{"id":61739,"date":"2024-02-28T15:04:51","date_gmt":"2024-02-28T13:04:51","guid":{"rendered":"https:\/\/bakertillysee.com\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/"},"modified":"2024-02-28T15:04:51","modified_gmt":"2024-02-28T15:04:51","slug":"cyber-security-solutions","status":"publish","type":"page","link":"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/","title":{"rendered":"Solu\u021bii de Securitate Cibernetic\u0103"},"content":{"rendered":"<div>\u00cen era digital\u0103, unde cloud computing-ul, Internetul Lucrurilor (IoT) \u0219i cererea de mobilitate continu\u0103 s\u0103 creasc\u0103, peisajul securit\u0103\u021bii cibernetice prezint\u0103 provoc\u0103ri f\u0103r\u0103 precedent.<\/div>\n<div><\/div>\n<div>Organiza\u021biile se confrunt\u0103 cu multiple amenin\u021b\u0103ri pe o suprafa\u021b\u0103 de atac extins\u0103, cu factorul uman fiind adesea cel mai vulnerabil link.<\/div>\n<div><\/div>\n<div>Dispozitivele mobile, cu capacit\u0103\u021bile lor extinse de acces, au escaladat \u0219i mai mult aceste amenin\u021b\u0103ri.<\/div>\n<div><\/div>\n<div>La Baker Tilly, speciali\u0219tii no\u0219tri \u00een securitate cibernetic\u0103 sunt dedica\u021bi s\u0103 ajute organiza\u021biile s\u0103 \u00ee\u0219i evalueze riscurile \u0219i s\u0103 realizeze \u00eembun\u0103t\u0103\u021biri semnificative \u00een controalele lor de securitate cibernetic\u0103.<\/div>\n<div><\/div>\n<div>Oferim o gam\u0103 de servicii concepute pentru a evalua \u0219i \u00eembun\u0103t\u0103\u021bi infrastructura dumneavoastr\u0103 de securitate cibernetic\u0103:<\/div>\n<div><\/div>\n<ul>\n<li>Evaluarea Riscurilor Cibernetice: Abordarea noastr\u0103 cuprinz\u0103toare evalueaz\u0103 postura de securitate cibernetic\u0103 a organiza\u021biei dumneavoastr\u0103 \u0219i expunerea la risc, oferind recomand\u0103ri ac\u021bionabile pentru a aborda lacunele din programul de securitate cibernetic\u0103 \u0219i a-i spori eficien\u021ba general\u0103.<\/li>\n<li>Teste de Penetrare \u0219i Evaluarea Vulnerabilit\u0103\u021bilor: Profesioni\u0219tii no\u0219tri \u00een securitate proiecteaz\u0103 \u0219i implementeaz\u0103 programe pentru a v\u0103 proteja activele, identific\u00e2nd \u0219i abord\u00e2nd vulnerabilit\u0103\u021bile. Serviciile reprezentate de teste de penetrare evalueaz\u0103 postura dumneavoastr\u0103 de securitate \u0219i identific\u0103 posibile exploat\u0103ri.<\/li>\n<li>Consultan\u021b\u0103 pentru CISO: Oferim suport specializat pentru Manageri pentru Securitatea Informa\u021biei (CISO), acoperind planificarea strategic\u0103, bugetarea, monitorizarea securit\u0103\u021bii \u0219i conformitatea, inclusiv actualiz\u0103ri periodice \u0219i r\u0103spuns la nevoile urgente.<\/li>\n<li>CISO, pozitie externalizata: Pentru organiza\u021biile cu resurse limitate \u00een domeniul securit\u0103\u021bii cibernetice, oferim servicii externalizate de CISO, adaptate cerin\u021belor dumneavoastr\u0103 specifice.<\/li>\n<li>Con\u0219tientizare a Securit\u0103\u021bii \/ Simularea Phishing-ului: Instruirea angaja\u021bilor \u00een cele mai bune practici de securitate cibernetic\u0103 este esen\u021bial\u0103 pentru atenuarea riscurilor asociate cu email-urile mali\u021bioase \u0219i protejarea organiza\u021biei dumneavoastr\u0103 \u00eempotriva pierderilor de date \u0219i financiare.