{"id":2176,"date":"2022-04-23T01:29:17","date_gmt":"2022-04-23T01:29:17","guid":{"rendered":"https:\/\/www.keytech.be\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/"},"modified":"2022-09-27T13:25:58","modified_gmt":"2022-09-27T13:25:58","slug":"les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques","status":"publish","type":"post","link":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/","title":{"rendered":"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:calc( 1260px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:75%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:83.333333333333%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:capitalize;--fontSize:38;line-height:1.4;\">Un ancien d\u00e9bat relanc\u00e9 : h\u00e9bergement local ou h\u00e9bergement dans le cloud ?<\/h2><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-1\"><p>La n\u00e9cessit\u00e9 d\u2019une vigilance accrue pour s\u00e9curiser les syst\u00e8mes h\u00e9berg\u00e9s dans ses propres locaux a\u00a0augment\u00e9 fortement la pression et le co\u00fbt de la maintenance, et cette tendance se poursuivra.<\/p>\n<p>Vous connaissez les arguments qui plaident en faveur du cloud (r\u00e9duction des investissements, maitrise des co\u00fbts, reprise d\u2019activit\u00e9 rapide en cas de sinistre, s\u00e9curisation et mises \u00e0 jour effectu\u00e9es par le fournisseur, acc\u00e8s permanent, \u2026)\u00a0<strong>et cependant vous h\u00e9sitez \u00e0 faire la transition vers un environnement cloud complet ?<\/strong><\/p>\n<p><strong>C\u2019est bien compr\u00e9hensible<\/strong>, surtout si vous avez des questions auxquelles vous n\u2019avez jamais eu de r\u00e9ponses satisfaisantes, telles que\u00a0:<\/p>\n<ul>\n<li>Qui garantit la confidentialit\u00e9 et la disponibilit\u00e9 permanente de mes donn\u00e9es ?<\/li>\n<li>Est-ce que le \u2018\u2019cloud computing\u2019\u2019 est assez flexible pour mes besoins sp\u00e9cifiques\u00a0?<\/li>\n<li>Mes donn\u00e9es dans le cloud sont-elles r\u00e9ellement mieux prot\u00e9g\u00e9es que sur un ordinateur ou serveur local\u00a0?<\/li>\n<li>Cette \u00e9volution vers le cloud est-elle irr\u00e9versible ou plut\u00f4t une tendance cyclique qui se dissipera \u00e0 nouveau\u00a0?<\/li>\n<li>Est-ce que les clients qui ont fait le pas vers une environnement cloud global ont r\u00e9ellement exp\u00e9riment\u00e9 une meilleure qui\u00e9tude et stabilit\u00e9 ?<\/li>\n<li>Autres questions\u2026 ?<\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;text-transform:none;--fontSize:28;--minFontSize:28;line-height:1.4;\">Vous cherchez des r\u00e9ponses ?<\/h3><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:10px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-2\"><p>N\u2019h\u00e9sitez pas \u00e0 nous poser vos questions\u00a0et nos experts informatiques vous aideront volontiers avec des r\u00e9ponses franches et sans \u00e9quivoques.<\/p>\n<p><strong>KeyTech a \u00e9t\u00e9 cr\u00e9\u00e9 il y a 20 ans avec l\u2019objectif de faire du cloud sa principale occupation et est heureux de pourvoir mettre aujourd\u2019hui son expertise \u00e0 disposition de ses clients.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Un ancien d\u00e9bat relanc\u00e9 : h\u00e9bergement local ou h\u00e9bergement dans le cloud ?<\/p>\n","protected":false},"author":1,"featured_media":2105,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[42,46],"tags":[],"class_list":["post-2176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-fr","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques - KeyTech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques - KeyTech\" \/>\n<meta property=\"og:description\" content=\"Un ancien d\u00e9bat relanc\u00e9 : h\u00e9bergement local ou h\u00e9bergement dans le cloud ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/\" \/>\n<meta property=\"og:site_name\" content=\"KeyTech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/keytech.be\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-23T01:29:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-27T13:25:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:site\" content=\"@keytechbe\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/person\\\/970d0d8908bc7db4a640b796ccc07f86\"},\"headline\":\"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques\",\"datePublished\":\"2022-04-23T01:29:17+00:00\",\"dateModified\":\"2022-09-27T13:25:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/\"},\"wordCount\":1025,\"publisher\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/baremetal.jpg\",\"articleSection\":[\"Cloud\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-BE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/\",\"name\":\"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques - KeyTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/baremetal.jpg\",\"datePublished\":\"2022-04-23T01:29:17+00:00\",\"dateModified\":\"2022-09-27T13:25:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/#breadcrumb\"},\"inLanguage\":\"fr-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-BE\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/baremetal.jpg\",\"contentUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/baremetal.jpg\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"name\":\"KeyTech\",\"description\":\"Digital