{"id":1166,"date":"2023-06-09T23:51:00","date_gmt":"2023-06-09T23:51:00","guid":{"rendered":"https:\/\/share.242studio.com\/osnazivanje-pojedinaca-za-poboljsanu-zastitu-identiteta\/"},"modified":"2025-02-02T13:46:26","modified_gmt":"2025-02-02T13:46:26","slug":"empowering-individuals-for-enhanced-identity-protection","status":"publish","type":"post","link":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/","title":{"rendered":"Empowering Individuals for Enhanced Identity Protection"},"content":{"rendered":"\n<p>Although cybersecurity may appear to be primarily a technological concern, it ultimately revolves around human beings. Humans play a pivotal role in cybersecurity, as they can unintentionally compromise sensitive information and systems through social engineering tactics or errors, emphasizing the need to empower individuals with appropriate technologies and awareness training.<\/p>\n\n\n\n<p>In addition to the challenges posed by advanced attackers and the technical aspects of implementing multi-factor authentication (MFA), the true obstacle lies in inspiring individuals, both in personal and professional settings, to embrace this crucial security feature. Unfortunately, numerous reports suggest that businesses and individuals are not fully leveraging the potential of MFA.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/cpl.thalesgroup.com\/access-management-index\" target=\"_blank\" rel=\"noreferrer noopener\">While 56% of businesses<\/a>&nbsp;claim to have implemented MFA. Shockingly,&nbsp;<a href=\"https:\/\/www.scmagazine.com\/news\/security-awareness\/only-8-of-c-suite-executives-use-mfa-across-a-majority-of-apps-devices\" target=\"_blank\" rel=\"noreferrer noopener\">only 8% of C-suite executives<\/a>&nbsp;utilize MFA across their various applications and devices. However, the issue extends beyond the corporate realm. Even social media users neglect best practices to safeguard their online accounts and personal information. For instance,&nbsp;<a href=\"https:\/\/transparency.twitter.com\/en\/reports\/account-security.html#2021-jul-dec\" target=\"_blank\" rel=\"noreferrer noopener\">a mere 2.6% of Twitter users<\/a>&nbsp;have activated MFA for their accounts.<\/p>\n\n\n\n<p>Several reasons contribute to this risky behavior:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Implementation and integration challenges: The complexity of incorporating MFA into daily business workflows makes it a daunting task.<\/li>\n\n\n\n<li>Ineffective communication: The importance of implementing MFA fails to resonate effectively with businesses and society.<\/li>\n\n\n\n<li>Misconceptions about cybersecurity: Some individuals hold beliefs such as \u201cit won\u2019t happen to me\u201d or \u201cI have nothing to hide,\u201d undermining the perceived need for MFA.<\/li>\n\n\n\n<li>Fear and uncertainty: The intimidating nature of cybersecurity alienates people from actively engaging in protective measures.<\/li>\n<\/ol>\n\n\n\n<p>To address these concerns, it is vital to recognize that cybersecurity is not solely reliant on technology or processes. While technology can only offer a certain level of protection, employees can provide the contextual understanding necessary to detect and prevent attacks. By providing the right tools, knowledge, and support, organizations can unlock the full potential of their workforce and create a culture that embraces and maximizes the advantages of technology.&nbsp;<\/p>\n\n\n\n<p>It is important to empower people in cybersecurity and identity protection to harness the benefits of digital technologies. Here are some&nbsp;<a href=\"https:\/\/www.cygenta.co.uk\/post\/how-to-raise-cyber-security-awareness-year-round\" target=\"_blank\" rel=\"noreferrer noopener\">strategies for achieving this goal<\/a>:<\/p>\n\n\n\n<p><strong>Cultivating a Digital Mindset:<\/strong><\/p>\n\n\n\n<p>To empower individuals, it is crucial to foster a digital mindset within the organization. This involves developing an organizational culture that embraces technological advancements, encourages experimentation, and promotes continuous learning. By emphasizing the value of technology and its potential to drive positive change, employees are more likely to adopt new tools and approaches, becoming active participants in digital transformation.<\/p>\n\n\n\n<p><strong>Cultivating a&nbsp;<a href=\"https:\/\/www.cygenta.co.uk\/post\/cyber-security-awareness-50000\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Mindset<\/a>:<\/strong><\/p>\n\n\n\n<p>To safeguard our digital identities in today\u2019s interconnected world, empowering and engaging individuals in cybersecurity is paramount. Every organization possesses a security and organizational culture that should be transformed into a positive and proactive one. Blaming individuals for mistakes is counterproductive. Merely bombarding people with more technology exacerbates the situation by introducing unnecessary complexity. Instead, we should foster a culture that celebrates small victories. By focusing on all three domains of cybersecurity\u2014people, processes, and technology\u2014our businesses and societies can become safer and stronger.<\/p>\n\n\n\n<p><strong>Providing Training and Development Opportunities:<\/strong><\/p>\n\n\n\n<p>Investing in training and development is key to empowering employees to leverage technology effectively. This includes offering comprehensive training programs, workshops, and resources that equip individuals with the necessary skills to utilize technology tools and platforms efficiently. By providing ongoing learning opportunities, organizations enable employees to stay updated with the latest technological advancements and leverage them to enhance their work processes. Security awareness training should not solely focus on the \u201cwhy\u201d (the consequences of a breach), but also on the \u201cwhy me?