{"id":21076,"date":"2022-08-04T09:40:16","date_gmt":"2022-08-04T08:40:16","guid":{"rendered":"https:\/\/www.topdesk.com\/en\/?p=21076"},"modified":"2025-05-30T13:55:51","modified_gmt":"2025-05-30T12:55:51","slug":"6-ways-to-boost-it-security","status":"publish","type":"post","link":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/","title":{"rendered":"Six ways to boost your organization&#8217;s IT security"},"content":{"rendered":"<p>Security has always been a top priority for IT departments. But, with attacks becoming more sophisticated, resulting in an increase in <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/it-security-nightmares\/\">cybersecurity nightmares for organizations<\/a>, getting on top of IT security is more important than ever. In this blog, we show you 6 ways to boost your organization\u2019s IT security.<\/p>\n<h2>1. Get BYOD under control<\/h2>\n<p>The rise of hybrid working means that more employees are opting to use their personal devices, such as laptops and phones, for work. For your colleagues, this means more freedom and flexibility. But, for IT departments, unsecured personal devices are a potential security disaster waiting to happen.<\/p>\n<p>The solution? Unclear expectations are the enemy of IT security. So, to ensure that\u00a0<a href=\"https:\/\/www.topdesk.com\/en\/blog\/5-risks-of-byod\/\" target=\"_blank\" rel=\"noopener\">\u2018bring your own device\u2019 (BYOD)<\/a>\u00a0doesn\u2019t get out of hand at your organization, start by making sure that employees know what\u2019s expected of them. What kinds of mobile devices (if any) can be used for work? Are employees allowed to download new software onto these devices? These kinds of boundaries should be clear to all employees before they think about working with a personal device.<\/p>\n<h2>2. Use multi-factor authentication<\/h2>\n<p>Of course, you\u2019re already using <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/password-resets\/\">passwords<\/a> to protect your organization\u2019s networks. But password security is about more than just a combination of letters and numbers.<\/p>\n<p>Think about enforcing multi-factor authentication, which means users need to verify their identity at least one other way, such as via a code sent to their mobile phone. After all, attackers can\u2019t access your organization\u2019s data if they can\u2019t get into your company network.<\/p>\n<blockquote><p>IT security isn&#8217;t just a job for IT. To keep your data safe and sound, it&#8217;s crucial to build a culture of cybersecurity awareness within your organization.<\/p><\/blockquote>\n<h2>3. Make sure employees are security-savvy<\/h2>\n<p>We\u2019ve said it before, and we\u2019ll say it again: IT security isn\u2019t just a job for IT. In order to keep your company\u2019s sensitive data safe and sound, it\u2019s crucial to build a culture of <a href=\"https:\/\/www.topdesk.com\/en\/cybersecurity-solution\/\">cybersecurity<\/a> awareness within your organization.\u00a0<a href=\"https:\/\/www.weforum.org\/agenda\/2020\/12\/cyber-risk-cyber-security-education\" target=\"_blank\" rel=\"noopener\">Studies show that 95% of cybersecurity breaches can be traced back to human error<\/a>, so the stakes are pretty high. Educate employees on best practices, what to look out for, and what they should do if they think there\u2019s been a potential breach.<\/p>\n<p>Are your colleagues already clued-up on the basics? Make sure they\u2019re also knowledgeable about specific threats and how they could potentially impact the business. Would your colleagues know how to identify a personalized \u2018spear-phishing\u2019 email, for instance?<\/p>\n<p>It\u2019s not just IT departments who need to be proactive and vigilant when it comes to cyberattacks \u2013 employees do, too.<\/p>\n<p>Find out how <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/cybersecurity-risks-remote-working\/\">hybrid working<\/a> has changed the face of IT security.<\/p>\n<h2>4. Shed some light on shadow IT<\/h2>\n<p>What is <a href=\"https:\/\/www.topdesk.com\/en\/blog\/what-is-shadow-it\/\">shadow IT<\/a>? In short, it\u2019s the IT that happens when the IT department isn\u2019t looking. It\u2019s become easier than ever for employees to access their own IT resources, without the knowledge or permission of the IT department. The problem with shadow IT is that it creates invisible risks that IT departments can\u2019t address because they don\u2019t know about them. It also increases the attack surface of the organization, making it more susceptible to things like data leaks.<\/p>\n<p>To prevent this from happening, IT departments need to partner up with their company\u2019s business departments to ensure that they\u2019re investing in safe solutions, which won\u2019t cost the organization in the long run.<\/p>\n<h2>5. Back it up, back it up<\/h2>\n<p>Ransomware is on the rise. According to IDC\u2019s Ransomware Study, approximately 37% of global organizations were victim to a ransomware attack last year. Figuring out how to respond once an attack has taken place is no longer an option. IT departments need to be proactive about ransomware prevention \u2013 and recovery, should the worst happen.<\/p>\n<p>The best way to do this? Backing up your organization\u2019s data. By running regular backups, you\u2019ll bypass the ransom demand by restoring data from a source other than the encrypted files. And if you want to prevent malware from encrypting backup files? Use a cloud backup to keep a copy of your files safe from ransomware and other cybersecurity threats.<\/p>\n<h2>6. Create a response plan<\/h2>\n<p>Your organization has a plan for evacuating your office building in the event of a fire. So why wouldn\u2019t you have one for <a href=\"https:\/\/www.topdesk.com\/en\/blog\/service-desk-panic\/\">responding to a security incident<\/a>? It sounds obvious, but creating a comprehensive response plan, identifying key stakeholders, and mapping out the most important processes is the best way to avoid chaos if the worst does happen. Once you\u2019ve drafted up a plan, you can give it a test-drive and then modify it based on what worked well and what could be improved.<\/p>\n<p>For some organizations, responding to a security incident will require collaboration between several departments. By ensuring that all relevant parties agree to their responsibilities in the event of a breach, well before it happens, you can save valuable time and deal with security incidents quickly and efficiently.<\/p>\n<p><a href=\"https:\/\/www.topdesk.com\/en\/blog\/esm\/improve-collaboration\/\" target=\"_blank\" rel=\"noopener\">Find out how to improve collaboration between departments and which barriers to overcome.<\/a><\/p>\n<h2>Keep security breaches at bay when working remotely<\/h2>\n<p>The rise of <a href=\"https:\/\/www.topdesk.com\/en\/blog\/itsm\/cybersecurity-risks-remote-working\/\">hybrid working<\/a> has made managing IT security a whole lot more complicated. Discover tips to help manage your IT security while employees work from home.