innovation with a human touch\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-BE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#organization\",\"name\":\"KeyTech\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-BE\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"contentUrl\":\"https:\\\/\\\/www.keytech.be\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/LogoKeyTech.jpg\",\"width\":500,\"height\":500,\"caption\":\"KeyTech\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/keytech.be\",\"https:\\\/\\\/x.com\\\/keytechbe\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/keytechbelgium\",\"https:\\\/\\\/www.instagram.com\\\/keytech.be\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.keytech.be\\\/en\\\/#\\\/schema\\\/person\\\/970d0d8908bc7db4a640b796ccc07f86\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.keytech.be\\\/fr\\\/author\\\/admin_ktu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques - KeyTech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/","og_locale":"fr_FR","og_type":"article","og_title":"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques - KeyTech","og_description":"Un ancien d\u00e9bat relanc\u00e9 : h\u00e9bergement local ou h\u00e9bergement dans le cloud ?","og_url":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/","og_site_name":"KeyTech","article_publisher":"https:\/\/www.facebook.com\/keytech.be","article_published_time":"2022-04-23T01:29:17+00:00","article_modified_time":"2022-09-27T13:25:58+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@keytechbe","twitter_site":"@keytechbe","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture est.":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/#article","isPartOf":{"@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/"},"author":{"name":"admin","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86"},"headline":"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques","datePublished":"2022-04-23T01:29:17+00:00","dateModified":"2022-09-27T13:25:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/"},"wordCount":1025,"publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"image":{"@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","articleSection":["Cloud","S\u00e9curit\u00e9"],"inLanguage":"fr-BE"},{"@type":"WebPage","@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/","url":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/","name":"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques - KeyTech","isPartOf":{"@id":"https:\/\/www.keytech.be\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/#primaryimage"},"image":{"@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","datePublished":"2022-04-23T01:29:17+00:00","dateModified":"2022-09-27T13:25:58+00:00","breadcrumb":{"@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/#breadcrumb"},"inLanguage":"fr-BE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-BE","@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/#primaryimage","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/09\/baremetal.jpg","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.keytech.be\/fr\/les-infrastructures-locales-de-plus-en-plus-vulnerables-aux-cyberattaques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.keytech.be\/fr\/"},{"@type":"ListItem","position":2,"name":"Les infrastructures locales de plus en plus vuln\u00e9rables aux cyberattaques"}]},{"@type":"WebSite","@id":"https:\/\/www.keytech.be\/en\/#website","url":"https:\/\/www.keytech.be\/en\/","name":"KeyTech","description":"Digital innovation with a human touch","publisher":{"@id":"https:\/\/www.keytech.be\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.keytech.be\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-BE"},{"@type":"Organization","@id":"https:\/\/www.keytech.be\/en\/#organization","name":"KeyTech","url":"https:\/\/www.keytech.be\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-BE","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","contentUrl":"https:\/\/www.keytech.be\/wp-content\/uploads\/2022\/06\/LogoKeyTech.jpg","width":500,"height":500,"caption":"KeyTech"},"image":{"@id":"https:\/\/www.keytech.be\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/keytech.be","https:\/\/x.com\/keytechbe","https:\/\/www.linkedin.com\/company\/keytechbelgium","https:\/\/www.instagram.com\/keytech.be\/"]},{"@type":"Person","@id":"https:\/\/www.keytech.be\/en\/#\/schema\/person\/970d0d8908bc7db4a640b796ccc07f86","name":"admin","url":"https:\/\/www.keytech.be\/fr\/author\/admin_ktu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts\/2176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/comments?post=2176"}],"version-history":[{"count":0,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/posts\/2176\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/media\/2105"}],"wp:attachment":[{"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/media?parent=2176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/categories?post=2176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.keytech.be\/fr\/wp-json\/wp\/v2\/tags?post=2176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}