{"id":25,"date":"2024-10-03T21:55:11","date_gmt":"2024-10-03T21:55:11","guid":{"rendered":"https:\/\/www.nathanisoconsulting.com\/blog\/?p=25"},"modified":"2024-10-14T06:46:00","modified_gmt":"2024-10-14T06:46:00","slug":"5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company","status":"publish","type":"post","link":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/","title":{"rendered":"5 Steps to Achieve ISO 27001 Cyber Security for Your Saudi Arabian Company"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Saudi Arabia&#8217;s authorities specialize in strengthening diverse security matters. Well, the mirrored image is also present among industries and agencies. To beautify numerous pre-requisite\u00a0cybersecurity programs, they may want support.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">However, the International Organization for Standardization has additionally provided you with the remaining\u00a0solution. The tips of ISO 27001 Cyber Security\u00a0teach\u00a0a corporation about distinct information approximately the Information Security Management System.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Numerous security guidelines may be applied to businesses in Saudi Arabia. However, ISO 27001 Cyber Security is an important option. As it is derived and maintained under the guidance of the International Organization for Standardization, you&#8217;ll get a high-quality range of assistance in different\u00a0circumstances.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Starting from\u00a0risk management to global exposure, this ISO 27001 Cyber Security popularly allows you to reach the heights of the one.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Implementing\u00a0<\/span><strong><span data-preserver-spaces=\"true\">ISO 27001<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0in Saudi Arabian companies has several advantages. First, it helps identify vulnerabilities and implement appropriate controls to mitigate cyber threats. This proactive technique lets companies locate and respond correctly to capability safety breaches.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Secondly, ISO 27001 promotes a lifestyle of continuous improvement in cybersecurity practices. It establishes a framework for ordinary threat exams, security audits, and overall performance opinions, ensuring that security measures are up-to-date and aligned with evolving threats.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Thirdly, achieving ISO 27001 certification complements agencies&#8217; recognition and credibility. It demonstrates a commitment to protecting sensitive\u00a0data and reassuring customers, partners, and stakeholders that their statistics are handled with the utmost care.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">5\u00a0Easy Steps to Achieve ISO 27001 Cyber Security<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">When a business prepares to obtain\u00a0<strong><a title=\"ISO 27001 Certification\" href=\"https:\/\/www.nathanisoconsulting.com\/iso-27001-2022-certification-consultant.htm\">ISO 27001 Certification<\/a><\/strong>, it must undergo numerous steps to set up and implement the ISO 27001 ISMS. It is also required to maintain ISO 27001 Compliance throughout its life.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The following info will clarify everything that you wish to realize about the strategies for applying for\u00a0<a title=\"ISO 27001 Certification in Saudi Arabia\" href=\"https:\/\/www.nathanisoconsulting.com\/iso-27001-certification-consultant.htm\">ISO 27001 Certification in Saudi Arabia<\/a>:<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">1. Go for Finding Scope of the Organization &amp; Gap Analysis<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">An organization must move towards a Gap Analysis. Consistent with the ISO 27001:2022 Standard&#8217;s pointers, this Standard evaluates an enterprise&#8217;s practices of cutting-edge information security control strategies. That&#8217;s how an enterprise can do that. That&#8217;s the requisite technique as per\u00a0<\/span><span data-preserver-spaces=\"true\">the ISO 27001 Standard<\/span><span data-preserver-spaces=\"true\">.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">After the above step is carried out, it&#8217;ll be easier for the\u00a0management will to determine its scope. It needs to depend on the ISMS. The following techniques come under the scope of identity:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Identify diverse boundaries and belongings.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Introduce suitable approaches according to ISMS.<\/span><\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">2. Introducing Information Security Management System (ISMS)<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">In this part, authorized employees will expand coverage that specifies the Information Security Management System (ISMS). The ISMS sets risk tolerance within the organization and must also align with diverse goals.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">That&#8217;s how a business enterprise picks out and checks diverse feasible safety-related threats. It can also find vulnerabilities present inside the\u00a0security system. When you have applied the exceptional ISO 27001 Cyber Security, it won&#8217;t be a strenuous activity, so you won&#8217;t investigate and eliminate possible dangers.