<\/li>\n<li>R\u0103spuns la Incidente de Securitate: Profesioni\u0219tii no\u0219tri \u00een securitate asist\u0103 \u00een r\u0103spunsul \u0219i investigarea incidentelor pentru a controla amenin\u021b\u0103rile \u0219i a minimiza impactul, inclusiv \u00een cazul atacurilor ransomware.<\/li>\n<li>Sprijin pentru Implementarea ISO 27001\/27701\/22301: V\u0103 ghid\u0103m prin procesul de certificare ISO cu servicii precum analiza lacunelor, evaluarea riscurilor, preg\u0103tirea controalelor, dezvoltarea politicilor \u0219i suport pentru certificare.<\/li>\n<li>Evaluarea \u0219i \u00cembun\u0103t\u0103\u021birea Maturit\u0103\u021bii Programului Cibernetic: Folosind o abordare holistic\u0103 \u0219i Modelul de Maturitate \u00een Securitate Cibernetic\u0103 bazat pe NIST SP 800-171, evalu\u0103m \u0219i \u00eembun\u0103t\u0103\u021bim maturitatea programului dumneavoastr\u0103 cibernetic, oferind recomand\u0103ri \u021bintite \u0219i planificare strategic\u0103 pentru ini\u021biativele de securitate cibernetic\u0103.<\/li>\n<li>Continuitatea Afacerii \u0219i Recuperarea \u00een Caz de Dezastru: Solu\u021biile noastre, bazate pe standardele ISO27001 \u0219i ISO22301, includ codificarea proceselor de afaceri, definirea obiectivelor de recuperare, realizarea Analizei Impactului asupra Afacerii (BIA) \u0219i a Analizei Riscurilor (RA), precum \u0219i dezvoltarea de strategii de testare \u0219i exerci\u021bii pentru a asigura capabilit\u0103\u021bi eficiente de recuperare.<\/li>\n<\/ul>\n<div><\/div>\n<div>La Baker Tilly, \u00een\u021belegem importan\u021ba crucial\u0103 a unei securit\u0103\u021bi cibernetice solide \u00een lumea digital\u0103 de ast\u0103zi.<\/div>\n<div><\/div>\n<div>Scopul nostru este s\u0103 echip\u0103m organiza\u021bia dumneavoastr\u0103 cu instrumentele \u0219i expertiza necesare pentru a naviga \u00een mediul complex al securit\u0103\u021bii cibernetice, asigur\u00e2nd confiden\u021bialitatea, integritatea \u0219i disponibilitatea datelor dumneavoastr\u0103.<\/div>\n<div><\/div>\n<div>\u00cen peisajul dinamic al securit\u0103\u021bii cibernetice, este esen\u021bial s\u0103 abord\u0103m toate aspectele cheie legate de Oameni, Procese \u0219i Tehnologie.<\/div>\n<div><\/div>\n<div>Abordarea Baker Tilly \u00een ceea ce prive\u0219te Arhitectura de Securitate a \u00centreprinderii \u0219i Cadrul Politicilor de Securitate a Informa\u021biilor este una holistic\u0103 \u0219i robust\u0103.<\/div>\n<div><\/div>\n<div>Echipa noastr\u0103 de\u021bine abilit\u0103\u021bi de neegalat \u00een strategia \u0219i arhitectura securit\u0103\u021bii, av\u00e2nd experien\u021b\u0103 practic\u0103 \u00een selec\u021bia, implementarea, monitorizarea \u0219i suportul tehnologiilor de securitate.<\/div>\n<div><\/div>\n<div>Experien\u021ba noastr\u0103 vast\u0103 este demonstrat\u0103 \u0219i prin ini\u021biativele de con\u0219tientizare a securit\u0103\u021bii, recunoscute \u00een multiple sectoare industriale.<\/div>\n<div><\/div>\n<div>\u00cen plus, expertiza noastr\u0103 \u00een implementarea ISO27001:2013 subliniaz\u0103 capacitatea noastr\u0103 de a dezvolta \u0219i certifica Sisteme de Management al Securit\u0103\u021bii Informa\u021biilor cuprinz\u0103toare.<\/div>\n<div><\/div>\n<div>Serviciile noastre specializate de securitate cibernetic\u0103 includ:<\/div>\n<ul>\n<li>Testare de Atac \u0219i Penetrare: Utiliz\u00e2nd metodologii recunoscute interna\u021bional, realiz\u0103m test\u0103ri de penetrare externe \u0219i interne, inclusiv proceduri de inginerie social\u0103, testare wireless \u0219i testare specific\u0103 aplica\u021biilor web. Beneficiile pentru clien\u021bii no\u0219tri includ:<\/li>\n<li>Evaluare independent\u0103 a profilului de securitate tehnic\u0103 a opera\u021biunilor dumneavoastr\u0103 dependente de tehnologie.