{"id":24021,"date":"2023-04-27T09:47:18","date_gmt":"2023-04-27T07:47:18","guid":{"rendered":"https:\/\/www.advens.test\/?p=24021"},"modified":"2025-05-19T18:14:17","modified_gmt":"2025-05-19T16:14:17","slug":"infographic-respond-to-ransomware-in-5-steps","status":"publish","type":"post","link":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/media\/security-operations\/infographic-respond-to-ransomware-in-5-steps\/","title":{"rendered":"[Infographic] Respond to ransomware in 5 steps"},"content":{"rendered":"\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2023\/02\/2023-infographic-ransomware-attack-advens.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"685\" data-id=\"6240\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-une-1-1024x685.png\" alt=\"How to handle a ransomware attack in 5 steps\" class=\"wp-image-6240\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-une-1-1024x685.png 1024w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-une-1-300x201.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-une-1-768x514.png 768w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-une-1-1536x1028.png 1536w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-une-1-330x220.png 330w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-une-1-209x140.png 209w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-une-1-1240x830.png 1240w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-une-1.png 1654w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<p><strong>In the event of a ransomware attack, your response is crucial. It needs to be done in an organised way: resist the temptation of responding to the ransom note, for instance. Responding to a ransomware attack is a step-by-step process: here is our advice.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2023\/02\/2023-infographic-ransomware-attack-advens.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"685\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article-1-1024x685.png\" alt=\"How to handle a ransomware attack in 5 steps\" class=\"wp-image-6237\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article-1-1024x685.png 1024w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article-1-300x201.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article-1-768x514.png 768w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article-1-1536x1028.png 1536w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article-1-330x220.png 330w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article-1-209x140.png 209w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article-1-1240x830.png 1240w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article-1.png 1654w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware attack, step 1: identify the signs early<\/h2>\n\n\n\n<p><strong>Identifying the signs of an attack<\/strong> is the first key step in protecting yourself from ransomware and knowing how to respond. The three most common signs are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IT systems <strong>stop responding<\/strong> or act strangely.<\/li>\n\n\n\n<li>A large number of <strong>files change<\/strong>, indicating that a malicious program is encrypting the files.<\/li>\n\n\n\n<li>A <strong>document called something like ReadMe.txt<\/strong> appears, asking for a ransom in exchange for the key to decrypt the infected files. <strong>Do not reply to it!<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Don&#8217;t panic, stay calm and follow these steps to respond effectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware: response and remediation steps<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Step 2 &#8211; Isolate and contain the attack<\/h3>\n\n\n\n<p>To contain the ransomware attack, disconnect the IT and then isolate the infected parts of the network. Next, call your <strong>internal CERT<\/strong> or contact an external CERT. Remember to isolate your backups to prevent them from being infected.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Step 3 &#8211; Get organised to respond to the incident<\/h3>\n\n\n\n<p>To manage the incident in a structured way, you must take three measures simultaneously:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Activate a crisis unit.<\/li>\n\n\n\n<li>Prepare crisis communications, both internally and externally.<\/li>\n\n\n\n<li>Establish and implement remediation measures.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Step 4 &#8211; Recover and rebuild your IT<\/h3>\n\n\n\n<p>Start by rebuilding the most compromised IT as securely as possible, before strengthening the other parts of the architecture.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Step 5 &#8211; Finalise and determine when the crisis is over<\/h3>\n\n\n\n<p>The attack is over! This is the time to make the return to normal &#8220;official&#8221; and maintain the tools and measures put in place (such as an <strong>EDR<\/strong>). You should then arrange an internal post-mortem to ensure you have the resources (time, money, energy) to finalise the <strong>security and protection plan against ransomware<\/strong>.<\/p>\n\n\n\n\n<div id=\"block-encadre-2002628413\" class=\"acf-block-encadre p-4 bg-grey-white text-grey-carbon rounded aligncenter\">\n  <p>See the Advens CERT&#8217;s response to a ransomware attack:<\/p>\n<p><a href=\"#\" rel=\"noopener\" target=\"_blank\">View the full story ><\/a><\/p>\n\n<\/div>\n\n\n\n<p><span style=\"font-weight:bold\">When responding to a ransomware attack, reaction time is of the essence. And paying the ransom is never a good idea, as there is no guarantee that you&#8217;ll get your data back if you give in to blackmail. To help you stay informed about threats, the Advens CERT publishes joint incident response sheets with the SG CERT (formerly Soci\u00e9t\u00e9 G\u00e9n\u00e9rale), which are available on GitHub.