{"id":20647,"date":"2022-07-05T10:44:51","date_gmt":"2022-07-05T09:44:51","guid":{"rendered":"https:\/\/www.topdesk.com\/en\/?p=20647"},"modified":"2025-06-05T12:44:46","modified_gmt":"2025-06-05T11:44:46","slug":"cybersecurity-risks-remote-working","status":"publish","type":"post","link":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/","title":{"rendered":"The cybersecurity risks of remote working"},"content":{"rendered":"<p>Remote working is here to stay.\u00a0In fact, <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-07-14-gartner-survey-reveals-82-percent-of-company-leaders-plan-to-allow-employees-to-work-remotely-some-of-the-time\" target=\"_blank\" rel=\"noopener\">according to a Gartner survey,<\/a> over 82% of company leaders plan to permanently allow their employees to work remotely at least part of the time.<\/p>\n<p>But working from home is about more than doing laundry between virtual meetings. For IT departments, remote working brings with it a number of cybersecurity risks. Here\u2019s how hybrid work is changing the face of <a href=\"https:\/\/www.topdesk.com\/en\/cybersecurity-solution\/\">cybersecurity<\/a>.<\/p>\n<h2>Cybersecurity Risks of Working from Home<\/h2>\n<p><strong>Security is no longer just a job for IT<\/strong><\/p>\n<p>Prior to the rise of hybrid and remote working, the average employee wasn\u2019t especially clued-up on security hygiene or best practices. And while it wasn\u2019t an ideal situation, within the safe perimeters of the office (and the company network),\u00a0most IT departments could deal with the occasional <a href=\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\">security nightmare<\/a>.<\/p>\n<p>But with employees working from their own homes, far from the watchful gaze of the IT department, the responsibility for upholding cybersecurity best practices has shifted onto employees\u2019 shoulders.<\/p>\n<p>Alongside their daily work, employees now need to consider: Who is standing behind me while I\u2019m working? Am I using a protected network? Am I leaving my device unlocked and unattended? Should I ever let my partner or family members borrow my work device?<\/p>\n<p>Employees are certainly becoming more cybersecurity-savvy, but to ensure they don\u2019t fall victim to phishing or accidental insider threats, IT leaders still need to educate teams on the cybersecurity risks of remote working and security best practices.<\/p>\n<h3>The rise of &#8220;third space\u201d working<\/h3>\n<p>When remote working started to become the norm, the primary focus for the majority of IT departments was securing people\u2019s home environments for working. Sounds obvious, right? But the reality is,\u00a0research shows that more people are starting to work in so-called <a href=\"https:\/\/journals.sagepub.com\/doi\/10.1177\/10946705211014278\" target=\"_blank\" rel=\"noopener\">\u201cthird spaces\u201d <\/a>such as cafes, libraries, or on the go.<\/p>\n<p>This has big implications for IT as, while these spaces offer employees freedom and flexibility, they also increase the risk of security threats. The combination of a more distracting environment, the presence of strangers, and unprotected networks makes working outside of the home office even more dangerous. So, when establishing cybersecurity measures for hybrid working, it\u2019s especially important to take these \u201cthird spaces\u201d into account.<\/p>\n<blockquote><p>Security teams need to take a proactive approach to cybersecurity rather than a reactive one.<\/p><\/blockquote>\n<h3>Proactive over reactive<\/h3>\n<p>Cybersecurity attacks were already becoming increasingly frequent and sophisticated before 2020, but remote working put the risks of these attacks into overdrive.<\/p>\n<p>According to Splunk\u2019s State of Cybersecurity report in 2022, over 49% of organizations say they\u2019ve suffered a data breach over the past two years, up from 39% from their results pre-pandemic.<\/p>\n<p>Now more than ever, security teams need to take a proactive approach to cybersecurity rather than a reactive one. This means taking measures to prevent cyberattacks from happening in the first place, rather than responding to incidents when they occur. That includes things like educating employees on cybersecurity awareness, periodically assessing your internal systems for vulnerabilities,\u00a0managing <a href=\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\">shadow IT<\/a>, and more.<\/p>\n<p>And if something does go wrong, here\u2019s how to manage <a href=\"https:\/\/www.topdesk.com\/en\/blog\/service-desk-panic\/\">panic at the service desk<\/a>.<\/p>\n<h3>The basics still matter most<\/h3>\n<p>The rise of remote working may have made it even more important to be vigilant when it comes to cyber security \u2013 but it\u2019s not all doom and gloom. You\u2019ll be glad to hear that the majority of cyberattacks don\u2019t require sophisticated technology or even a highly skilled security department to stop them in their tracks.<\/p>\n<p>Preventing breaches doesn\u2019t have to be a complex operation \u2013 it\u2019s all about making sure that the basics of cyber hygiene are being adhered to throughout the organization. This means that keeping an eye on things like multi-factor authentication, least privilege access, and keeping devices up to date should still be a top priority for IT departments.<\/p>\n<h5>Want to know how to maintain security when employees are working remotely?<\/h5>\n<p>Read more on <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/cybersecurity-risks-remote-working\/\">remote working<\/a> or <a href=\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\">how to boost your IT security<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remote working is here to stay.