<\/li>\n<li>riscurilor legate de integritatea, confiden\u021bialitatea \u0219i disponibilitatea sistemelor \u0219i informa\u021biilor.<\/li>\n<li>O abordare modular\u0103 pentru evaluarea riscurilor provenite din amenin\u021b\u0103ri externe \u0219i interne, inclusiv pentru aplica\u021bii web sau operationale specifice.<\/li>\n<li>Evaluarea nivelurilor de amenin\u021bare din hack-uri oportuniste \u0219i spionaj industrial.<\/li>\n<\/ul>\n<div><\/div>\n<div>Proiectarea \u0219i Implementarea Planurilor de Recuperare \u00een Caz de Dezastru \u0219i Continuitate a Afacerii (DR &amp; BCP): Rezilien\u021ba opera\u021bional\u0103 \u0219i a afacerii este esen\u021bial\u0103 at\u00e2t din motive comerciale, c\u00e2t \u0219i din motive de reglementare.<\/div>\n<div>Solu\u021biile noastre de recuperare \u00een caz de dezastru \u0219i continuitate a afacerii sunt bazate pe metodologii recunoscute interna\u021bional, precum ISO27001 \u0219i ISO22301, incluz\u00e2nd:<\/div>\n<ul>\n<li>Codificarea \u0219i prioritizarea proceselor de afaceri.<\/li>\n<li>Definirea Obiectivelor de Timp de Recuperare \u0219i Obiectivelor Punctelor de Recuperare (RTO, RPO, MTTR).<\/li>\n<li>Analiza Impactului asupra Afacerii (BIA) pentru prioritizarea recuper\u0103rii.<\/li>\n<li>Analiza Riscurilor (RA) pentru selec\u021bia \u0219i implementarea controalelor.<\/li>\n<li>Strategii de Testare \u0219i Exerci\u021bii pentru asigurarea capacit\u0103\u021bii continue de recuperare.<\/li>\n<\/ul>\n<div>Cyber Security Health Checks: Pentru organiza\u021biile care doresc o evaluare independent\u0103 a maturit\u0103\u021bii \u0219i eficien\u021bei programului lor de Securitate a Informa\u021biilor, serviciul nostru Cyber Security Health Check ofer\u0103 o evaluare la nivel \u00eenalt. Acesta include un raport formal cu o analiz\u0103 tip SWOT \u0219i recomand\u0103ri direc\u021bionate pentru \u00eembun\u0103t\u0103\u021biri.<\/div>\n<div><\/div>\n<div>La Baker Tilly, suntem dedica\u021bi s\u0103 oferim o gam\u0103 larg\u0103 de servicii de securitate cibernetic\u0103 adaptate nevoilor \u0219i provoc\u0103rilor unice ale organiza\u021biilor moderne.<\/div>\n<div><\/div>\n<div>Scopul nostru este s\u0103 ne asigur\u0103m c\u0103 organiza\u021bia dumneavoastr\u0103 nu doar c\u0103 este protejat\u0103 \u00eempotriva amenin\u021b\u0103rilor actuale, ci \u0219i bine preg\u0103tit\u0103 pentru provoc\u0103rile viitoare \u00een securitatea cibernetic\u0103.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u00cen era digital\u0103, unde cloud computing-ul, Internetul Lucrurilor (IoT) \u0219i cererea de mobilitate continu\u0103 s\u0103 creasc\u0103, peisajul securit\u0103\u021bii cibernetice prezint\u0103 provoc\u0103ri f\u0103r\u0103 precedent. Organiza\u021biile se confrunt\u0103 cu multiple amenin\u021b\u0103ri pe o suprafa\u021b\u0103 de atac extins\u0103, cu factorul uman fiind adesea cel mai vulnerabil link. Dispozitivele mobile, cu capacit\u0103\u021bile lor extinse de acces, au escaladat \u0219i&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":61728,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"episode_type":"","audio_file":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","date_recorded":"","explicit":"","block":"","filesize_raw":"","footnotes":""},"class_list":["post-61739","page","type-page","status-publish","hentry","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.0 (Yoast SEO v25.