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keeping breaches at bay is a major priority for IT departments. Here are our 6 top tips for strengthening your organization&#8217;s IT security.\u00a0<\/p>\n","protected":false},"author":1,"featured_media":38001,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-21076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":28080,"blog_hubspot_cta_link":{"title":"Get more IT security tips","url":"https:\/\/www.topdesk.com\/en\/blog\/security-work-remotely\/","target":""},"toc_display":"full","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Boost IT Security: 6 Ways to Enhance IT Security | TOPdesk<\/title>\n<meta name=\"description\" content=\"Learn 6 effective ways to boost IT security on our blog. Strengthen your defenses with expert tips for enhancing your organization&#039;s cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Six ways to boost your organization&#039;s IT security | Better support, happy customers | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Learn 6 effective ways to boost IT security on our blog. Strengthen your defenses with expert tips for enhancing your organization&#039;s cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"T1 TOPdesk - EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-04T08:40:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-30T12:55:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1288\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Timon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Timon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\"},\"author\":{\"name\":\"Timon\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\"},\"headline\":\"Six ways to boost your organization&#8217;s IT security\",\"datePublished\":\"2022-08-04T08:40:16+00:00\",\"dateModified\":\"2025-05-30T12:55:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\"},\"wordCount\":896,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png\",\"articleSection\":[\"ITSM\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\",\"name\":\"Boost IT Security: 6 Ways to Enhance IT Security | TOPdesk\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png\",\"datePublished\":\"2022-08-04T08:40:16+00:00\",\"dateModified\":\"2025-05-30T12:55:51+00:00\",\"description\":\"Learn 6 effective ways to boost IT security on our blog. Strengthen your defenses with expert tips for enhancing your organization's cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png\",\"width\":1288,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Six ways to boost your organization&#8217;s IT security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#website\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"name\":\"TOPdesk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\",\"https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk\",\"https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/\",\"https:\/\/www.trustradius.com\/products\/topdesk\/reviews\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916\",\"name\":\"Timon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g\",\"caption\":\"Timon\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Boost IT Security: 6 Ways to Enhance IT Security | TOPdesk","description":"Learn 6 effective ways to boost IT security on our blog. Strengthen your defenses with expert tips for enhancing your organization's cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Six ways to boost your organization's IT security | Better support, happy customers | TOPdesk","og_description":"Learn 6 effective ways to boost IT security on our blog. Strengthen your defenses with expert tips for enhancing your organization's cybersecurity.","og_url":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/","og_site_name":"T1 TOPdesk - EN","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2022-08-04T08:40:16+00:00","article_modified_time":"2025-05-30T12:55:51+00:00","og_image":[{"width":1288,"height":628,"url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png","type":"image\/png"}],"author":"Timon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Timon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/"},"author":{"name":"Timon","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916"},"headline":"Six ways to boost your organization&#8217;s IT security","datePublished":"2022-08-04T08:40:16+00:00","dateModified":"2025-05-30T12:55:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/"},"wordCount":896,"publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png","articleSection":["ITSM","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/","url":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/","name":"Boost IT Security: 6 Ways to Enhance IT Security | TOPdesk","isPartOf":{"@id":"https:\/\/www.topdesk.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png","datePublished":"2022-08-04T08:40:16+00:00","dateModified":"2025-05-30T12:55:51+00:00","description":"Learn 6 effective ways to boost IT security on our blog. Strengthen your defenses with expert tips for enhancing your organization's cybersecurity.","breadcrumb":{"@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#primaryimage","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/Artigo-32-Por-que-o-desenvolvimento-de-equipe-de-TI-e-essencial-2-1.png","width":1288,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.com\/en\/blog\/6-ways-to-boost-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.com\/en\/"},{"@type":"ListItem","position":2,"name":"Six ways to boost your organization&#8217;s IT security"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.com\/en\/#website","url":"https:\/\/www.topdesk.com\/en\/","name":"TOPdesk","description":"","publisher":{"@id":"https:\/\/www.topdesk.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.com\/en\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.com\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk","https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk","https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/","https:\/\/www.trustradius.com\/products\/topdesk\/reviews"]},{"@type":"Person","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/995a8f0b06d438e37fd23df568798916","name":"Timon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1fac7dde1292f6d6d9f0a1a1cb50176a90d95f13cc97c2dc977b11e0787668c8?s=96&d=mm&r=g","caption":"Timon"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/21076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/comments?post=21076"}],"version-history":[{"count":12,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/21076\/revisions"}],"predecessor-version":[{"id":45177,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/posts\/21076\/revisions\/45177"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/person\/28080"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media\/38001"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.com\/en\/wp-json\/wp\/v2\/media?parent=21076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}