{"id":8810,"date":"2024-10-08T13:13:57","date_gmt":"2024-10-08T11:13:57","guid":{"rendered":"https:\/\/aboveit.fi\/cybersecurity-2\/"},"modified":"2025-11-27T14:02:03","modified_gmt":"2025-11-27T12:02:03","slug":"cybersecurity-2","status":"publish","type":"page","link":"https:\/\/aboveit.fi\/en\/cybersecurity-2\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8810\" class=\"elementor elementor-8810 elementor-183\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b701054 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b701054\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-09267f5 elementor-invisible\" data-id=\"09267f5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc68128 animated-slow elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"fc68128\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOur comprehensive view and extensive experience in information security will assist your organization on this journey.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e954f23 elementor-invisible\" data-id=\"e954f23\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57aee08 elementor-widget elementor-widget-text-editor\" data-id=\"57aee08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tensure information security\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17b50b5 elementor-widget elementor-widget-heading\" data-id=\"17b50b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Holistic security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db514 elementor-widget elementor-widget-text-editor\" data-id=\"e1db514\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tInformation security has been in a state of transformation for years. With cloud services, organizational data may be accessible from anywhere. End-users doing knowledge work have also almost without exception shifted to hybrid work. While previously building an organization&#8217;s information security happened at the network edge and with workstation antivirus, the same strategy is now almost invariably vulnerable.   \n\nToday, information security must be built holistically. Security should be examined broadly, enabling comprehensive protection for identities, endpoints, applications, and data \u2013 regardless of user location. The majority of today&#8217;s risks are sophisticated threats targeting end-user identities. Artificial intelligence doesn&#8217;t ease this risk landscape either, as attackers also utilize such advanced solutions. Maintaining end-users&#8217; own expertise is now in a core role.    \n\nInformation security consists of practices and guidelines defined through strategy, for which the management team is responsible. It&#8217;s also important that IT management approaches information security from more than just a technology perspective. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c87c85e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c87c85e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-52e3fad\" data-id=\"52e3fad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78ba862 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"78ba862\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-579c37c elementor-widget elementor-widget-heading\" data-id=\"579c37c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Visibility into Information Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e705b8a elementor-widget elementor-widget-text-editor\" data-id=\"e705b8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In addition to the technical handling of comprehensive information security, it is also crucial that IT management has visibility into what is happening in the IT environment. If we are not informed that an end-user&#8217;s identity has been compromised, we cannot intervene in the incident. If we lack visibility into information security, we cannot ascertain whether the organization&#8217;s data has already been compromised. When discussing Microsoft&#8217;s information security solutions, IT management often expresses skepticism about putting all their eggs in one basket. The inverse perspective is also worth considering: if information security solutions are acquired piecemeal for various needs, is there adequate visibility between these solutions? Operating within the same ecosystem guarantees visibility between different information security solutions, allowing, for instance, user logins to be managed based on real-time data.      <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8474714 elementor-widget elementor-widget-text-editor\" data-id=\"8474714\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tVisibility can be further improved by centrally collecting all security and log data, for example, into a SIEM solution, allowing for an easy overview of various security events from one place \u2013 for the entire environment, at once, comprehensively. This gives us the tools to see and intervene in the course of events if an attack penetrates the network. So when you&#8217;re considering your organization&#8217;s information security and how to ensure visibility in terms of security, turn to us. We also have experience-based, proven solutions that we can offer as added value to ensure better sleep at night.   \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-af56e65 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"af56e65\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd4a04a\" data-id=\"fd4a04a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9880854 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"9880854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fab fa-dochub\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8690978 elementor-widget elementor-widget-heading\" data-id=\"8690978\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Protection to Safeguard Organizational Data<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da2f63c elementor-widget elementor-widget-text-editor\" data-id=\"da2f63c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOne of the least addressed aspects in various organizations&#8217; Microsoft 365 environments are sufficient data protection practices. Especially now, with the advent of AI solutions, it would be advisable to get the home base in order and prevent data leakage through AI tools to incorrect data processors. Even if AI solutions aren&#8217;t used, various data protection practices create security by limiting and guiding daily use and enabling, among other things, secure data sharing. Cloud services, depending on the license level, enable a comprehensive range of possibilities to manage an organization&#8217;s data protection. From us, you&#8217;ll get guidance and support to move these matters forward, starting from strategic consulting for your management team.    \n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-668d89f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"668d89f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5cef1e0\" data-id=\"5cef1e0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17d81ff elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"17d81ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-cloud-download-alt\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9a9c87 elementor-widget elementor-widget-heading\" data-id=\"c9a9c87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Managed Cloud Information Security Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b70b67 elementor-widget elementor-widget-text-editor\" data-id=\"5b70b67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Today, cloud services are an enabler of information security. With the cloud, we bring security to where your end-users are located. When you want peace of mind regarding information security, we have also productized value-added managed cloud services that enhance security, enabling better sleep for your IT management. With our PilviCapo services, we can cost-effectively ensure, for example, your organization&#8217;s <g id=\"gid_0\">communication and identity security<\/g> or monitor and take care of your <g id=\"gid_1\">Azure environment&#8217;s security<\/g>, depending on your needs. So, feel free to ask for more information, and we&#8217;ll discuss your requirements.    <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Our comprehensive view and extensive experience in information security will assist your organization on this journey.ensure information security Holistic security Information security has been in a state of transformation for years. With cloud services, organizational data may be accessible from anywhere. End-users doing knowledge work have also almost without exception shifted to hybrid work. While [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-8810","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - Above IT Oy<\/title>\n<meta name=\"description\" content=\"The cloud world is changing the way security is implemented. Holistic security and Zero-trust architecture are ways to protect against today&#039;s threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aboveit.fi\/en\/cybersecurity-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Above IT Oy\" \/>\n<meta property=\"og:description\" content=\"The cloud world is changing the way security is implemented. Holistic security and Zero-trust architecture are ways to protect against today&#039;s threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aboveit.fi\/en\/cybersecurity-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Above IT Oy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/aboveitfi\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-27T12:02:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/cybersecurity-2\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/cybersecurity-2\\\/\",\"name\":\"Cybersecurity - Above IT Oy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\"},\"datePublished\":\"2024-10-08T11:13:57+00:00\",\"dateModified\":\"2025-11-27T12:02:03+00:00\",\"description\":\"The cloud world is changing the way security is implemented. Holistic security and Zero-trust architecture are ways to protect against today's threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/cybersecurity-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aboveit.fi\\\/en\\\/cybersecurity-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/cybersecurity-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Etusivu\",\"item\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"name\":\"We Are Above IT\",\"description\":\"Tietohallinnon voimavarakumppani\",\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\",\"name\":\"Above IT Oy\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"width\":1613,\"height\":383,\"caption\":\"Above IT Oy\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/aboveitfi\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/aboveitfi\",\"https:\\\/\\\/instagram.com\\\/aboveitfi\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Above IT Oy","description":"The cloud world is changing the way security is implemented. Holistic security and Zero-trust architecture are ways to protect against today's threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aboveit.fi\/en\/cybersecurity-2\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Above IT Oy","og_description":"The cloud world is changing the way security is implemented. Holistic security and Zero-trust architecture are ways to protect against today's threats.","og_url":"https:\/\/aboveit.fi\/en\/cybersecurity-2\/","og_site_name":"Above IT Oy","article_publisher":"https:\/\/www.facebook.com\/aboveitfi","article_modified_time":"2025-11-27T12:02:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/aboveit.fi\/en\/cybersecurity-2\/","url":"https:\/\/aboveit.fi\/en\/cybersecurity-2\/","name":"Cybersecurity - Above IT Oy","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/#website"},"datePublished":"2024-10-08T11:13:57+00:00","dateModified":"2025-11-27T12:02:03+00:00","description":"The cloud world is changing the way security is implemented. Holistic security and Zero-trust architecture are ways to protect against today's threats.","breadcrumb":{"@id":"https:\/\/aboveit.fi\/en\/cybersecurity-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aboveit.fi\/en\/cybersecurity-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/aboveit.fi\/en\/cybersecurity-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Etusivu","item":"https:\/\/aboveit.fi\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/aboveit.fi\/en\/#website","url":"https:\/\/aboveit.fi\/en\/","name":"We Are Above IT","description":"Tietohallinnon voimavarakumppani","publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aboveit.fi\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aboveit.fi\/en\/#organization","name":"Above IT Oy","url":"https:\/\/aboveit.fi\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","width":1613,"height":383,"caption":"Above IT Oy"},"image":{"@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/aboveitfi","https:\/\/www.linkedin.com\/company\/aboveitfi","https:\/\/instagram.com\/aboveitfi"]}]}},"_links":{"self":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/pages\/8810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/comments?post=8810"}],"version-history":[{"count":1,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/pages\/8810\/revisions"}],"predecessor-version":[{"id":8825,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/pages\/8810\/revisions\/8825"}],"wp:attachment":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media?parent=8810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}