{"id":191,"date":"2025-01-27T18:42:00","date_gmt":"2025-01-27T18:42:00","guid":{"rendered":"https:\/\/phishia.fr\/?p=191"},"modified":"2025-11-26T10:08:45","modified_gmt":"2025-11-26T10:08:45","slug":"sme-cyber-security-guide-2024","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/sme-cyber-security-guide-2024\/","title":{"rendered":"SMEs: a guide to cyber security in 2024"},"content":{"rendered":"<p>SMEs, the driving force behind the local economy, are increasingly faced with cyber threats that can compromise their business. Cybersecurity is therefore becoming a major concern for these companies, who need to protect their sensitive data and guarantee the continuity of their operations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.asut66sd6ot2_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a>Protecting sensitive data<\/h2>\n\n\n\n<p>SMEs often manage a significant amount of sensitive data, such as customer information, financial data and intellectual property. Protecting this data against cyber-attacks is therefore crucial to preserving customer confidence and ensuring regulatory compliance. SMEs need to implement robust security measures, such as firewalls, anti-virus software and regular backups, to prevent data breaches and financial losses.<\/p>\n\n\n\n<p>In order to implement tools that are adapted to your security needs, it is preferable to be accompanied in a precise diagnosis of the current state of your security via an audit and a&nbsp;<a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/risk-analysis\/\">risk analysis<\/a>. This will make it possible to define, within a defined budget, which solution(s) to implement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.64cngwo2zyts_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a>Raising employee awareness<\/h2>\n\n\n\n<p>In addition to technical measures, raising employee awareness of cybersecurity risks is essential to strengthen the security posture of SMEs. Employees need to be trained in good IT security practices, such as using strong passwords, detecting phishing emails and protecting confidential information. By making security a key part of their corporate culture, SMEs can significantly reduce the risks associated with human error and careless behavior.<\/p>\n\n\n\n<p>There are a number of ways to raise awareness among your employees:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>visit\u00a0<a href=\"https:\/\/phishia.fr\/en\/management-and-compliance\/awareness-training\/phishing\/\">phishing campaigns<\/a>This is an invaluable tool for helping each of your employees to progress through daily practice,<\/li>\n\n\n\n<li>visit\u00a0<a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/eti-cybersecurity-guide-2024\/\">cyber crisis management exercises<\/a>A team game to learn what a cyber attack is,\u00a0<\/li>\n\n\n\n<li>from\u00a0<a href=\"https:\/\/phishia.fr\/en\/services\/cybersecurity\/prevention\/awareness-training\/\">group workshops<\/a>\u00a0on various topics affecting your organization.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.8nt48ylhrbrq_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a>Implementing a Security Strategy<\/h2>\n\n\n\n<p>To ensure optimum protection against cyber threats, SMEs need to develop a comprehensive security strategy tailored to their specific needs. This can include identifying critical assets, assessing risks, implementing appropriate security controls and continuously monitoring the IT environment. By relying on advanced security solutions and remaining vigilant in the face of new threats, SMEs can strengthen their resilience and ability to cope with cyberattacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.l5wgu9xvtb4k_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a>The Importance of Safety Policies<\/h2>\n\n\n\n<p>Drafting sound security policies is essential for SMEs, to define the rules and procedures to be followed when it comes to IT security.<strong>&nbsp;These policies can cover a wide range of topics, including password management, access to sensitive data, use of personal devices on the corporate network, and response to security incidents.<\/strong>. By establishing clear policies and ensuring that all employees understand and follow them, SMEs can reduce the risk of security breaches and strengthen their overall security posture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h.6mpbqxsoysdh_l\"><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a><a href=\"https:\/\/phishia.fr\/en\/blog\/cybersecurity\/sme-cyber-security-guide-2024\/\"><\/a>Get Support<\/h2>\n\n\n\n<p>For SMEs wishing to reinforce their cybersecurity posture, it is advisable to enlist the support of IT security experts. Phishia, a consulting firm specializing in cybersecurity, offers solutions tailored to the specific needs of SMEs. Thanks to its expertise and personalized approach, Phishia can help SMEs identify vulnerabilities in their information systems, implement effective security measures and train their employees to adopt good security practices.<\/p>","protected":false},"excerpt":{"rendered":"<p>SMEs, the driving force behind the local economy, are increasingly faced with cyber threats that can compromise their business. Cybersecurity is therefore becoming a major concern for these companies, who need to protect their sensitive data and guarantee the continuity of their operations. Protecting sensitive data Small and medium-sized businesses often manage large quantities of [...]