{"id":9262,"date":"2018-08-03T06:26:57","date_gmt":"2018-08-03T06:26:57","guid":{"rendered":"https:\/\/ca.syspro.com\/blog\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/"},"modified":"2021-03-04T14:50:06","modified_gmt":"2021-03-04T14:50:06","slug":"finding-workable-solutions-for-governance-risk-and-compliance-part-2","status":"publish","type":"post","link":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/","title":{"rendered":"Finding Workable Solutions for Governance, Risk, and Compliance Part 2"},"content":{"rendered":"<p>Hard to believe that there are over 100 000 information security breaches at listed companies every day.<\/p>\n<p>South Africa has the benefit of the King Commission into Corporate Governance (or as it is described \u2013 Responsible Corporate Citizenship). This commission has progressed all of the way to King IV, or the 4th commission into Corporate Governance.<\/p>\n<p><!--more--><\/p>\n<p>King III introduced IT governance and risk awareness at board level, and introduced IT Governance as part of a director\u2019s Duty of Care. King IV introduced the deliberate separation of technology and information to address the question of protection of personal information as opposed to access to personal information. King IV is also a deeper delve into the POPI Act (Protection of Personal Information) and some of its implications for the organisation. The POPI Act (which is very similar to the GDPR Act of the UK) includes personal information such as email address, financial information, and online messaging, amongst others.<\/p>\n<p>In today\u2019s business environment, a cyber-breach is a much bigger risk than disaster recovery, highlighting the need for advanced information security. The South African public have recently experienced such a breach at a South African life insurance and investment organisation:<\/p>\n<ul>\n<li>They were breached and did not know it until the ransom was demanded<\/li>\n<li>Then they kicked into gear, and investigated, etc. to eliminate the breach<\/li>\n<li>Feedback to the public was sketchy, with a reassurance that their personal data was safe as only the email and possibly attachments was breached<\/li>\n<\/ul>\n<p>In light of the above example, let\u2019s take a brief look at some of the main recommendations from the King IV commission which can be applied in any organisation:<\/p>\n<p><strong>Information Managemen<\/strong>t<\/p>\n<p>The risks associated with the technology and the information need to be managed, which implies a continuous monitoring of all of the aspects of information, data quality and data security.<\/p>\n<p><strong>Information Security Management System (ISMS)<\/strong><\/p>\n<p>This is best undertaken through an ISMS framework, developed by the board and managed by the business management team. This would require IT Governance and Security to become a board meeting agenda item. The ISMS also needs to be a clear and concise plan, fully understood and actionable upon a breach being detected.<\/p>\n<p><strong>Disaster Recovery Officer<\/strong><\/p>\n<p>This ISMS should be the responsibility of the Disaster Recovery Officer who would monitor and report cyber breaches and private information leaks. Typically this would be the Chief Information Officer (CIO).<\/p>\n<p>There are many more recommendations, but by implementing the above processes, will hopefully limit the risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>Hard to believe that there are over 100 000 information security breaches at listed companies every day. South Africa has the benefit of the King Commission into Corporate Governance (or as it is described \u2013 Responsible Corporate Citizenship). This commission has progressed all of the way to King IV, or the 4th commission into Corporate &#8230; <a title=\"Finding Workable Solutions for Governance, Risk, and Compliance Part 2\" class=\"read-more\" href=\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/\" aria-label=\"Read more about Finding Workable Solutions for Governance, Risk, and Compliance Part 2\">Read more<\/a><\/p>\n","protected":false},"author":168,"featured_media":7286,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[269],"tags":[],"class_list":["post-9262","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-owning-or-running-erp"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Finding Workable Solutions for Governance, Risk, and Compliance Part 2 - SYSPRO Blog<\/title>\n<meta name=\"description\" content=\"An Information Security Management System, with managing and monitoring of information, data quality and data security, limits the risk of a cyber-breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Finding Workable Solutions for Governance, Risk, and Compliance Part 2 - SYSPRO Blog\" \/>\n<meta property=\"og:description\" content=\"An Information Security Management System, with managing and monitoring of information, data quality and data security, limits the risk of a cyber-breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSPRO Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-03T06:26:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-04T14:50:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Landman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Landman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/\"},\"author\":{\"name\":\"Roger Landman\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/ead262b8ec47310404569e0f9121847b\"},\"headline\":\"Finding Workable Solutions for Governance, Risk, and Compliance Part 2\",\"datePublished\":\"2018-08-03T06:26:57+00:00\",\"dateModified\":\"2021-03-04T14:50:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/\"},\"wordCount\":423,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png\",\"articleSection\":[\"Managing-Operating ERP\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/\",\"name\":\"Finding Workable Solutions for Governance, Risk, and Compliance Part 2 - SYSPRO Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png\",\"datePublished\":\"2018-08-03T06:26:57+00:00\",\"dateModified\":\"2021-03-04T14:50:06+00:00\",\"description\":\"An Information Security Management System, with managing and monitoring of information, data quality and data security, limits the risk of a cyber-breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#primaryimage\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png\",\"width\":900,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ca.syspro.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Finding Workable Solutions for Governance, Risk, and Compliance Part 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#website\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"name\":\"SYSPRO Blog\",\"description\":\"Insights on Business Management Software and ERP\",\"publisher\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#organization\",\"name\":\"SYSPRO\",\"url\":\"https:\/\/ca.syspro.