":"IT Security Column","slug":"it-security","taxonomy":"category","parent":7,"meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/taxonomies\/category"}],"up":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories\/7"}],"wp:post_type":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts?categories=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}