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">With the assistance of ISO 27001 Cyber Security,\u00a0you can develop the following tasks:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Implement\u00a0risk measures<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Safeguard\u00a0information<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Raise\u00a0security awareness<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Find out\u00a0risks<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Assess them properly<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">This phase is also beneficial to provide necessary activities consistent with ISO 27001 Cyber Security recommendations. They are:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Business continuity<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Incident\u00a0management<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Regular information\u00a0security\u00a0management<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Training session<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">That&#8217;s why\u00a0<\/span><strong><span data-preserver-spaces=\"true\">ISO 27001 compliance<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0into integral for businesses in Saudi Arabia.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">3. Documentation and Implementation of ISO 27001 Cyber Security Standards<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">Organizations applying for ISO 27001 certification have to expand the considered necessary files to complete the process. Keeping data on each activity applicable to\u00a0information security management can be a nice asset to help the ISMS.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">They may also include numerous information, techniques, and guidelines. Implementing identified controls and safety features assists in building the\u00a0risk\u00a0treatment plan. It is vital to set up\u00a0measurement and monitoring procedures.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">These can track the effectiveness of ISMS and verify the controls carried out. Organizations should conduct internal audits to evaluate numerous non-conformities during the implementation of ISO 27001 Cyber Security.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">4. Allow Management Review and Continuous Improvements<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">Conducting management\u00a0reviews\u00a0is necessary. These activities play a significant role in enforcing ISO 27001 Cyber Security within your organization. ISO 27001 management overview checks the effectiveness of ISMS.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">It also verifies an organization&#8217;s ISO 27001 Compliance and evaluates its overall performance. It checks the integrity of ISMS, internal audits, and requisite monitoring activities to provide feedback for management. Everything the certification frame (appointed with the aid of the power) does should be recorded for future use.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">While conducting inner audits, the certification body will record the following sports:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Set improvements<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Identify areas of improvements<\/span><\/li>\n<li>Introduce corrective actions<\/li>\n<li>Allow preventive measures<\/li>\n<\/ul>\n<p><strong><span data-preserver-spaces=\"true\">5. Certification Audit<\/span><\/strong><\/p>\n<p><span data-preserver-spaces=\"true\">It is essential to move for an authorized certification frame to conduct various sorts of audits relevant to\u00a0<strong><a title=\"ISO 27001 Cyber Security in Saudi Arabia\" href=\"https:\/\/www.nathanisoconsulting.com\/iso-27001-certification-consultant.htm\">ISO 27001 Cyber Security in Saudi Arabia<\/a><\/strong>. The role of the appointed certification body is to implement ISO 27001 ISMS&#8217;s recommendations.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A company will get the ISO 27001 certification based on the audit reports and the selection from the certification frame.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Saudi Arabia&#8217;s authorities specialize in strengthening diverse security matters. Well, the mirrored image is also present among industries and agencies. To beautify numerous pre-requisite\u00a0cybersecurity programs, they may want support. However, the International Organization for Standardization has additionally provided you with the remaining\u00a0solution. The tips of ISO 27001 Cyber Security\u00a0teach\u00a0a corporation about distinct information approximately the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":53,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-25","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iso-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Steps to Achieve ISO 27001 Cyber Security for Your Saudi Arabian Company -<\/title>\n<meta name=\"description\" content=\"Discover the 5 key steps to implement ISO 27001 cybersecurity in your Saudi Arabian company. Secure your data and stay compliant with global information security standards\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Steps to Achieve ISO 27001 Cyber Security for Your Saudi Arabian Company -\" \/>\n<meta property=\"og:description\" content=\"Discover the 5 key steps to implement ISO 27001 cybersecurity in your Saudi Arabian company. Secure your data and stay compliant with global information security standards\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-03T21:55:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-14T06:46:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nathanisoconsulting.com\/blog\/wp-content\/uploads\/2024\/10\/ISO-27001-Cyber-Security-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/\",\"url\":\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/\",\"name\":\"5 Steps to Achieve ISO 27001 Cyber Security for