{"id":713,"date":"2018-11-05T10:50:41","date_gmt":"2018-11-05T09:50:41","guid":{"rendered":"https:\/\/nexus-on.com\/servicios-seguridad-informatica\/auditorias-de-seguridad\/"},"modified":"2022-02-09T12:43:09","modified_gmt":"2022-02-09T11:43:09","slug":"security-audits","status":"publish","type":"page","link":"https:\/\/nexus-on.com\/en\/computer-security-services\/security-audits\/","title":{"rendered":"Security audits"},"content":{"rendered":"[vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; bg_gradient_direction=&#8221;0&#8243; thb_shape_divider=&#8221;true&#8221; css=&#8221;.vc_custom_1559728498018{padding-bottom: 0px !important;background: #0a0a0a url(https:\/\/nexus-on.com\/wp-content\/uploads\/2019\/06\/bg-about.jpg?id=343) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; divider_shape=&#8221;tilt_v2&#8243; thb_divider_color=&#8221;#f0f0f0&#8243; thb_divider_height=&#8221;100&#8243;][vc_column][vc_row_inner css=&#8221;.vc_custom_1522314053191{padding-top: 25vh !important;padding-bottom: 14vh !important;}&#8221;][vc_column_inner]\t<div id=\"thb-autotype-69de26e61a9fa\" class=\"thb-autotype titleVB\">\n\t\t<h1><label>S<\/label><strong><span class=\"thb-autotype-entry\" data-thb-cursor=\"1\" data-thb-loop=\"\" data-strings=\"[&quot;&lt;font color=\\&quot;#f38700\\&quot;&gt;S&lt;\\\/font&gt;ecurity audits&quot;]\" data-speed=\"50\"><\/span><\/strong><\/h1>\t\t\t\t<style>\n\t\t\t#thb-autotype-69de26e61a9fa .thb-autotype-entry {\n\t\t\t\tcolor: #ffffff;\n\t\t\t}\n\t\t<\/style>\n\t\t\t<\/div>\n\n\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; thb_shape_divider=&#8221;true&#8221; css=&#8221;.vc_custom_1559729008958{padding-top: 70px !important;padding-bottom: 70px !important;background-color: #f0f0f0 !important;}&#8221; divider_shape=&#8221;tilt&#8221; thb_divider_color=&#8221;#ffffff&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_custom_heading text=&#8221;Description&#8221; font_container=&#8221;tag:h2|text_align:left|color:%23343434&#8243; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:500%20bold%20regular%3A500%3Anormal&#8221; el_class=&#8221;subTitleVBOrange&#8221;][vc_column_text]\n<p style=\"text-align: justify;\">The information systems of a Company are <strong>exposed to vulnerabilities<\/strong> that may pose a <strong>risk in IT<\/strong> assets at the level of availability, integrity and confidentiality with the consequent impact on the operation of the business.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;titleResalted&#8221;]<b>Objective<\/b>[\/vc_column_text][vc_column_text]\n<p style=\"text-align: justify;\">Detect vulnerable vectors in the organization, whether external or internal, and as a result, take corrective measures to avoid intrusions, thereby raising the level of security of the IT assets involved.<\/p>\n<div id=\"thb-pricing-column-5cf77be0e6013\" class=\"thb-iconlist \">\n<ul>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> <strong>Secure FootPrint<\/strong><\/li>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><strong><i class=\"fas fa-check\"><\/i> External Audit (Pentesting)<\/strong><\/li>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><strong><i class=\"fas fa-check\"><\/i> Internal Audit<\/strong><\/li>\n<\/ul>\n<style>#thb-pricing-column-5cf77be0e6013.thb-iconlist .fa {color: #f28600;}<\/style>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;titleResalted&#8221;]<b>Benefits<\/b>[\/vc_column_text][vc_column_text]\n<p style=\"text-align: justify;\">Have a real view on the level of security.<\/p>\n<div id=\"thb-pricing-column-5cf77be0ec085\" class=\"thb-iconlist \">\n<ul>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> <strong>Vulnerabilities detected<\/strong><\/li>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><strong><i class=\"fas fa-check\"><\/i> Level of impact in the organization<\/strong><\/li>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><strong><i class=\"fas fa-check\"><\/i> Risk mitigation measures<\/strong><\/li>\n<\/ul>\n<style>#thb-pricing-column-5cf77be0ec085.thb-iconlist .fa {color: #f28600;}<\/style>\n<\/div>\n<p style=\"text-align: justify;\">At the end of the audit, and as a result of this, a report is made with the current situation in detail and the recommendations to be followed.