{"id":10177,"date":"2025-04-29T16:53:03","date_gmt":"2025-04-29T15:53:03","guid":{"rendered":"https:\/\/amtivo.com\/ie\/?post_type=resources-filter&#038;p=10177"},"modified":"2025-05-13T10:18:44","modified_gmt":"2025-05-13T09:18:44","slug":"what-is-information-security","status":"publish","type":"resources-filter","link":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/","title":{"rendered":"What Is Information Security?"},"content":{"rendered":"<p>Keeping information secure is more important than ever. Even though companies take steps to protect their data, breaches still occur. In 2024, the average global cost of a data breach was <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">$4.88 million<\/a> (\u20ac4.68 million), which is a 10% increase compared to the previous year.<\/p>\r\n<p>Securing sensitive information from cyber threats is essential to maintaining customer trust, ensuring legal compliance, and safeguarding an organisation\u2019s assets.<\/p>\r\n<p>Discover the different aspects of information security and why they must be addressed, what an Information Security Management System is, and how <a href=\"https:\/\/amtivo.com\/ie\/iso-certification\/iso-27001\/\" rel=\"noopener\">ISO 27001<\/a> can help defend against cyber criminals.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>What Is Information Security?<\/h2>\r\n<p>Information security is a crucial part of modern business practices, aimed at protecting data and systems from cyber threats. It involves creating strategies and tactical measures to safeguard sensitive information from unauthorised access, use, sharing, modification or destruction. This helps organisations to keep important data private, accurate, and accessible only to those who need it.<\/p>\r\n<p>The main goal of information security is to maintain the integrity, confidentiality and availability of information. While these principles are essential, information security also involves a variety of actions and protocols, such as:<\/p>\r\n<ul>\r\n\t<li>Setting up firewalls<\/li>\r\n\t<li>Using encryption<\/li>\r\n\t<li>Conducting regular security audits<\/li>\r\n\t<li>Training employees in security best practices<\/li>\r\n<\/ul>\r\n<p>By preventing unauthorised access to sensitive information, organisations can protect themselves and their clients from data breaches and cyber attacks, which can in turn lead to financial losses, reputational damage, and legal issues.<\/p>\r\n<p>Information security also helps businesses to comply with industry standards and regulations, which is vital for building trust with clients and stakeholders.<\/p>\r\n<p>At its core, information security is about building a strong framework that defends against external cyber threats and ensures secure and reliable internal processes.<\/p>\r\n<p>Companies that prioritise information security are better equipped to protect their assets.<\/p>\r\n<a href=\"https:\/\/amtivo.com\/ie\/iso-certification\/iso-27001\/\" target=\"_blank\" data-banner-id=\"10181\"><img decoding=\"async\" src=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/What-is-Information-Security-ISO-27001.png\" class=\"bannerTrackingImg\" alt=\"What is Information Security - ISO 27001\" title=\"What is Information Security - ISO 27001\" \/><\/a>\r\n<h2>\u00a0<\/h2>\r\n<h2>The 3 Principles of Information Security<\/h2>\r\n<p>There are three key principles of information security: confidentiality, integrity, and availability.<\/p>\r\n<h3>Confidentiality<\/h3>\r\n<p>Confidentiality means that only authorised individuals can access sensitive information. This involves using tools like encryption, access controls, and authentication protocols to block unauthorised access and sharing. By maintaining confidentiality, businesses can protect their data from threats, keeping personal and crucial business information secure.<\/p>\r\n<h3>Integrity<\/h3>\r\n<p>Integrity focuses on maintaining the accuracy and completeness of information and its processing. This principle requires safeguards to ensure that data remains unchanged and unaltered by unauthorised individuals. Techniques such as hash functions, checksums and version controls help detect and prevent unauthorised changes. By ensuring integrity, businesses can prove their information is trustworthy and reliable, aiding in better decision-making.<\/p>\r\n<h3>Availability<\/h3>\r\n<p>Availability means that authorised users have timely and reliable access to information and related assets when they need them. This involves keeping hardware in good shape and performing regular system updates. It also involves having crisis recovery plans in place to prevent downtime during a cyber attack. By doing so, organisations can minimise disruptions and ensure that important operations continue smoothly, supporting productivity and efficiency.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Information Security vs Cyber Security<\/h2>\r\n<p>Information security and cyber security are terms that are often used interchangeably, but they focus on different aspects of protection.