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png\",\"width\":260,\"height\":94,\"caption\":\"SYSPRO\"},\"image\":{\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/ead262b8ec47310404569e0f9121847b\",\"name\":\"Roger Landman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/09\/Roger_Landman_blog-150x150.jpg\",\"contentUrl\":\"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/09\/Roger_Landman_blog-150x150.jpg\",\"caption\":\"Roger Landman\"},\"description\":\"As Head of Product Management at SYSPRO, Roger is responsible for ensuring products and the overall business remain strategically aligned. He is responsible for the development of the product roadmap and driving strategies for new and existing SYSPRO products and services. Roger is a specialist in the ERP product and after having worked in several industries all around the globe, he leverages his years of experience to ensure SYSPRO products meet ever-evolving consumer needs. With his skills in operations, he became a corporate trouble-shooter for underperforming businesses. He brings this expertise to the SYSPRO product line, ensuring the success of existing product lines and leading his team in the innovation of new products which speak to the changing needs of the market.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/roger-landman-pr-eng-9906a8b\/\"],\"url\":\"https:\/\/ca.syspro.com\/blog\/author\/roger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Finding Workable Solutions for Governance, Risk, and Compliance Part 2 - SYSPRO Blog","description":"An Information Security Management System, with managing and monitoring of information, data quality and data security, limits the risk of a cyber-breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/","og_locale":"en_US","og_type":"article","og_title":"Finding Workable Solutions for Governance, Risk, and Compliance Part 2 - SYSPRO Blog","og_description":"An Information Security Management System, with managing and monitoring of information, data quality and data security, limits the risk of a cyber-breach.","og_url":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/","og_site_name":"SYSPRO Blog","article_published_time":"2018-08-03T06:26:57+00:00","article_modified_time":"2021-03-04T14:50:06+00:00","og_image":[{"width":900,"height":410,"url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png","type":"image\/png"}],"author":"Roger Landman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Landman","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#article","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/"},"author":{"name":"Roger Landman","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/ead262b8ec47310404569e0f9121847b"},"headline":"Finding Workable Solutions for Governance, Risk, and Compliance Part 2","datePublished":"2018-08-03T06:26:57+00:00","dateModified":"2021-03-04T14:50:06+00:00","mainEntityOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/"},"wordCount":423,"commentCount":0,"publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png","articleSection":["Managing-Operating ERP"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/","url":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/","name":"Finding Workable Solutions for Governance, Risk, and Compliance Part 2 - SYSPRO Blog","isPartOf":{"@id":"https:\/\/ca.syspro.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#primaryimage"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#primaryimage"},"thumbnailUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png","datePublished":"2018-08-03T06:26:57+00:00","dateModified":"2021-03-04T14:50:06+00:00","description":"An Information Security Management System, with managing and monitoring of information, data quality and data security, limits the risk of a cyber-breach.","breadcrumb":{"@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#primaryimage","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2020\/12\/roger_information_security_2.png","width":900,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/ca.syspro.com\/blog\/owning-or-running-erp\/finding-workable-solutions-for-governance-risk-and-compliance-part-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ca.syspro.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Finding Workable Solutions for Governance, Risk, and Compliance Part 2"}]},{"@type":"WebSite","@id":"https:\/\/ca.syspro.com\/blog\/#website","url":"https:\/\/ca.syspro.com\/blog\/","name":"SYSPRO Blog","description":"Insights on Business Management Software and ERP","publisher":{"@id":"https:\/\/ca.syspro.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ca.syspro.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ca.syspro.com\/blog\/#organization","name":"SYSPRO","url":"https:\/\/ca.syspro.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2021\/03\/cropped-syspro-blog-logo.png","width":260,"height":94,"caption":"SYSPRO"},"image":{"@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/ead262b8ec47310404569e0f9121847b","name":"Roger Landman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ca.syspro.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/09\/Roger_Landman_blog-150x150.jpg","contentUrl":"https:\/\/ca.syspro.com\/blog\/wp-content\/uploads\/2022\/09\/Roger_Landman_blog-150x150.jpg","caption":"Roger Landman"},"description":"As Head of Product Management at SYSPRO, Roger is responsible for ensuring products and the overall business remain strategically aligned. He is responsible for the development of the product roadmap and driving strategies for new and existing SYSPRO products and services. Roger is a specialist in the ERP product and after having worked in several industries all around the globe, he leverages his years of experience to ensure SYSPRO products meet ever-evolving consumer needs. With his skills in operations, he became a corporate trouble-shooter for underperforming businesses. He brings this expertise to the SYSPRO product line, ensuring the success of existing product lines and leading his team in the innovation of new products which speak to the changing needs of the market.","sameAs":["https:\/\/www.linkedin.com\/in\/roger-landman-pr-eng-9906a8b\/"],"url":"https:\/\/ca.syspro.com\/blog\/author\/roger\/"}]}},"metadata":{"_yoast_wpseo_focuskw_text_input":[""],"_yoast_wpseo_metadesc":["An Information Security Management System, with managing and monitoring of information, data quality and data security, limits the risk of a cyber-breach."],"_yoast_wpseo_content_score":["30"],"_yoast_wpseo_primary_category":["38"],"_yoast_wpseo_focuskw":[""],"_yoast_wpseo_title":[""],"_yoast_wpseo_linkdex":[""],"_yoast_wpseo_metakeywords":[""],"_yoast_wpseo_is_cornerstone":[""],"_wp_page_template":["default"],"_thumbnail_id":["7286"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/comments?post=9262"}],"version-history":[{"count":0,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/posts\/9262\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media\/7286"}],"wp:attachment":[{"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/media?parent=9262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/categories?post=9262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ca.syspro.com\/blog\/wp-json\/wp\/v2\/tags?post=9262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}