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_separator][vc_column_text el_class=&#8221;boxResalted&#8221;]We offer the possibility of having regular support and monitoring through an <b>Annual Cybersecurity Plan.<\/b>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; thb_shape_divider=&#8221;true&#8221; css=&#8221;.vc_custom_1559728591611{padding-top: 70px !important;padding-bottom: 70px !important;background-color: #ffffff !important;}&#8221; divider_shape=&#8221;tilt_v2&#8243; thb_divider_color=&#8221;#f0f0f0&#8243;][vc_column][vc_row_inner][vc_column_inner][vc_custom_heading text=&#8221;Secure Footprint&#8221; font_container=&#8221;tag:h2|text_align:left|color:%23343434&#8243; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:500%20bold%20regular%3A500%3Anormal&#8221; el_class=&#8221;subTitleVBOrange&#8221;][vc_column_text]Companies over time leave their &#8220;fingerprint&#8221; on the Internet. This footprint includes all the data that a company has published or propagates (documentation, emails, metadata, etc.) outside its domain, as well as the technologies used.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;titleResalted&#8221;]<b>Objective<\/b>[\/vc_column_text][vc_column_text]Through the <b>\u201cSecure FootPrint\u201d<\/b> audit, information published and available on the Internet is searched to validate the level of existing security.<\/p>\n<p>Depending on the result obtained, an <b>External Audit<\/b> is carried out.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;titleResalted&#8221;]<b>Benefits<\/b>[\/vc_column_text][vc_column_text]Identification of the security level of the architecture used in the construction of the Company&#8217;s web environment.<\/p>\n<p>Report with relevant data regarding the URL or IP:<\/p>\n<div id=\"thb-pricing-column-5cf77be0ec085\" class=\"thb-iconlist \">\n<ul>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Encryption algorithms, metadata, architecture used, access validation&#8230;<\/li>\n<\/ul>\n<style>#thb-pricing-column-5cf77be0ec085.thb-iconlist .fa {color: #f28600;}<\/style>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_separator][vc_column_text el_class=&#8221;boxResalted&#8221;]It is a <u><b>non-intrusive analysis<\/b><\/u> (there is no impact on the Company&#8217;s infrastructure), since the information is public and accessible through the Internet.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; thb_shape_divider=&#8221;true&#8221; css=&#8221;.vc_custom_1559729018500{padding-top: 70px !important;padding-bottom: 70px !important;background-color: #f0f0f0 !important;}&#8221; divider_shape=&#8221;tilt&#8221; thb_divider_color=&#8221;#ffffff&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_custom_heading text=&#8221;External Audit&#8221; font_container=&#8221;tag:h2|text_align:left|color:%23343434&#8243; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:500%20bold%20regular%3A500%3Anormal&#8221; el_class=&#8221;subTitleVBOrange&#8221;][vc_column_text]In addition to being aware of public and published information, Companies must know the degree of <strong>exposure to threats<\/strong>, on which their web services are based.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;titleResalted&#8221;]<b>Objective<\/b>[\/vc_column_text][vc_column_text]\n<div id=\"thb-pricing-column-5cf77be0ec085\" class=\"thb-iconlist \">\n<ul>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Identify vulnerabilities of the different services (IP\u2019s, URL\u2019s).<\/li>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Have an overview of the current status of services.