<\/span><\/p>\n\n\n\n<p class=\"has-text-align-center is-style-full-width\"><a href=\"https:\/\/github.com\/cert-advens\/IRM\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">See all sheets on GitHub<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the event of a ransomware attack, your response is crucial. It needs to be done in an organised way: resist the temptation of responding to the ransom note, for instance. Responding to a ransomware attack is a step-by-step process: here is our advice. Ransomware attack, step 1: identify the signs early Identifying the signs [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":6149,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[470],"tags":[],"custom_format":[477],"class_list":["post-24021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>[Infographic] Respond to ransomware in 5 steps - Advens<\/title>\n<meta name=\"description\" content=\"In the event of a ransomware attack, your response is crucial. It needs to be done in an organised way: resist the temptation of responding to the ransom\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Infographic] Respond to ransomware in 5 steps - Advens\" \/>\n<meta property=\"og:description\" content=\"In the event of a ransomware attack, your response is crucial. It needs to be done in an organised way: resist the temptation of responding to the ransom\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-27T07:47:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-19T16:14:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.test\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1654\" \/>\n\t<meta property=\"og:image:height\" content=\"1107\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"madina.ehsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/\"},\"author\":{\"name\":\"madina.ehsan\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b\"},\"headline\":\"[Infographic] Respond to ransomware in 5 steps\",\"datePublished\":\"2023-04-27T07:47:18+00:00\",\"dateModified\":\"2025-05-19T16:14:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/\"},\"wordCount\":397,\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png\",\"articleSection\":[\"Security Operations\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/\",\"url\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/\",\"name\":\"[Infographic] Respond to ransomware in 5 steps - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png\",\"datePublished\":\"2023-04-27T07:47:18+00:00\",\"dateModified\":\"2025-05-19T16:14:17+00:00\",\"description\":\"In the event of a ransomware attack, your response is crucial. It needs to be done in an organised way: resist the temptation of responding to the ransom\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#primaryimage\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png\",\"width\":1654,\"height\":1107},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.test\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 op\u00e9rationnelle\",\"item\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/media\/securite-operationnelle\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"[Infographic] Respond to ransomware in 5 steps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.test\/#website\",\"url\":\"https:\/\/www.advens.test\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.test\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.test\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.test\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b\",\"name\":\"madina.ehsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g\",\"caption\":\"madina.ehsan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[Infographic] Respond to ransomware in 5 steps - Advens","description":"In the event of a ransomware attack, your response is crucial. It needs to be done in an organised way: resist the temptation of responding to the ransom","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/","og_locale":"en_US","og_type":"article","og_title":"[Infographic] Respond to ransomware in 5 steps - Advens","og_description":"In the event of a ransomware attack, your response is crucial. It needs to be done in an organised way: resist the temptation of responding to the ransom","og_url":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/","og_site_name":"Advens","article_published_time":"2023-04-27T07:47:18+00:00","article_modified_time":"2025-05-19T16:14:17+00:00","og_image":[{"width":1654,"height":1107,"url":"https:\/\/www.advens.test\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png","type":"image\/png"}],"author":"madina.ehsan","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#article","isPartOf":{"@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/"},"author":{"name":"madina.ehsan","@id":"https:\/\/www.advens.test\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b"},"headline":"[Infographic] Respond to ransomware in 5 steps","datePublished":"2023-04-27T07:47:18+00:00","dateModified":"2025-05-19T16:14:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/"},"wordCount":397,"publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"image":{"@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png","articleSection":["Security Operations"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/","url":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/","name":"[Infographic] Respond to ransomware in 5 steps - Advens","isPartOf":{"@id":"https:\/\/www.advens.test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png","datePublished":"2023-04-27T07:47:18+00:00","dateModified":"2025-05-19T16:14:17+00:00","description":"In the event of a ransomware attack, your response is crucial. It needs to be done in an organised way: resist the temptation of responding to the ransom","breadcrumb":{"@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#primaryimage","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png","width":1654,"height":1107},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.test\/securite-operationnelle\/reagir-ransomware-etapes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.test\/en\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 op\u00e9rationnelle","item":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/media\/securite-operationnelle\/"},{"@type":"ListItem","position":3,"name":"[Infographic] Respond to ransomware in 5 steps"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.test\/#website","url":"https:\/\/www.advens.test\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.advens.test\/#organization","name":"Advens","url":"https:\/\/www.advens.test\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.test\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b","name":"madina.ehsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g","caption":"madina.ehsan"}}]}},"featured_url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/02\/2023-infographie-advens-image-article.png","_links":{"self":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/24021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/comments?post=24021"}],"version-history":[{"count":1,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/24021\/revisions"}],"predecessor-version":[{"id":24022,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/24021\/revisions\/24022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media\/6149"}],"wp:attachment":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media?parent=24021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/categories?post=24021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/tags?post=24021"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/custom_format?post=24021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}