<\/p>\r\n<p><strong>Information security<\/strong> is a broad field that aims to protect all types of data, whether it&#8217;s digital, physical, or in another format. Its main goal is to keep data safe from unauthorised access, use, disclosure, disruption, modification or destruction.<\/p>\r\n<p><strong>Cyber security<\/strong> is a part of information security that specifically focuses on protecting digital data and systems from cyber threats. It involves safeguarding networks, computers, and other electronic devices from attacks like hacking, malware, and phishing.<\/p>\r\n<p>The distinction between cyber security and information security is important for understanding what information security compliance entails.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Types of Information Security<\/h2>\r\n<p>Organisations need to consider several interconnected aspects of information security to be as secure as possible:<\/p>\r\n<ul>\r\n\t<li>\r\n<p><strong>Network security &#8211; <\/strong>Network security involves protecting an organisation\u2019s network infrastructure from unauthorised access, misuse or theft. It uses tools like firewalls, intrusion detection systems, and virtual private networks (VPNs) to monitor and secure network traffic. By implementing strong network security measures, businesses can prevent breaches and protect data transmissions, adding a crucial layer of defence against cyber threats.<\/p>\r\n<\/li>\r\n<\/ul>\r\n<ul>\r\n\t<li>\r\n<p><strong>Application security &#8211; <\/strong>Application security focuses on finding and fixing software vulnerabilities. This includes using secure coding practices, conducting vulnerability assessments, and applying firewalls. By addressing weaknesses during application development and use, businesses can reduce the risk of attacks that exploit software, safeguard sensitive data, and maintain trust in their services.<\/p>\r\n<\/li>\r\n<\/ul>\r\n<ul>\r\n\t<li>\r\n<p><strong>Data security &#8211; <\/strong>Data security involves protecting a company\u2019s data from unauthorised access, corruption or loss. Techniques such as encryption, access controls, and data masking are used to secure data both when it\u2019s stored and when it\u2019s being transmitted. Ensuring data security helps businesses maintain the confidentiality, integrity and availability of their information, maintaining compliancewith regulations and resilient against data breaches.<\/p>\r\n<\/li>\r\n<\/ul>\r\n<ul>\r\n\t<li>\r\n<p><strong>Endpoint security &#8211; <\/strong>Endpoint security focuses on protecting devices such as computers, smartphones, and tablets that connect to an organisation\u2019s network. It involves using antivirus software, endpoint detection and response (EDR) solutions, and device management policies to secure these endpoints. By doing so, businesses can prevent attackers from accessing the network through less secure devices, strengthening overall security one device at a time.<\/p>\r\n<\/li>\r\n<\/ul>\r\n<h2>\u00a0<\/h2>\r\n<h2>Why Is Information Security Important?<\/h2>\r\n<p>Strong information security is crucial, as inadequate security can lead to unnecessary risks with serious consequences.<\/p>\r\n<p>These risks include data breaches, financial loss and reputational damage. A data breach can expose confidential information, resulting in costly legal battles and loss of customer trust. Financial losses can stem from theft, fraud or the costs associated with responding to an incident and implementing corrective measures.<\/p>\r\n<p>High-profile security breaches highlight the potential impact of insufficient information security. For example, in May 2021 when the Health Service Executive (HSE) of Ireland suffered a <a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/lessons-learned-hse-attack.pdf\" target=\"_blank\" rel=\"noopener\">ransomware cyber attack<\/a>. Such incidents demonstrate how a single breach can significantly affect an organisation\u2019s reputation and financial health.<\/p>\r\n<p>Beyond financial and reputational risks, businesses also face penalties for not protecting sensitive information. In Ireland, the <a href=\"https:\/\/www.dataprotection.ie\/en\/who-we-are\/data-protection-legislation\" target=\"_blank\" rel=\"noopener\">General Data Protection Regulation (GDPR) is one of the key legislative frameworks<\/a> that apply. Non-compliance can result in hefty fines and legal implications.<\/p>\r\n<p>By prioritising information security, organisations can mitigate risks to their staff and clients or customers, and protect their reputation.<\/p>\r\n<p>Discover the <a href=\"https:\/\/amtivo.com\/ie\/resources\/insights\/discover-the-benefits-of-iso-27001-certification\/\" rel=\"noopener\">benefits of ISO 27001 certification.<\/a><\/p>\r\n<a href=\"https:\/\/amtivo.com\/ie\/iso-training-courses\/iso-27001-training-courses\/iso-27001-free-training-introduction-course\/\" target=\"_blank\" data-banner-id=\"10178\"><img decoding=\"async\" src=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/What-is-Information-Security-ISO-27001-Free-Training.png\" class=\"bannerTrackingImg\" alt=\"What is Information Security - ISO 27001 Free Training\" title=\"What is Information Security - ISO 27001 Free Training\" \/><\/a>\r\n<h2>\u00a0<\/h2>\r\n<h2>What is an Information Security Management System?