<\/li>\n<\/ul>\n<style>#thb-pricing-column-5cf77be0ec085.thb-iconlist .fa {color: #f28600;}<\/style>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;titleResalted&#8221;]<b>Benefits<\/b>[\/vc_column_text][vc_column_text]\n<div id=\"thb-pricing-column-5cf77be0ec085\" class=\"thb-iconlist \">\n<ul>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Know the vulnerabilities that could be likely to be used by any attacker, as well as being aware of the degree of criticality and actions to be taken to mitigate them.<\/li>\n<\/ul>\n<style>#thb-pricing-column-5cf77be0ec085.thb-iconlist .fa {color: #f28600;}<\/style>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_separator][vc_column_text el_class=&#8221;boxResalted&#8221;]\n<p style=\"text-align: justify;\">It is an <u><b>intrusive analysis<\/b><\/u>. For its realization, we rely on:<\/p>\n<div id=\"thb-pricing-column-5cf77be0ec0805\" class=\"thb-iconlist text-left\">\n<ul class=\"text-left\">\n<li class=\"text-left thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> In international standards, mainly OWASP and OSSTMM.<\/li>\n<li class=\"text-left thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> In Own Creation Methods and Tools, which allow not only to perform status checks, but to increase the vulnerability detection rate.<\/li>\n<\/ul>\n<style>#thb-pricing-column-5cf77be0ec0805.thb-iconlist .fa {color: #f28600;}<\/style>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; thb_shape_divider=&#8221;true&#8221; css=&#8221;.vc_custom_1559728476793{padding-top: 70px !important;padding-bottom: 70px !important;background-color: #ffffff !important;}&#8221; divider_shape=&#8221;waves_alt&#8221; thb_divider_color=&#8221;#e4e4e4&#8243;][vc_column][vc_row_inner][vc_column_inner][vc_custom_heading text=&#8221;Internal Audit&#8221; font_container=&#8221;tag:h2|text_align:left|color:%23343434&#8243; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:500%20bold%20regular%3A500%3Anormal&#8221; el_class=&#8221;subTitleVBOrange&#8221;][vc_column_text]Companies must be aware that the data they use in operations and decision-making are collected and stored in information systems, which are <strong>susceptible to attacks<\/strong>, such as ransomware, malware, theft, etc.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;titleResalted&#8221;]<b>Objective<\/b>[\/vc_column_text][vc_column_text]\n<div id=\"thb-pricing-column-5cf77be0ec085\" class=\"thb-iconlist \">\n<ul>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Have an overview of the current status of the assets that are part of the information systems.<\/li>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Identify the vulnerabilities of different types of assets.<\/li>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Mitigate the risk associated with the identified vulnerabilities.<\/li>\n<\/ul>\n<style>#thb-pricing-column-5cf77be0ec085.thb-iconlist .fa {color: #f28600;}<\/style>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;titleResalted&#8221;]<b>Benefits<\/b>[\/vc_column_text][vc_column_text]\n<div id=\"thb-pricing-column-5cf77be0ec085\" class=\"thb-iconlist \">\n<ul>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Know the impact of vulnerabilities.<\/li>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Corrective actions on how to mitigate identified vulnerabilities.<\/li>\n<li class=\"thb-iconlist-li animation left-to-right\" style=\"visibility: inherit; opacity: 1; transform: matrix(1, 0, 0, 1, 0, 0);\"><i class=\"fas fa-check\"><\/i> Recommendations and application of best practices for the security of the assets involved.<\/li>\n<\/ul>\n<style>#thb-pricing-column-5cf77be0ec085.thb-iconlist .fa {color: #f28600;}<\/style>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_separator][vc_column_text el_class=&#8221;boxResalted&#8221;]\n<p style=\"text-align: justify;\">It is an <strong><u>intrusive Analysis in which no vulnerability<\/u><\/strong> is exploited that jeopardizes the confidentiality, integrity and availability of information systems.<\/p>\n<p style=\"text-align: justify;\">We provide, through our knowledge and good practices, the corrective measures to apply.