\u00a0In fact, according to a Gartner survey, over 82% of company leaders plan to permanently allow their employees to work remotely at least part of the time. But working from home is about more than doing laundry between virtual meetings. For IT departments, remote working brings with it a number<\/p>\n","protected":false},"author":1,"featured_media":20659,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-20647","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":28128,"blog_hubspot_cta_link":"","toc_display":"not-visible","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Remote Working Security Risks | WFH Cybersecurity Dangers<\/title>\n<meta name=\"description\" content=\"Learn about the cybersecurity risks of remote working and how to stay safe while working from home. Discover essential insights to protect your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The cybersecurity risks of remote working | Better support, happy customers | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Learn about the cybersecurity risks of remote working and how to stay safe while working from home. Discover essential insights to protect your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/\" \/>\n<meta property=\"og:site_name\" content=\"T1 TOPdesk - EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-05T09:44:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-05T11:44:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Timon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Timon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/\"},\"author\":{\"name\":\"Timon\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\"},\"headline\":\"The cybersecurity risks of remote working\",\"datePublished\":\"2022-07-05T09:44:51+00:00\",\"dateModified\":\"2025-06-05T11:44:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/\"},\"wordCount\":669,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png\",\"articleSection\":[\"ITSM\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/\",\"name\":\"Remote Working Security Risks | WFH Cybersecurity Dangers\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png\",\"datePublished\":\"2022-07-05T09:44:51+00:00\",\"dateModified\":\"2025-06-05T11:44:46+00:00\",\"description\":\"Learn about the cybersecurity risks of remote working and how to stay safe while working from home. Discover essential insights to protect your data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The cybersecurity risks of remote working\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"name\":\"TOPdesk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\",\"https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk\",\"https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/\",\"https:\/\/www.trustradius.com\/products\/topdesk\/reviews\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\",\"name\":\"Timon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"caption\":\"Timon\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Remote Working Security Risks | WFH Cybersecurity Dangers","description":"Learn about the cybersecurity risks of remote working and how to stay safe while working from home. Discover essential insights to protect your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/","og_locale":"en_US","og_type":"article","og_title":"The cybersecurity risks of remote working | Better support, happy customers | TOPdesk","og_description":"Learn about the cybersecurity risks of remote working and how to stay safe while working from home. Discover essential insights to protect your data.","og_url":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/","og_site_name":"T1 TOPdesk - EN","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2022-07-05T09:44:51+00:00","article_modified_time":"2025-06-05T11:44:46+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png","type":"image\/png"}],"author":"Timon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Timon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/"},"author":{"name":"Timon","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916"},"headline":"The cybersecurity risks of remote working","datePublished":"2022-07-05T09:44:51+00:00","dateModified":"2025-06-05T11:44:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/"},"wordCount":669,"publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png","articleSection":["ITSM","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/","url":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/","name":"Remote Working Security Risks | WFH Cybersecurity Dangers","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png","datePublished":"2022-07-05T09:44:51+00:00","dateModified":"2025-06-05T11:44:46+00:00","description":"Learn about the cybersecurity risks of remote working and how to stay safe while working from home. Discover essential insights to protect your data.","breadcrumb":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#primaryimage","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Security_risks_remote_Blog-1.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.com\/en\/blog\/cybersecurity-risks-remote-working\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.com\/en\/"},{"@type":"ListItem","position":2,"name":"The cybersecurity risks of remote working"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.com\/en\/#website","url":"https:\/\/www.topdesk.com\/en\/","name":"TOPdesk","description":"","publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.com\/en\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk","https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk","https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/","https:\/\/www.trustradius.com\/products\/topdesk\/reviews"]},{"@type":"Person","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916","name":"Timon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","caption":"Timon"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/20647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/comments?post=20647"}],"version-history":[{"count":11,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/20647\/revisions"}],"predecessor-version":[{"id":45327,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/20647\/revisions\/45327"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/person\/28128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media\/20659"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media?parent=20647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}