{"id":2880,"date":"2025-06-13T09:42:54","date_gmt":"2025-06-13T09:42:54","guid":{"rendered":"https:\/\/www.sitoalfa.fbitech.it\/cybersecurity\/"},"modified":"2025-06-18T12:19:22","modified_gmt":"2025-06-18T12:19:22","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/staging.fbitech.it\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2880\" class=\"elementor elementor-2880 elementor-2875\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2641c75 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2641c75\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-311be94d\" data-id=\"311be94d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-617c4c3 elementor-widget elementor-widget-heading\" data-id=\"617c4c3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6db361d5 elementor-widget elementor-widget-text-editor\" data-id=\"6db361d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"et_pb_column et_pb_column_1_2 et_pb_column_2 et_pb_css_mix_blend_mode_passthrough\"><div class=\"et_pb_module et_pb_text et_pb_text_1 et_pb_text_align_left et_pb_bg_layout_light\"><div class=\"et_pb_text_inner\"><p data-start=\"468\" data-end=\"659\">Cyber threats, ransomware attacks, data theft: today no company can consider itself safe. Whether SMEs or large companies, prevention is the only effective approach. <\/p><p data-start=\"661\" data-end=\"838\">FBITECH srl supports you in this path, providing professional <strong data-start=\"739\" data-end=\"790\">vulnerability analysis services and security tests<\/strong> based on reliable and certified technologies.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f28c6 elementor-widget elementor-widget-heading\" data-id=\"b5f28c6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our approach: expertise and tools of excellence<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1986e0 elementor-widget elementor-widget-text-editor\" data-id=\"b1986e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"908\" data-end=\"1177\">To guarantee our clients concrete results, <strong data-start=\"960\" data-end=\"1012\">we rely on the CyLock certified platform<\/strong>, an innovative tool for extended vulnerability assessment (EVA &#8211; Extended Vulnerability Assessment), designed by Italian cyber experts.<\/p><p data-start=\"1179\" data-end=\"1230\">Thanks to this collaboration, we can offer:<\/p><ul data-start=\"1231\" data-end=\"1556\"><li data-start=\"1231\" data-end=\"1332\"><p data-start=\"1233\" data-end=\"1332\"><strong data-start=\"1233\" data-end=\"1265\">Detailed and rapid analysis <\/strong>of vulnerabilities in sites, servers, networks and IT systems;<\/p><\/li><li data-start=\"1333\" data-end=\"1429\"><p data-start=\"1335\" data-end=\"1429\"><strong data-start=\"1335\" data-end=\"1359\">Clear reports<\/strong>, with clear technical guidance and support for corrective actions;<\/p><\/li><li data-start=\"1430\" data-end=\"1556\"><p data-start=\"1432\" data-end=\"1556\"><strong data-start=\"1432\" data-end=\"1469\">Compliance with the main standards<\/strong> (e.g. ISO 27001, GDPR, NIS2), with outputs ready for audits or certification paths.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d08094e elementor-widget elementor-widget-text-editor\" data-id=\"d08094e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CyLock is a solution recognized and used by public bodies, private companies and professionals in the sector: we at FBITECH have chosen to integrate it into our processes to guarantee our customers a high level of reliability, without compromise.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a57e384 elementor-widget elementor-widget-heading\" data-id=\"a57e384\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why choose FBITech<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3cd36c elementor-widget elementor-widget-text-editor\" data-id=\"e3cd36c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u2714 We work with market leading technologies such as CyLock<br data-start=\"2682\" data-end=\"2685\">\u2714 We offer a transparent approach, with clear and action-oriented reports<br data-start=\"2762\" data-end=\"2765\">\u2714 We are reliable partners for small, medium and large companies<br data-start=\"2827\" data-end=\"2830\">\u2714 We provide certified and up-to-date expertise<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d016dbc\" data-id=\"d016dbc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46acda6 core-a11y-full-img-no elementor-widget elementor-widget-image\" data-id=\"46acda6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2025\/06\/cylock.png\" class=\"attachment-large size-large wp-image-2786\" alt=\"\" srcset=\"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2025\/06\/cylock.png 400w, https:\/\/staging.fbitech.it\/wp-content\/uploads\/2025\/06\/cylock-300x300.png 300w, https:\/\/staging.fbitech.it\/wp-content\/uploads\/2025\/06\/cylock-150x150.png 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50d4430 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"50d4430\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d9ca13f\" data-id=\"d9ca13f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e56f8ad elementor-widget elementor-widget-heading\" data-id=\"e56f8ad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contact us for a quote<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f87d08 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7f87d08\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/staging.fbitech.it\/en\/contacts\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Click here<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information security Cyber threats, ransomware attacks, data theft: today no company can consider itself safe. Whether SMEs or large companies, prevention is the only effective approach. FBITECH srl supports you in this path, providing professional vulnerability analysis services and security tests based on reliable and certified technologies. Our approach: expertise and tools of excellence To [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2666,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-2880","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity \u00bb FBITech<\/title>\n<meta name=\"description\" content=\"Servizi di cybersecurity con FBITECH: vulnerability assessment, penetration test e supporto, basati su tecnologia certificata CyLock.