\u201d. The \u201cwhy me?\u201d aspect, provides individuals with the context needed to comprehend the relevance of cybersecurity to their own lives. Without this understanding, it becomes challenging to influence people\u2019s intrinsic motivation, which is key to driving behavioral change. Understanding the reasons behind certain behaviors, or the lack thereof, is crucial for impactful awareness training.&nbsp;<\/p>\n\n\n\n<p><strong>Tailoring Technology Solutions to Individual Needs:<\/strong><\/p>\n\n\n\n<p>Recognizing that each employee has unique requirements and preferences, organizations should strive to offer technology solutions that cater to individual needs. This can involve providing a range of tools and platforms to choose from, allowing employees to select the ones that align best with their work style and objectives. Customizable interfaces, flexible application integrations, and personalized user settings empower individuals to optimize their technology experience for enhanced productivity.<\/p>\n\n\n\n<p>Empowering individuals to leverage the benefits of technology is a powerful strategy for organizations aiming to thrive in the digital age. By cultivating a digital mindset, cybersecurity mindset, providing training and development opportunities, tailoring technology solutions, encouraging collaboration, emphasizing automation benefits, and fostering innovation, organizations can create an environment where individuals feel empowered to harness technology to its fullest potential.<\/p>\n\n\n\n<p>If you want to learn more about multi-factor authentication and how your organization can successfully and effectively deploy MFA, download our latest paper,&nbsp;<a href=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/MFA-White-Paper.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cSelecting A Multi-Factor Authentication Solution: How to Address the Human and Technology Concerns\u201d<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em>Ninoslava Bogdanovi\u0107 is an Information Security Specialist at SHARE Foundation. Her fields of work are analysis of the state of digital security and building security measures and procedures in organisations so they could defend against cyber attacks, as well as providing assistance with cyber incidents.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Although cybersecurity may appear to be primarily a technological concern, it ultimately revolves around human beings. Humans play a pivotal role in cybersecurity, as they can unintentionally compromise sensitive information and systems through social engineering tactics or errors, emphasizing the need to empower individuals with appropriate technologies and awareness training. In addition to the challenges [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1038,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[33],"class_list":["post-1166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-digital-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Empowering Individuals for Enhanced Identity Protection - SHARE Fondacija<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Empowering Individuals for Enhanced Identity Protection - SHARE Fondacija\" \/>\n<meta property=\"og:description\" content=\"Although cybersecurity may appear to be primarily a technological concern, it ultimately revolves around human beings. Humans play a pivotal role in cybersecurity, as they can unintentionally compromise sensitive information and systems through social engineering tactics or errors, emphasizing the need to empower individuals with appropriate technologies and awareness training. In addition to the challenges [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"SHARE Fondacija\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-09T23:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-02T13:46:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa2_SHARE-News-1200x550-Web-cover.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"551\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Aleksa Boric\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aleksa Boric\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/\"},\"author\":{\"name\":\"Aleksa Boric\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/person\\\/855bab9a30b13d42de38ab5f43b68bfd\"},\"headline\":\"Empowering Individuals for Enhanced Identity Protection\",\"datePublished\":\"2023-06-09T23:51:00+00:00\",\"dateModified\":\"2025-02-02T13:46:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/\"},\"wordCount\":866,\"publisher\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/mfa2_SHARE-News-1200x550-Web-cover.png\",\"keywords\":[\"digital security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/\",\"name\":\"Empowering Individuals for Enhanced Identity Protection - SHARE Fondacija\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/mfa2_SHARE-News-1200x550-Web-cover.png\",\"datePublished\":\"2023-06-09T23:51:00+00:00\",\"dateModified\":\"2025-02-02T13:46:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/mfa2_SHARE-News-1200x550-Web-cover.png\",\"contentUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/mfa2_SHARE-News-1200x550-Web-cover.png\",\"width\":1201,\"height\":551},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/empowering-individuals-for-enhanced-identity-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Empowering Individuals for Enhanced