<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; thb_shape_divider=&#8221;true&#8221; css=&#8221;.vc_custom_1559725321048{padding-top: 70px !important;padding-bottom: 100px !important;background-color: #e4e4e4 !important;}&#8221; divider_shape=&#8221;triangle&#8221; thb_divider_color=&#8221;#050505&#8243; thb_divider_height=&#8221;100&#8243;][vc_column][vc_row_inner css=&#8221;.vc_custom_1559740125401{background-color: #e4e4e4 !important;}&#8221; el_class=&#8221;callToActionVB&#8221;][vc_column_inner][vc_cta h2=&#8221;Are you interested in this service for your company?&#8221; add_button=&#8221;right&#8221; btn_title=&#8221;Contact&#8221; btn_style=&#8221;custom&#8221; btn_custom_background=&#8221;#f28600&#8243; btn_custom_text=&#8221;#ffffff&#8221; btn_size=&#8221;lg&#8221; btn_align=&#8221;right&#8221; btn_i_align=&#8221;right&#8221; btn_i_icon_fontawesome=&#8221;fas fa-angle-double-right&#8221; add_icon=&#8221;left&#8221; i_icon_fontawesome=&#8221;fas fa-envelope&#8221; i_color=&#8221;custom&#8221; i_size=&#8221;xl&#8221; i_css_animation=&#8221;slideInLeft&#8221; btn_add_icon=&#8221;true&#8221; btn_link=&#8221;url:https%3A%2F%2Fnexus-on.com%2Fen%2Fcontact%2F|title:Contact||&#8221; css=&#8221;.vc_custom_1563971787334{border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;background-color: #e4e4e4 !important;border-left-style: inherit !important;border-right-style: inherit !important;border-top-style: inherit !important;border-bottom-style: inherit !important;}&#8221; i_custom_color=&#8221;#f28600&#8243; i_link=&#8221;url:https%3A%2F%2Fnexus-on.com%2Fcontacto%2F|title:Contacto||&#8221;]Get in touch with us, solve your doubts or ask us for a personalized quote[\/vc_cta][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; bg_gradient_direction=&#8221;0&#8243; thb_shape_divider=&#8221;true&#8221; css=&#8221;.vc_custom_1559728498018{padding-bottom: 0px !important;background: #0a0a0a url(https:\/\/nexus-on.com\/wp-content\/uploads\/2019\/06\/bg-about.jpg?id=343) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; divider_shape=&#8221;tilt_v2&#8243; thb_divider_color=&#8221;#f0f0f0&#8243; thb_divider_height=&#8221;100&#8243;][vc_column][vc_row_inner css=&#8221;.vc_custom_1522314053191{padding-top: 25vh !important;padding-bottom: 14vh !important;}&#8221;][vc_column_inner][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row thb_full_width=&#8221;true&#8221; thb_row_padding=&#8221;true&#8221; thb_column_padding=&#8221;true&#8221; thb_shape_divider=&#8221;true&#8221; css=&#8221;.vc_custom_1559729008958{padding-top: 70px !important;padding-bottom: 70px !important;background-color: #f0f0f0 !important;}&#8221; divider_shape=&#8221;tilt&#8221; thb_divider_color=&#8221;#ffffff&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_custom_heading text=&#8221;Description&#8221; font_container=&#8221;tag:h2|text_align:left|color:%23343434&#8243; google_fonts=&#8221;font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:500%20bold%20regular%3A500%3Anormal&#8221; el_class=&#8221;subTitleVBOrange&#8221;][vc_column_text] The information systems of a Company are exposed to vulnerabilities that may&hellip;<\/p>\n","protected":false},"author":1,"featured_media":582,"parent":707,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-713","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/pages\/713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/comments?post=713"}],"version-history":[{"count":9,"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/pages\/713\/revisions"}],"predecessor-version":[{"id":1211,"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/pages\/713\/revisions\/1211"}],"up":[{"embeddable":true,"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/pages\/707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/media\/582"}],"wp:attachment":[{"href":"https:\/\/nexus-on.com\/en\/wp-json\/wp\/v2\/media?parent=713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}