{"id":20776,"date":"2024-12-21T13:16:04","date_gmt":"2024-12-21T13:16:04","guid":{"rendered":"https:\/\/www.topdesk.com\/en\/?p=20776"},"modified":"2025-08-05T17:40:50","modified_gmt":"2025-08-05T16:40:50","slug":"what-is-shadow-it","status":"publish","type":"post","link":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/","title":{"rendered":"What is shadow IT? Answers to 5 frequently asked questions"},"content":{"rendered":"<p>The IT department is responsible for all things IT. Sounds pretty straightforward, right? Wrong. Hidden in the dark and shrouded in mystery, shadow IT breathes.<\/p>\n<p>But what is shadow IT exactly? In this blog, we answer five of the most frequently asked questions about shadow IT, including why does shadow IT occur and how to manage it.<\/p>\n<h2>What is shadow IT?<\/h2>\n<p>The name says it all: shadow IT takes place in the shadows \u2013 and the IT department is left in the dark. In short, shadow IT covers all forms of IT that take place outside of and without knowledge and\/or approval from the IT department.<\/p>\n<p>Shadow IT refers to the use of technology systems, applications, or services within an organization without official approval, oversight, or knowledge of the IT department or management. It often involves employees independently adopting and using unauthorized software, cloud services, or devices to fulfill their work-related needs.<\/p>\n<p>Normally, the IT department uses its expertise to select or approve new hardware or software for the organization. With shadow IT, other departments than IT or individual users use tools or devices that the IT department doesn\u2019t know about.<\/p>\n<h2>Why does shadow IT occur?<\/h2>\n<h3>Ease of use<\/h3>\n<p>With the sheer amount of available web and cloud-based technologies and applications, using your own IT resources has become easier than ever. Anyone can easily download and use IT tools through a web interface with little to no involvement from the IT department.<\/p>\n<h3>Business IT innovation<\/h3>\n<p>Most business departments want to innovate faster than the IT department has resources for. According to this\u00a0<a href=\"https:\/\/www.gartner.com\/en\/documents\/3782853\/executive-guidance-harnessing-business-led-it\" target=\"_blank\" rel=\"noopener\">Gartner report<\/a>, only 40% of total IT investments comes from the IT department itself. Business departments simply find their own solutions: they actively invest in IT software that supports their innovation efforts. This may include investing in a new application or platform or enlisting the help of an external IT consultant.<\/p>\n<blockquote><p>Shadow IT creates invisible risks that the IT department can\u2019t address because they don\u2019t know about them in the first place.<\/p><\/blockquote>\n<h2>What does shadow IT look like?<\/h2>\n<h3>BYOD: a dream or a nightmare?<\/h3>\n<p><a href=\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\" target=\"_blank\" rel=\"noopener\">Bring Your Own Device<\/a>\u00a0(BYOD) is great for a number of reasons. For one, employees get to work exactly the way they want: whether they like using a Samsung tablet, a MacBook, or a Xiaomi smartphone. But BYOD also has a dark side. Using personal devices to log onto the company network may cause huge security risks. Especially when personal devices are outdated or use dubious software \u2013 a hacker\u2019s dream come true. Keeping track of all devices? IT\u2019s <a href=\"https:\/\/www.topdesk.com\/en\/blog\/it-security-nightmares\/\">worst nightmare<\/a>.<\/p>\n<h3>Connected but disjointed<\/h3>\n<p>Now that almost everyone is working from home, employees have to find new ways to stay connected to their team and coworkers. The solution? Online tools and applications such as Microsoft Teams, Miro, and Trello. Usually, a team or department simply downloads a new tool and the rest of the organization automatically follows suit.<\/p>\n<p>The result? A snowball effect. All of a sudden, the organization uses eight different tools \u2013 and no one has involved the IT department or thought about how these applications handle personal data.<\/p>\n<p>How can you <a href=\"https:\/\/www.topdesk.com\/en\/blog\/security-work-remotely\/\">maintain security<\/a> while working from home?<\/p>\n<h3>Taking assets into their own hand<\/h3>\n<p>Some departments are extremely responsible. So responsible, in fact, that they handle asset management themselves instead of having\u00a0<a href=\"https:\/\/www.topdesk.com\/en\/glossary\/what-is-it-asset-management\/\" target=\"_blank\" rel=\"noopener\">centralized asset management run by the IT department<\/a>. Such departments have their own, private IT stock.<\/p>\n<p>So, what happens when an employee leaves the organization? They hand in their laptop at their department and think they\u2019re done. Weeks later, they get a call from IT, asking about the laptop.<\/p>\n<p>Meanwhile, the department has already handed out the laptop to a new employee. The IT department has no idea how many IT assets they have, where they are, and whether something is missing.<\/p>\n<h2>What are the implications of shadow IT?<\/h2>\n<p>\u201cIf you can\u2019t see it; you can\u2019t control it\u201d definitely rings true for shadow IT. Shadow IT creates invisible risks that the IT department can\u2019t address because they don\u2019t know about them in the first place. It also increases the attack surface of the organization, making it more susceptible to data leaks, for example.<\/p>\n<p>The IT department is responsible for security, compliance, and privacy in the organization. Shadow IT poses a genuine threat to all three of these, especially in larger organizations. The more applications, tools, and devices there are, the harder it is to control them.<\/p>\n<h2>How do I manage shadow IT?<\/h2>\n<h3>Boost awareness<\/h3>\n<p>You simply can\u2019t avoid shadow IT, no matter how hard you try. Using your own IT resources has become easier than ever with the boom in web and cloud-based technologies and applications. This doesn\u2019t mean you should just accept it and move on. You should still shut down anything that\u2019s actually dangerous or poses too great a risk.<\/p>\n<p>But when managing shadow IT, there\u2019s also another solution: education. Invest in more awareness of how important security, compliance, and privacy are. Most users are simply unaware of the implications when they sign up for Trello or log onto the company network using an outdated device.<\/p>\n<p>Next, set up simple guidelines that users have to follow when using their own hardware or software, such as multi factor authentication.<\/p>\n<h3>Partner up with the business<\/h3>\n<p>To make the most of innovation and avoid the risks of shadow IT, the IT department and the business departments need to join forces. On the one hand, the business departments need IT for their knowledge and expertise. On the other hand, IT wants to make sure the business departments invest in a safe solution that they won\u2019t have to lose any sleep over.