<\/h2>\r\n<p>An <a href=\"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-an-information-security-management-system-isms\/\" rel=\"noopener\">Information Security Management System (ISMS)<\/a> is a structured framework of policies and procedures designed to manage and enhance an organisation\u2019s information security. It provides a systematic approach to protecting sensitive data by addressing security risks.<\/p>\r\n<p>An ISMS plays a crucial role through several key activities:<\/p>\r\n<ul>\r\n\t<li><strong>Risk assessment<\/strong> \u2013 An ISMS helps organisations systematically identify and evaluate risks to their information assets, enabling them to prioritise security measures effectively.<\/li>\r\n\t<li><strong>Identifying vulnerabilities<\/strong> \u2013 By regularly assessing systems and processes, an ISMS identifies vulnerabilities that threats could exploit, allowing organisations to implement the appropriate security measures.<\/li>\r\n\t<li><strong>Identifying threats<\/strong> \u2013 An ISMS facilitates the recognition of potential threats, both internal and external, helping organisations prepare and respond proactively.<\/li>\r\n\t<li><strong>Incident response planning<\/strong> \u2013 The ISMS includes procedures for effective incident response, supporting a quick and efficient recovery from cyber attacks.<\/li>\r\n<\/ul>\r\n<h2>\u00a0<\/h2>\r\n<h2>How ISO 27001 Can Aid Information Security<\/h2>\r\n<p><a href=\"https:\/\/amtivo.com\/ie\/iso-certification\/iso-27001\/\" rel=\"noopener\">ISO 27001<\/a> is the globally recognised standard for information security management that provides a comprehensive framework for establishing, implementing, maintaining and continually improving an Information Security Management System. It offers organisations a structured approach to managing sensitive information.<\/p>\r\n<p>By adopting ISO 27001, organisations can identify and assess risks to their information assets, allowing them to use <span data-contrast=\"auto\">relevant <\/span>security controls that address these risks. The standard promotes a proactive, risk-based approach and resources are efficiently allocated to the areas of greatest concern.<\/p>\r\n<p>ISO 27001 also fosters a culture of continual improvement by requiring regular audits and assessments of the ISMS. This ongoing evaluation helps businesses adapt to new threats and changing security needs as they grow, ensuring their information security practices remain effective over time.<\/p>\r\n<p>This standard can be a valuable tool for organisations seeking to improve their information security and achieve compliance with legal and regulatory requirements.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/ie\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/\" rel=\"noopener\">Learn more about ISO 27001 requirements<\/a>.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Start Your ISO 27001 Certification With Amtivo<\/h2>\r\n<p>Setting up an Information Security Management System (ISMS) that complies with ISO 27001 can greatly benefit your organisation. It helps you to protect your sensitive information more effectively and enhances your business\u2019s ability to identify and handle new threats. Additionally, it supports compliance with data security regulations, maintaining your customers\u2019 trust and preserving your brand\u2019s reputation.<\/p>\r\n<p>Amtivo can support you at every step of the ISO 27001 certification journey \u2013 from the initial audit of your current ISMS to your three-year recertification audit.<\/p>\r\n<p>We are proud to have an \u201cExceptional\u201d Feefo rating of 4.8\/5 stars and are committed to excellence.<\/p>\r\n<p>We promise no hidden costs and transparent pricing at each step.<\/p>\r\n<p>Get started on your journey to ISO 27001 certification \u2013 <a href=\"https:\/\/amtivo.com\/ie\/certification-quote\/\" rel=\"noopener\"><strong>get a quote<\/strong><\/a> today or <a href=\"https:\/\/amtivo.com\/ie\/contact-us\/\" rel=\"noopener\"><strong>contact our team<\/strong><\/a> to discuss your needs.<\/p>","protected":false},"excerpt":{"rendered":"Learn how to manage your organisation&#8217;s information security, from its different aspects to implementing an ISMS and becoming ISO 27001-certified.","protected":false},"author":24,"featured_media":10184,"template":"","resource":[35],"resource-tag":[142],"class_list":["post-10177","resources-filter","type-resources-filter","status-publish","has-post-thumbnail","hentry","resource-insights","resource-tag-iso-27001"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is Information Security? - Amtivo<\/title>\n<meta name=\"description\" content=\"Learn how to manage your organisation&#039;s information security, from its different aspects to implementing an ISMS and becoming ISO 27001-certified.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Information Security?