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Solu\u021bii de Securitate Cibernetic\u0103 - Baker Tilly South East Europe<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solu\u021bii de Securitate Cibernetic\u0103\" \/>\n<meta property=\"og:description\" content=\"\u00cen era digital\u0103, unde cloud computing-ul, Internetul Lucrurilor (IoT) \u0219i cererea de mobilitate continu\u0103 s\u0103 creasc\u0103, peisajul securit\u0103\u021bii cibernetice prezint\u0103 provoc\u0103ri f\u0103r\u0103 precedent. Organiza\u021biile se confrunt\u0103 cu multiple amenin\u021b\u0103ri pe o suprafa\u021b\u0103 de atac extins\u0103, cu factorul uman fiind adesea cel mai vulnerabil link. Dispozitivele mobile, cu capacit\u0103\u021bile lor extinse de acces, au escaladat \u0219i&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Baker Tilly South East Europe\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-28T15:04:51+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/\",\"url\":\"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/\",\"name\":\"Solu\u021bii de Securitate Cibernetic\u0103 - Baker Tilly South East Europe\",\"isPartOf\":{\"@id\":\"https:\/\/bakertillysee.com\/#website\"},\"datePublished\":\"2024-02-28T13:04:51+00:00\",\"dateModified\":\"2024-02-28T15:04:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/#breadcrumb\"},\"inLanguage\":\"md\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bakertillysee.com\/md\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pagina de pornire\",\"item\":\"https:\/\/bakertillysee.com\/md\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Servicii\",\"item\":\"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Servicii De Consultan\u021b\u0103 Digital\u0103\",\"item\":\"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Solu\u021bii de Securitate Cibernetic\u0103\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bakertillysee.com\/#website\",\"url\":\"https:\/\/bakertillysee.com\/\",\"name\":\"Baker Tilly South East Europe\",\"description\":\"Assurance | Tax | Advisory\",\"publisher\":{\"@id\":\"https:\/\/bakertillysee.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bakertillysee.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"md\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/bakertillysee.com\/#organization\",\"name\":\"Baker Tilly South East Europe\",\"url\":\"https:\/\/bakertillysee.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"md\",\"@id\":\"https:\/\/bakertillysee.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/bakertillysee.com\/wp-content\/uploads\/2025\/04\/Baker-Tilly_Charcoal_png-4.png\",\"contentUrl\":\"https:\/\/bakertillysee.com\/wp-content\/uploads\/2025\/04\/Baker-Tilly_Charcoal_png-4.png\",\"width\":449,\"height\":119,\"caption\":\"Baker Tilly South East Europe\"},\"image\":{\"@id\":\"https:\/\/bakertillysee.