Identity Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#website\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/\",\"name\":\"Share Foundation\",\"description\":\"Dru\u0161tvo, tehnologija, sajberspejs\",\"publisher\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sharefoundation.info\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\",\"name\":\"Share Foundation\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/share-favicon.png\",\"contentUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/share-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Share Foundation\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/person\\\/855bab9a30b13d42de38ab5f43b68bfd\",\"name\":\"Aleksa Boric\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g\",\"caption\":\"Aleksa Boric\"},\"url\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/author\\\/aleksa-boric\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Empowering Individuals for Enhanced Identity Protection - SHARE Fondacija","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/","og_locale":"en_US","og_type":"article","og_title":"Empowering Individuals for Enhanced Identity Protection - SHARE Fondacija","og_description":"Although cybersecurity may appear to be primarily a technological concern, it ultimately revolves around human beings. Humans play a pivotal role in cybersecurity, as they can unintentionally compromise sensitive information and systems through social engineering tactics or errors, emphasizing the need to empower individuals with appropriate technologies and awareness training. In addition to the challenges [&hellip;]","og_url":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/","og_site_name":"SHARE Fondacija","article_published_time":"2023-06-09T23:51:00+00:00","article_modified_time":"2025-02-02T13:46:26+00:00","og_image":[{"width":1201,"height":551,"url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa2_SHARE-News-1200x550-Web-cover.png","type":"image\/png"}],"author":"Aleksa Boric","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aleksa Boric","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/#article","isPartOf":{"@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/"},"author":{"name":"Aleksa Boric","@id":"https:\/\/sharefoundation.info\/#\/schema\/person\/855bab9a30b13d42de38ab5f43b68bfd"},"headline":"Empowering Individuals for Enhanced Identity Protection","datePublished":"2023-06-09T23:51:00+00:00","dateModified":"2025-02-02T13:46:26+00:00","mainEntityOfPage":{"@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/"},"wordCount":866,"publisher":{"@id":"https:\/\/sharefoundation.info\/#organization"},"image":{"@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa2_SHARE-News-1200x550-Web-cover.png","keywords":["digital security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/","url":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/","name":"Empowering Individuals for Enhanced Identity Protection - SHARE Fondacija","isPartOf":{"@id":"https:\/\/sharefoundation.info\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/#primaryimage"},"image":{"@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa2_SHARE-News-1200x550-Web-cover.png","datePublished":"2023-06-09T23:51:00+00:00","dateModified":"2025-02-02T13:46:26+00:00","breadcrumb":{"@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/#primaryimage","url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa2_SHARE-News-1200x550-Web-cover.png","contentUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa2_SHARE-News-1200x550-Web-cover.png","width":1201,"height":551},{"@type":"BreadcrumbList","@id":"https:\/\/sharefoundation.info\/en\/empowering-individuals-for-enhanced-identity-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sharefoundation.info\/en\/"},{"@type":"ListItem","position":2,"name":"Empowering Individuals for Enhanced Identity Protection"}]},{"@type":"WebSite","@id":"https:\/\/sharefoundation.info\/#website","url":"https:\/\/sharefoundation.info\/","name":"Share Foundation","description":"Dru\u0161tvo, tehnologija, sajberspejs","publisher":{"@id":"https:\/\/sharefoundation.info\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sharefoundation.info\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sharefoundation.info\/#organization","name":"Share Foundation","url":"https:\/\/sharefoundation.info\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sharefoundation.info\/#\/schema\/logo\/image\/","url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/02\/share-favicon.png","contentUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/02\/share-favicon.png","width":512,"height":512,"caption":"Share Foundation"},"image":{"@id":"https:\/\/sharefoundation.info\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sharefoundation.info\/#\/schema\/person\/855bab9a30b13d42de38ab5f43b68bfd","name":"Aleksa Boric","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g","caption":"Aleksa Boric"},"url":"https:\/\/sharefoundation.info\/en\/author\/aleksa-boric\/"}]}},"_links":{"self":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/1166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/comments?post=1166"}],"version-history":[{"count":1,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/1166\/revisions"}],"predecessor-version":[{"id":1167,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/1166\/revisions\/1167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/media\/1038"}],"wp:attachment":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/media?parent=1166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/categories?post=1166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/tags?post=1166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}