<\/p>\n<p>So how do you <a href=\"https:\/\/www.topdesk.com\/en\/blog\/esm\/improve-collaboration\/\">partner up with the business<\/a>? Offer your services and make sure the business departments know where to find you. Take on an advisory role in every innovation project, from the orientation phase until the implementation of a new tool.<\/p>\n<p>A win-win situation: the business departments get to innovate, and IT gets to sleep at night (and profit from the business departments\u2019 innovation and budget).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The IT department is responsible for all things IT. Sounds pretty straightforward, right? Wrong. Hidden in the dark and shrouded in mystery, shadow IT breathes. But what is shadow IT exactly? In this blog, we answer five of the most frequently asked questions about shadow IT, including why does shadow IT occur and how to<\/p>\n","protected":false},"author":1,"featured_media":20791,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-20776","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":"","blog_hubspot_cta_link":"","toc_display":"not-visible","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is Shadow IT? How to Manage It Securely | TOPdesk<\/title>\n<meta name=\"description\" content=\"Discover what shadow IT is and how to manage it effectively. Uncover risks and control strategies\u2014start managing shadow IT with confidence today with TOPdesk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is shadow IT? Answers to 5 frequently asked questions | Better support, happy customers | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Discover what shadow IT is and how to manage it effectively. Uncover risks and control strategies\u2014start managing shadow IT with confidence today with TOPdesk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\" \/>\n<meta property=\"og:site_name\" content=\"T1 TOPdesk - EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-21T13:16:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T16:40:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Timon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Timon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\"},\"author\":{\"name\":\"Timon\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\"},\"headline\":\"What is shadow IT? Answers to 5 frequently asked questions\",\"datePublished\":\"2024-12-21T13:16:04+00:00\",\"dateModified\":\"2025-08-05T16:40:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\"},\"wordCount\":1028,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png\",\"articleSection\":[\"ITSM\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\",\"name\":\"What Is Shadow IT? How to Manage It Securely | TOPdesk\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png\",\"datePublished\":\"2024-12-21T13:16:04+00:00\",\"dateModified\":\"2025-08-05T16:40:50+00:00\",\"description\":\"Discover what shadow IT is and how to manage it effectively. Uncover risks and control strategies\u2014start managing shadow IT with confidence today with TOPdesk.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is shadow IT? Answers to 5 frequently asked questions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"name\":\"TOPdesk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\",\"https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk\",\"https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/\",\"https:\/\/www.trustradius.com\/products\/topdesk\/reviews\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\",\"name\":\"Timon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"caption\":\"Timon\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is Shadow IT? How to Manage It Securely | TOPdesk","description":"Discover what shadow IT is and how to manage it effectively. Uncover risks and control strategies\u2014start managing shadow IT with confidence today with TOPdesk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/","og_locale":"en_US","og_type":"article","og_title":"What is shadow IT? Answers to 5 frequently asked questions | Better support, happy customers | TOPdesk","og_description":"Discover what shadow IT is and how to manage it effectively. Uncover risks and control strategies\u2014start managing shadow IT with confidence today with TOPdesk.","og_url":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/","og_site_name":"T1 TOPdesk - EN","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2024-12-21T13:16:04+00:00","article_modified_time":"2025-08-05T16:40:50+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png","type":"image\/png"}],"author":"Timon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Timon","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/"},"author":{"name":"Timon","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916"},"headline":"What is shadow IT? Answers to 5 frequently asked questions","datePublished":"2024-12-21T13:16:04+00:00","dateModified":"2025-08-05T16:40:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/"},"wordCount":1028,"publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png","articleSection":["ITSM","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/","url":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/","name":"What Is Shadow IT? How to Manage It Securely | TOPdesk","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png","datePublished":"2024-12-21T13:16:04+00:00","dateModified":"2025-08-05T16:40:50+00:00","description":"Discover what shadow IT is and how to manage it effectively. Uncover risks and control strategies\u2014start managing shadow IT with confidence today with TOPdesk.","breadcrumb":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#primaryimage","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Online-image-Shadow-IT-1.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.com\/en\/"},{"@type":"ListItem","position":2,"name":"What is shadow IT? Answers to 5 frequently asked questions"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.com\/en\/#website","url":"https:\/\/www.topdesk.com\/en\/","name":"TOPdesk","description":"","publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.com\/en\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk","https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk","https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/","https:\/\/www.trustradius.com\/products\/topdesk\/reviews"]},{"@type":"Person","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916","name":"Timon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","caption":"Timon"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/20776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/comments?post=20776"}],"version-history":[{"count":11,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/20776\/revisions"}],"predecessor-version":[{"id":47193,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/20776\/revisions\/47193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media\/20791"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media?parent=20776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}