<\/p>","protected":false},"author":1,"featured_media":231,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PME : le guide de s\u00e9curisation cyber en 2024 - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/sme-cyber-security-guide-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PME : le guide de s\u00e9curisation cyber en 2024 - Phishia\" \/>\n<meta property=\"og:description\" content=\"Les PME, moteur de l&rsquo;\u00e9conomie locale, sont de plus en plus confront\u00e9es \u00e0 des cybermenaces qui peuvent compromettre leur activit\u00e9. La cybers\u00e9curit\u00e9 devient ainsi une pr\u00e9occupation majeure pour ces entreprises, qui doivent prot\u00e9ger leurs donn\u00e9es sensibles et garantir la continuit\u00e9 de leurs op\u00e9rations. Prot\u00e9ger les Donn\u00e9es Sensibles Les PME g\u00e8rent souvent une quantit\u00e9 importante de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/sme-cyber-security-guide-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T18:42:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T10:08:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hugo Lanier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hugo Lanier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/\"},\"author\":{\"name\":\"Hugo Lanier\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f\"},\"headline\":\"PME : le guide de s\u00e9curisation cyber en 2024\",\"datePublished\":\"2025-01-27T18:42:00+00:00\",\"dateModified\":\"2025-11-26T10:08:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/\"},\"wordCount\":702,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/phishia.fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg\",\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/\",\"url\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/\",\"name\":\"PME : le guide de s\u00e9curisation cyber en 2024 - Phishia\",\"isPartOf\":{\"@id\":\"https:\/\/phishia.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg\",\"datePublished\":\"2025-01-27T18:42:00+00:00\",\"dateModified\":\"2025-11-26T10:08:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#primaryimage\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/phishia.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PME : le guide de s\u00e9curisation cyber en 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/phishia.fr\/#website\",\"url\":\"https:\/\/phishia.fr\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\/\/phishia.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/phishia.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/phishia.fr\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\/\/phishia.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"contentUrl\":\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\/\/phishia.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/phishia\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f\",\"name\":\"Hugo Lanier\",\"sameAs\":[\"https:\/\/phishia.fr\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SMEs: a guide to cyber security in 2024 - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/sme-cyber-security-guide-2024\/","og_locale":"en_US","og_type":"article","og_title":"PME : le guide de s\u00e9curisation cyber en 2024 - Phishia","og_description":"Les PME, moteur de l&rsquo;\u00e9conomie locale, sont de plus en plus confront\u00e9es \u00e0 des cybermenaces qui peuvent compromettre leur activit\u00e9. La cybers\u00e9curit\u00e9 devient ainsi une pr\u00e9occupation majeure pour ces entreprises, qui doivent prot\u00e9ger leurs donn\u00e9es sensibles et garantir la continuit\u00e9 de leurs op\u00e9rations. Prot\u00e9ger les Donn\u00e9es Sensibles Les PME g\u00e8rent souvent une quantit\u00e9 importante de [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/sme-cyber-security-guide-2024\/","og_site_name":"Phishia","article_published_time":"2025-01-27T18:42:00+00:00","article_modified_time":"2025-11-26T10:08:45+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg","type":"image\/jpeg"}],"author":"Hugo Lanier","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hugo Lanier","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/"},"author":{"name":"Hugo Lanier","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f"},"headline":"PME : le guide de s\u00e9curisation cyber en 2024","datePublished":"2025-01-27T18:42:00+00:00","dateModified":"2025-11-26T10:08:45+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/"},"wordCount":702,"commentCount":0,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg","articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/","name":"SMEs: a guide to cyber security in 2024 - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg","datePublished":"2025-01-27T18:42:00+00:00","dateModified":"2025-11-26T10:08:45+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/pexels-olly-914931.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/pme-le-guide-de-securisation-cyber-en-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"PME : le guide de s\u00e9curisation cyber en 2024"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/af585567417266884c2f7f470cb09a6f","name":"Hugo Lanier","sameAs":["https:\/\/phishia.fr"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=191"}],"version-history":[{"count":12,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/191\/revisions"}],"predecessor-version":[{"id":4053,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/191\/revisions\/4053"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/231"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}