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Solu\u021bii de Securitate Cibernetic\u0103 - Baker Tilly South East Europe","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Solu\u021bii de Securitate Cibernetic\u0103","og_description":"\u00cen era digital\u0103, unde cloud computing-ul, Internetul Lucrurilor (IoT) \u0219i cererea de mobilitate continu\u0103 s\u0103 creasc\u0103, peisajul securit\u0103\u021bii cibernetice prezint\u0103 provoc\u0103ri f\u0103r\u0103 precedent. Organiza\u021biile se confrunt\u0103 cu multiple amenin\u021b\u0103ri pe o suprafa\u021b\u0103 de atac extins\u0103, cu factorul uman fiind adesea cel mai vulnerabil link. Dispozitivele mobile, cu capacit\u0103\u021bile lor extinse de acces, au escaladat \u0219i&hellip;","og_url":"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/","og_site_name":"Baker Tilly South East Europe","article_modified_time":"2024-02-28T15:04:51+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/","url":"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/","name":"Solu\u021bii de Securitate Cibernetic\u0103 - Baker Tilly South East Europe","isPartOf":{"@id":"https:\/\/bakertillysee.com\/#website"},"datePublished":"2024-02-28T13:04:51+00:00","dateModified":"2024-02-28T15:04:51+00:00","breadcrumb":{"@id":"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/#breadcrumb"},"inLanguage":"md","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/cyber-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bakertillysee.com\/md\/"},{"@type":"ListItem","position":2,"name":"Pagina de pornire","item":"https:\/\/bakertillysee.com\/md\/"},{"@type":"ListItem","position":3,"name":"Servicii","item":"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/"},{"@type":"ListItem","position":4,"name":"Servicii De Consultan\u021b\u0103 Digital\u0103","item":"https:\/\/bakertillysee.com\/md\/pagina-de-pornire\/servicii\/digital-risk-advisory-services\/"},{"@type":"ListItem","position":5,"name":"Solu\u021bii de Securitate Cibernetic\u0103"}]},{"@type":"WebSite","@id":"https:\/\/bakertillysee.com\/#website","url":"https:\/\/bakertillysee.com\/","name":"Baker Tilly South East Europe","description":"Assurance | Tax | Advisory","publisher":{"@id":"https:\/\/bakertillysee.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bakertillysee.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"md"},{"@type":"Organization","@id":"https:\/\/bakertillysee.com\/#organization","name":"Baker Tilly South East Europe","url":"https:\/\/bakertillysee.com\/","logo":{"@type":"ImageObject","inLanguage":"md","@id":"https:\/\/bakertillysee.com\/#\/schema\/logo\/image\/","url":"https:\/\/bakertillysee.com\/wp-content\/uploads\/2025\/04\/Baker-Tilly_Charcoal_png-4.png","contentUrl":"https:\/\/bakertillysee.com\/wp-content\/uploads\/2025\/04\/Baker-Tilly_Charcoal_png-4.png","width":449,"height":119,"caption":"Baker Tilly South East Europe"},"image":{"@id":"https:\/\/bakertillysee.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/bakertillysee.com\/md\/wp-json\/wp\/v2\/pages\/61739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bakertillysee.com\/md\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bakertillysee.com\/md\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bakertillysee.com\/md\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bakertillysee.com\/md\/wp-json\/wp\/v2\/comments?post=61739"}],"version-history":[{"count":0,"href":"https:\/\/bakertillysee.com\/md\/wp-json\/wp\/v2\/pages\/61739\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/bakertillysee.com\/md\/wp-json\/wp\/v2\/pages\/61728"}],"wp:attachment":[{"href":"https:\/\/bakertillysee.com\/md\/wp-json\/wp\/v2\/media?parent=61739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}