{"id":30478,"date":"2024-11-21T13:16:57","date_gmt":"2024-11-21T13:16:57","guid":{"rendered":"https:\/\/mainstream.eu\/?p=30478"},"modified":"2024-11-21T13:18:32","modified_gmt":"2024-11-21T13:18:32","slug":"shadow-it-hidden-enemy-or-business-opportunity","status":"publish","type":"post","link":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity","title":{"rendered":"Shadow IT: A hidden enemy or a business opportunity?"},"content":{"rendered":"\n<p>Shadow IT is a source of risk, but also much more than that &#8211; it is symptom that IT is not in sync with business needs. The problem of using non-corporate devices and technology should not be viewed solely from the perspective of potential data breaches or theft, but also as an opportunity to unleash innovation across the company.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#Shadow_IT_causes_and_risks\" >Shadow IT: causes and risks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#New_perspective_Shadow_IT_has_strategic_value\" >New perspective: Shadow IT has strategic value<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#Dont_forget_data_regulations\" >Don&#8217;t forget data regulations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#Raising_awareness_about_the_importance_of_business_data\" >Raising awareness about the importance of business data<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Shadow_IT_causes_and_risks\"><\/span>Shadow IT: causes and risks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If employees are not provided with corporate services for faster and simpler work, they will implement them independently. For example, many employees use file-sharing tools such as Drobox, creating major security risks. According to Gartner,<strong> large companies spend between 30% and 40% of their technology budget on shadow IT.<\/strong><\/p>\n\n\n\n<p>Research shows that IT teams don&#8217;t have accurate insights into the services used in their companies. According to the State of SaaSOps survey, the number of <strong>SaaS applications on corporate networks is three times higher than IT&#8217;s estimates<\/strong>. This situation, called Shadow IT, poses several challenges including increased costs and potential data breaches.<\/p>\n\n\n\n<p>Employees who are not educated about security risks can compromise confidential information by exposing it to malware and other cyber threats. Already tight IT budgets are further reduced by the cost of applications that are not necessary to use or&nbsp;can be replaced with more cost-effective alternatives. In addition, having different versions of software creates a lack of control and standardisation.<\/p>\n\n\n\n<p>While eliminating risk is certainly a priority, shadow IT is also an opportunity to improve collaboration and transform the ways technology is requested and used across your organisation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it-1024x683.jpg\" alt=\"\" class=\"wp-image-30458\" srcset=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it-1024x683.jpg 1024w, https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it-300x200.jpg 300w, https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it-768x512.jpg 768w, https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it.jpg 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"New_perspective_Shadow_IT_has_strategic_value\"><\/span><strong>New perspective: Shadow IT has strategic value<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>When employees install a non-corporate app, they are sending an indirect message: &#8220;We are lacking the tools to solve our challenges and work better.&#8221; IT managers should listen to these messages and carefully weigh the benefits of the tools used against their potential risks. In order to minimise risk, shadow applications should be provided with a legal &#8220;IT citizenship&#8221;. Below are some of the key steps along the way:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visibility is the number 1 priority, and that means discovering and listing all applications on the corporate network.<\/li>\n\n\n\n<li>To improve visibility in an environment where many different applications, software and tools are used, automation is key.<\/li>\n\n\n\n<li>Once the administrative steps are defined and implemented, IT can focus on breaking down data silos. Unauthorised applications are not integrated with each other and do not exchange information. By integrating this information, companies can create a centralised database that enables faster access to relevant information. For example, an application used by marketing potentially generates data that can be used by the sales department. That said, integrating data from different shadow applications can be a challenge. Not only do you need to combine both structured and unstructured data, but also to have the right technologies and expertise for data transformation, as well as to ensure that integration is done in a controlled way, in line with regulatory requirements.<\/li>\n<\/ul>\n\n\n\n<p><strong>Do you want to improve data management in your company? <a href=\"https:\/\/mainstream.eu\/en\/contact-us\/?utm_source=website&amp;utm_medium=blog-post&amp;utm_campaign=contact-us\">Contact Us<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Dont_forget_data_regulations\"><\/span><strong>Don&#8217;t forget data regulations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Strategic use of shadow IT is not the path to anarchy.. When it comes to data, companies should not neglect regulations such as the GDPR and the Personal Data Protection Act. In order to meet the requirements of these regulations, it is necessary to establish adequate data governance, which means setting various internal procedures, standards and policies about gathering, using and ensuring the integrity and security of organisational data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Raising_awareness_about_the_importance_of_business_data\"><\/span><strong>Raising awareness about the importance of business data<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Any technological initiative, including the transformation of shadow IT, must be focused primarily on business. And since business involves people, their preferences and need, employees should be motivated to educate themselves about the importance of data and security.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Experience has taught that when it comes to data transformation, management support is one of the pillars of success. In order for company leaders to recognize the importance of effective data management, they need to present the risks and small victories achieved on the path to transformation. Other important goals on this journey are to eliminate internal friction and provide strategic, experienced leadership for implementing data governance. If you need support in any of these areas, our consultants are here to help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shadow IT poses a risk due to the unauthorized use of technological tools, but it can also be an opportunity to enhance productivity and processes within companies.