Your Saudi Arabian Company -\",\"isPartOf\":{\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nathanisoconsulting.com\/blog\/wp-content\/uploads\/2024\/10\/ISO-27001-Cyber-Security-1.jpeg\",\"datePublished\":\"2024-10-03T21:55:11+00:00\",\"dateModified\":\"2024-10-14T06:46:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/#\/schema\/person\/17e73e501bb44d99669cfac10880e109\"},\"description\":\"Discover the 5 key steps to implement ISO 27001 cybersecurity in your Saudi Arabian company. Secure your data and stay compliant with global information security standards\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#primaryimage\",\"url\":\"https:\/\/www.nathanisoconsulting.com\/blog\/wp-content\/uploads\/2024\/10\/ISO-27001-Cyber-Security-1.jpeg\",\"contentUrl\":\"https:\/\/www.nathanisoconsulting.com\/blog\/wp-content\/uploads\/2024\/10\/ISO-27001-Cyber-Security-1.jpeg\",\"width\":800,\"height\":389,\"caption\":\"ISO 27001 Cyber Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.nathanisoconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Steps to Achieve ISO 27001 Cyber Security for Your Saudi Arabian Company\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.nathanisoconsulting.com\/blog\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nathanisoconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/#\/schema\/person\/17e73e501bb44d99669cfac10880e109\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.nathanisoconsulting.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4542e0985c5cc3b147a8e0289cdda3caf6b17ebba251e0cf629922eb73cbf668?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4542e0985c5cc3b147a8e0289cdda3caf6b17ebba251e0cf629922eb73cbf668?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/nathanisoconsulting.com\/blog\"],\"url\":\"https:\/\/www.nathanisoconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Steps to Achieve ISO 27001 Cyber Security for Your Saudi Arabian Company -","description":"Discover the 5 key steps to implement ISO 27001 cybersecurity in your Saudi Arabian company. Secure your data and stay compliant with global information security standards","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/","og_locale":"en_US","og_type":"article","og_title":"5 Steps to Achieve ISO 27001 Cyber Security for Your Saudi Arabian Company -","og_description":"Discover the 5 key steps to implement ISO 27001 cybersecurity in your Saudi Arabian company. Secure your data and stay compliant with global information security standards","og_url":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/","article_published_time":"2024-10-03T21:55:11+00:00","article_modified_time":"2024-10-14T06:46:00+00:00","og_image":[{"width":800,"height":389,"url":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-content\/uploads\/2024\/10\/ISO-27001-Cyber-Security-1.jpeg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/","url":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/","name":"5 Steps to Achieve ISO 27001 Cyber Security for Your Saudi Arabian Company -","isPartOf":{"@id":"https:\/\/www.nathanisoconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#primaryimage"},"image":{"@id":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-content\/uploads\/2024\/10\/ISO-27001-Cyber-Security-1.jpeg","datePublished":"2024-10-03T21:55:11+00:00","dateModified":"2024-10-14T06:46:00+00:00","author":{"@id":"https:\/\/www.nathanisoconsulting.com\/blog\/#\/schema\/person\/17e73e501bb44d99669cfac10880e109"},"description":"Discover the 5 key steps to implement ISO 27001 cybersecurity in your Saudi Arabian company. Secure your data and stay compliant with global information security standards","breadcrumb":{"@id":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#primaryimage","url":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-content\/uploads\/2024\/10\/ISO-27001-Cyber-Security-1.jpeg","contentUrl":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-content\/uploads\/2024\/10\/ISO-27001-Cyber-Security-1.jpeg","width":800,"height":389,"caption":"ISO 27001 Cyber Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.nathanisoconsulting.com\/blog\/5-steps-to-achieve-iso-27001-cyber-security-for-your-saudi-arabian-company\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.nathanisoconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Steps to Achieve ISO 27001 Cyber Security for Your Saudi Arabian Company"}]},{"@type":"WebSite","@id":"https:\/\/www.nathanisoconsulting.com\/blog\/#website","url":"https:\/\/www.nathanisoconsulting.com\/blog\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nathanisoconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/www.nathanisoconsulting.com\/blog\/#\/schema\/person\/17e73e501bb44d99669cfac10880e109","name":"admin","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.nathanisoconsulting.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4542e0985c5cc3b147a8e0289cdda3caf6b17ebba251e0cf629922eb73cbf668?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4542e0985c5cc3b147a8e0289cdda3caf6b17ebba251e0cf629922eb73cbf668?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/nathanisoconsulting.com\/blog"],"url":"https:\/\/www.nathanisoconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":1,"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/25\/revisions"}],"predecessor-version":[{"id":26,"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/25\/revisions\/26"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/media\/53"}],"wp:attachment":[{"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=25"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=25"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nathanisoconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}