{"id":970,"date":"2022-04-19T20:23:33","date_gmt":"2022-04-19T20:23:33","guid":{"rendered":"https:\/\/www.upgreat.pl\/?page_id=970"},"modified":"2023-03-23T11:08:05","modified_gmt":"2023-03-23T11:08:05","slug":"zarzadzanie-ryzykiem","status":"publish","type":"page","link":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/","title":{"rendered":"Risk management"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"970\" class=\"elementor elementor-970\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d2576a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d2576a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cf75c6\" data-id=\"3cf75c6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43c912b elementor-widget elementor-widget-heading\" data-id=\"43c912b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Risk management<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d035f6a elementor-widget elementor-widget-breadcrumbs\" data-id=\"d035f6a\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.upgreat.pl\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f6bb74d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f6bb74d\" data-element_type=\"section\" id=\"tabs-nav\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b1a5cdf\" data-id=\"b1a5cdf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d085ff9 elementor-widget elementor-widget-heading\" data-id=\"d085ff9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\">Security of IT systems<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc45979 elementor-nav-menu--dropdown-none menu-oferta elementor-widget elementor-widget-nav-menu\" data-id=\"bc45979\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;vertical&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;i class=\\&quot;fas fa-caret-down\\&quot; aria-hidden=\\&quot;true\\&quot;&gt;&lt;\\\/i&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<nav aria-label=\"Menu\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-vertical e--pointer-background e--animation-fade\">\n\t\t\t\t<ul id=\"menu-1-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\" tabindex=\"-1\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\" tabindex=\"-1\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\" tabindex=\"-1\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\" tabindex=\"-1\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\" tabindex=\"-1\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\" tabindex=\"-1\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1abc68b\" data-id=\"1abc68b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4658ab9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4658ab9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f0b46cb\" data-id=\"f0b46cb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f2d91b elementor-widget elementor-widget-text-editor\" data-id=\"6f2d91b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In order to properly care for the security of the ICT infrastructure and the company, it is necessary to properly learn and audit the solutions used in terms of problems that may cause a break in their work. Each of the systems having a direct or indirect impact on the company&#039;s business processes should be inventoried and the threats that may affect its stability should be named and assessed in terms of the probability of their occurrence. For each of the possible threats, it is also necessary to estimate the possible costs that the company will incur if they occur. To help you define, analyze and minimize the existing threats, our company offers the following services<\/p><ul><li>Development of BIA (Business Impact Analysis) aimed at defining and assessing the impact of individual threats on business operations<\/li><li>Development of business continuity plans and procedures<\/li><li>Development of DR (Disaster Recovery) procedures to restore the proper functioning of business processes in the event of critical events (flood, fire, theft of infrastructure elements, etc.)<\/li><li>Development of security policies and regulations tailored to the company<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Risk Management IT Systems Security In order to properly care for the security of the ICT infrastructure and the company, it is necessary to get to know and audit the applied solutions in terms of problems that may cause a break in their work. Each of the systems that have a direct or indirect impact on the company&#039;s business processes should be inventoried, and threats that may affect its stability should be named [...]<\/p>","protected":false},"author":1,"featured_media":0,"parent":456,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-970","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zarz\u0105dzanie ryzykiem, analiza BIA, Disaster Recovery Plan | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zarz\u0105dzanie ryzykiem, analiza BIA, Disaster Recovery Plan | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\" \/>\n<meta property=\"og:description\" content=\"Zarz\u0105dzanie ryzykiem Bezpiecze\u0144stwo System\u00f3w IT Aby w\u0142a\u015bciwie dba\u0107 o bezpiecze\u0144stwo infrastruktury teleinformatycznej i firmy konieczne jest odpowiednie poznanie i audytowanie stosowanych rozwi\u0105za\u0144 pod k\u0105tem problem\u00f3w, kt\u00f3re mog\u0105 spowodowa\u0107 przerw\u0119 w ich pracy. Ka\u017cdy z system\u00f3w maj\u0105cych bezpo\u015bredni lub po\u015bredni wp\u0142yw na procesy biznesowe firmy powinien by\u0107 zinwentaryzowany a zagro\u017cenia mog\u0105ce wp\u0142yn\u0105\u0107 na jego stabilno\u015b\u0107 nazwane [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-23T11:08:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\",\"url\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\",\"name\":\"Zarz\u0105dzanie ryzykiem, analiza BIA, Disaster Recovery Plan | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"datePublished\":\"2022-04-19T20:23:33+00:00\",\"dateModified\":\"2023-03-23T11:08:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bezpiecze\u0144stwo System\u00f3w IT\",\"item\":\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zarz\u0105dzanie ryzykiem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risk management, BIA analysis, Disaster Recovery Plan | UpGreat.pl \u2013 professional IT services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/","og_locale":"en_US","og_type":"article","og_title":"Zarz\u0105dzanie ryzykiem, analiza BIA, Disaster Recovery Plan | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne","og_description":"Zarz\u0105dzanie ryzykiem Bezpiecze\u0144stwo System\u00f3w IT Aby w\u0142a\u015bciwie dba\u0107 o bezpiecze\u0144stwo infrastruktury teleinformatycznej i firmy konieczne jest odpowiednie poznanie i audytowanie stosowanych rozwi\u0105za\u0144 pod k\u0105tem problem\u00f3w, kt\u00f3re mog\u0105 spowodowa\u0107 przerw\u0119 w ich pracy. Ka\u017cdy z system\u00f3w maj\u0105cych bezpo\u015bredni lub po\u015bredni wp\u0142yw na procesy biznesowe firmy powinien by\u0107 zinwentaryzowany a zagro\u017cenia mog\u0105ce wp\u0142yn\u0105\u0107 na jego stabilno\u015b\u0107 nazwane [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/","og_site_name":"Upgreat","article_modified_time":"2023-03-23T11:08:05+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/","url":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/","name":"Risk management, BIA analysis, Disaster Recovery Plan | UpGreat.pl \u2013 professional IT services","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"datePublished":"2022-04-19T20:23:33+00:00","dateModified":"2023-03-23T11:08:05+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Bezpiecze\u0144stwo System\u00f3w IT","item":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/"},{"@type":"ListItem","position":3,"name":"Zarz\u0105dzanie ryzykiem"}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=970"}],"version-history":[{"count":11,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/970\/revisions"}],"predecessor-version":[{"id":1697,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/970\/revisions\/1697"}],"up":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/456"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}