<\/p>\n","protected":false},"author":4,"featured_media":30458,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[215],"tags":[],"class_list":["post-30478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bezbednost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Shadow IT: A hidden enemy or a business opportunity? - Mainstream<\/title>\n<meta name=\"description\" content=\"Shadow IT poses a risk due to the unauthorized use of technological tools, but it can also be an opportunity to enhance productivity and processes within companies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow IT: A hidden enemy or a business opportunity? - Mainstream\" \/>\n<meta property=\"og:description\" content=\"Shadow IT poses a risk due to the unauthorized use of technological tools, but it can also be an opportunity to enhance productivity and processes within companies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/\" \/>\n<meta property=\"og:site_name\" content=\"Mainstream\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-21T13:16:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-21T13:18:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mainstream\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mainstream\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/\"},\"author\":{\"name\":\"Mainstream\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\"},\"headline\":\"Shadow IT: A hidden enemy or a business opportunity?\",\"datePublished\":\"2024-11-21T13:16:57+00:00\",\"dateModified\":\"2024-11-21T13:18:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/\"},\"wordCount\":710,\"image\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/shadow-it.jpg\",\"articleSection\":[\"Bezbednost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/\",\"name\":\"Shadow IT: A hidden enemy or a business opportunity? - Mainstream\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/shadow-it.jpg\",\"datePublished\":\"2024-11-21T13:16:57+00:00\",\"dateModified\":\"2024-11-21T13:18:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\"},\"description\":\"Shadow IT poses a risk due to the unauthorized use of technological tools, but it can also be an opportunity to enhance productivity and processes within companies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/shadow-it.jpg\",\"contentUrl\":\"https:\\\/\\\/mainstream.eu\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/shadow-it.jpg\",\"width\":1500,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/blog\\\/shadow-it-hidden-enemy-or-business-opportunity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shadow IT: A hidden enemy or a business opportunity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#website\",\"url\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/\",\"name\":\"Mainstream\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mainstream.eu\\\/sr\\\/#\\\/schema\\\/person\\\/2641be85ce58ab61df2554de02b325d3\",\"name\":\"Mainstream\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g\",\"caption\":\"Mainstream\"},\"url\":\"https:\\\/\\\/mainstream.eu\\\/en\\\/author\\\/mainstream\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shadow IT: A hidden enemy or a business opportunity? - Mainstream","description":"Shadow IT poses a risk due to the unauthorized use of technological tools, but it can also be an opportunity to enhance productivity and processes within companies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/","og_locale":"en_US","og_type":"article","og_title":"Shadow IT: A hidden enemy or a business opportunity? - Mainstream","og_description":"Shadow IT poses a risk due to the unauthorized use of technological tools, but it can also be an opportunity to enhance productivity and processes within companies.","og_url":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/","og_site_name":"Mainstream","article_published_time":"2024-11-21T13:16:57+00:00","article_modified_time":"2024-11-21T13:18:32+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it.jpg","type":"image\/jpeg"}],"author":"Mainstream","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mainstream","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#article","isPartOf":{"@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/"},"author":{"name":"Mainstream","@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3"},"headline":"Shadow IT: A hidden enemy or a business opportunity?","datePublished":"2024-11-21T13:16:57+00:00","dateModified":"2024-11-21T13:18:32+00:00","mainEntityOfPage":{"@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/"},"wordCount":710,"image":{"@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#primaryimage"},"thumbnailUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it.jpg","articleSection":["Bezbednost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/","url":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/","name":"Shadow IT: A hidden enemy or a business opportunity? - Mainstream","isPartOf":{"@id":"https:\/\/mainstream.eu\/sr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#primaryimage"},"image":{"@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#primaryimage"},"thumbnailUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it.jpg","datePublished":"2024-11-21T13:16:57+00:00","dateModified":"2024-11-21T13:18:32+00:00","author":{"@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3"},"description":"Shadow IT poses a risk due to the unauthorized use of technological tools, but it can also be an opportunity to enhance productivity and processes within companies.","breadcrumb":{"@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#primaryimage","url":"https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it.jpg","contentUrl":"https:\/\/mainstream.eu\/wp-content\/uploads\/2024\/09\/shadow-it.jpg","width":1500,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/mainstream.eu\/en\/blog\/shadow-it-hidden-enemy-or-business-opportunity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mainstream.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Shadow IT: A hidden enemy or a business opportunity?"}]},{"@type":"WebSite","@id":"https:\/\/mainstream.eu\/sr\/#website","url":"https:\/\/mainstream.eu\/sr\/","name":"Mainstream","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mainstream.eu\/sr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/mainstream.eu\/sr\/#\/schema\/person\/2641be85ce58ab61df2554de02b325d3","name":"Mainstream","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d96c6754fab9114e5226cde3f61d63c41cd2ee7c9c1bcf63a387ef17553e1f2?s=96&d=mm&r=g","caption":"Mainstream"},"url":"https:\/\/mainstream.eu\/en\/author\/mainstream\/"}]}},"_links":{"self":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/posts\/30478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/comments?post=30478"}],"version-history":[{"count":0,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/posts\/30478\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/media\/30458"}],"wp:attachment":[{"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/media?parent=30478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/categories?post=30478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mainstream.eu\/en\/wp-json\/wp\/v2\/tags?post=30478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}