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity \u00bb FBITech\" \/>\n<meta property=\"og:description\" content=\"Servizi di cybersecurity con FBITECH: vulnerability assessment, penetration test e supporto, basati su tecnologia certificata CyLock.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.fbitech.it\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Staging\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-18T12:19:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/cropped-file-scaled-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/staging.fbitech.it\/en\/cybersecurity\/\",\"url\":\"https:\/\/staging.fbitech.it\/en\/cybersecurity\/\",\"name\":\"Cybersecurity \u00bb FBITech\",\"isPartOf\":{\"@id\":\"https:\/\/staging.fbitech.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/cropped-file-scaled-1.png\",\"datePublished\":\"2025-06-13T09:42:54+00:00\",\"dateModified\":\"2025-06-18T12:19:22+00:00\",\"description\":\"Servizi di cybersecurity con FBITECH: vulnerability assessment, penetration test e supporto, basati su tecnologia certificata CyLock.\",\"breadcrumb\":{\"@id\":\"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/staging.fbitech.it\/en\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/cropped-file-scaled-1.png\",\"contentUrl\":\"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/cropped-file-scaled-1.png\",\"width\":512,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/staging.fbitech.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/staging.fbitech.it\/en\/#website\",\"url\":\"https:\/\/staging.fbitech.it\/en\/\",\"name\":\"Staging\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/staging.fbitech.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/staging.fbitech.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/staging.fbitech.it\/en\/#organization\",\"name\":\"Staging\",\"url\":\"https:\/\/staging.fbitech.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/staging.fbitech.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/file-scaled.png\",\"contentUrl\":\"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/file-scaled.png\",\"width\":1807,\"height\":2560,\"caption\":\"Staging\"},\"image\":{\"@id\":\"https:\/\/staging.fbitech.it\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity \u00bb FBITech","description":"Servizi di cybersecurity con FBITECH: vulnerability assessment, penetration test e supporto, basati su tecnologia certificata CyLock.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybersecurity \u00bb FBITech","og_description":"Servizi di cybersecurity con FBITECH: vulnerability assessment, penetration test e supporto, basati su tecnologia certificata CyLock.","og_url":"https:\/\/staging.fbitech.it\/en\/cybersecurity\/","og_site_name":"Staging","article_modified_time":"2025-06-18T12:19:22+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/cropped-file-scaled-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.fbitech.it\/en\/cybersecurity\/","url":"https:\/\/staging.fbitech.it\/en\/cybersecurity\/","name":"Cybersecurity \u00bb FBITech","isPartOf":{"@id":"https:\/\/staging.fbitech.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/cropped-file-scaled-1.png","datePublished":"2025-06-13T09:42:54+00:00","dateModified":"2025-06-18T12:19:22+00:00","description":"Servizi di cybersecurity con FBITECH: vulnerability assessment, penetration test e supporto, basati su tecnologia certificata CyLock.","breadcrumb":{"@id":"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.fbitech.it\/en\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#primaryimage","url":"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/cropped-file-scaled-1.png","contentUrl":"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/cropped-file-scaled-1.png","width":512,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/staging.fbitech.it\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.fbitech.it\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/staging.fbitech.it\/en\/#website","url":"https:\/\/staging.fbitech.it\/en\/","name":"Staging","description":"","publisher":{"@id":"https:\/\/staging.fbitech.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.fbitech.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/staging.fbitech.it\/en\/#organization","name":"Staging","url":"https:\/\/staging.fbitech.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/staging.fbitech.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/file-scaled.png","contentUrl":"https:\/\/staging.fbitech.it\/wp-content\/uploads\/2024\/12\/file-scaled.png","width":1807,"height":2560,"caption":"Staging"},"image":{"@id":"https:\/\/staging.fbitech.it\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/staging.fbitech.it\/en\/wp-json\/wp\/v2\/pages\/2880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.fbitech.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.fbitech.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.fbitech.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.fbitech.it\/en\/wp-json\/wp\/v2\/comments?post=2880"}],"version-history":[{"count":6,"href":"https:\/\/staging.fbitech.it\/en\/wp-json\/wp\/v2\/pages\/2880\/revisions"}],"predecessor-version":[{"id":3123,"href":"https:\/\/staging.fbitech.it\/en\/wp-json\/wp\/v2\/pages\/2880\/revisions\/3123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/staging.fbitech.it\/en\/wp-json\/wp\/v2\/media\/2666"}],"wp:attachment":[{"href":"https:\/\/staging.fbitech.it\/en\/wp-json\/wp\/v2\/media?parent=2880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}