\" \/>\n<meta property=\"og:description\" content=\"Learn how to manage your organisation&#039;s information security, from its different aspects to implementing an ISMS and becoming ISO 27001-certified.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo Ireland\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-13T09:18:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/What-is-Information-Security-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"367\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is Information Security? - Amtivo","description":"Learn how to manage your organisation's information security, from its different aspects to implementing an ISMS and becoming ISO 27001-certified.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/","og_locale":"en_GB","og_type":"article","og_title":"What Is Information Security?","og_description":"Learn how to manage your organisation's information security, from its different aspects to implementing an ISMS and becoming ISO 27001-certified.","og_url":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/","og_site_name":"Amtivo Ireland","article_modified_time":"2025-05-13T09:18:44+00:00","og_image":[{"width":600,"height":367,"url":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/What-is-Information-Security-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/#article","isPartOf":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/"},"author":{"name":"Julian Russell","@id":"https:\/\/amtivo.com\/ie\/#\/schema\/person\/2933ac821223894f855a462421886937"},"headline":"What Is Information Security?","datePublished":"2025-04-29T15:53:03+00:00","dateModified":"2025-05-13T09:18:44+00:00","mainEntityOfPage":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/"},"wordCount":1470,"publisher":{"@id":"https:\/\/amtivo.com\/ie\/#organization"},"image":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/What-is-Information-Security-1.png","inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/","url":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/","name":"What Is Information Security? - Amtivo","isPartOf":{"@id":"https:\/\/amtivo.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/What-is-Information-Security-1.png","datePublished":"2025-04-29T15:53:03+00:00","dateModified":"2025-05-13T09:18:44+00:00","description":"Learn how to manage your organisation's information security, from its different aspects to implementing an ISMS and becoming ISO 27001-certified.","breadcrumb":{"@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/#primaryimage","url":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/What-is-Information-Security-1.png","contentUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/04\/What-is-Information-Security-1.png","width":600,"height":367},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/ie\/resources\/insights\/what-is-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/amtivo.com\/ie\/all-resources\/"},{"@type":"ListItem","position":3,"name":"Insights","item":"https:\/\/amtivo.com\/ie\/resources\/insights\/"},{"@type":"ListItem","position":4,"name":"What Is Information Security?"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/ie\/#website","url":"https:\/\/amtivo.com\/ie\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/ie\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/06\/amtivo-logo-new.png","contentUrl":"https:\/\/amtivo.com\/ie\/wp-content\/uploads\/sites\/11\/2025\/06\/amtivo-logo-new.png","width":400,"height":331,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/ie\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/amtivo.com\/ie\/#\/schema\/person\/2933ac821223894f855a462421886937","name":"Julian Russell","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/03\/julian-russell_avatar-96x96.jpg","url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/03\/julian-russell_avatar-96x96.jpg","contentUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/03\/julian-russell_avatar-96x96.jpg","caption":"Julian Russell"},"sameAs":["https:\/\/www.linkedin.com\/in\/juliandrussell\/?miniProfileUrn=urn3Ali3Afs_miniProfile3AACoAAALhzNsB8Wn7AqeQBGa8OxBIrtgXH_ceOB0&skipRedirect=true&miniProfileUrn=urnlifs_miniProfileACoAAALhzNsB8Wn7AqeQBGa8OxBIrtgXH_ceOB0"],"url":"https:\/\/amtivo.com\/ie\/technical-expert\/julian\/"}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter\/10177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter"}],"about":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/types\/resources-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":0,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resources-filter\/10177\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/media\/10184"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/media?parent=10177"}],"wp:term":[{"taxonomy":"resource","embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resource?post=10177"},{"taxonomy":"resource-tag","embeddable":true,"href":"https:\/\/amtivo.com\/ie\/wp-json\/wp\/v2\/resource-tag?post=10177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}