{"id":7658,"date":"2024-01-30T15:54:41","date_gmt":"2024-01-30T14:54:41","guid":{"rendered":"https:\/\/www.mild.se\/cybersakerhet-i-sveriges-digitala-landskap-hog-tid-att-se-over-era-losningar-2\/"},"modified":"2024-02-27T15:30:46","modified_gmt":"2024-02-27T14:30:46","slug":"cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions","status":"publish","type":"post","link":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/","title":{"rendered":"Cybersecurity in Sweden&#8217;s digital landscape &#8211; time to review your solutions"},"content":{"rendered":"<div class=\"block core-paragraph container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<p>The recent surge in cyber threats has likely not escaped anyone's notice. In a world where our digital solutions are becoming increasingly integrated into our daily lives, the importance of cybersecurity has also grown exponentially. From small companies to large corporations being targeted by cyber threats, it is evident that no one is completely immune or safe. Recently, Swedish companies have faced a series of cyber attacks, causing significant disruptions and security issues. The recent cyber attacks on major Swedish companies and organizations have demonstrated the vulnerability of systems and the destructive impact a cyber attack can have.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"block core-heading container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<h2 class=\"wp-block-heading\">Common cyber attack methods<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"block core-paragraph container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<p>Cyber attacks can take several forms, but the most common methods include phishing, ransomware, and DDoS attacks. Phishing uses deceptive messages to trick users into revealing sensitive information. Ransomware is malicious code that encrypts the victim's data and demands a ransom to unlock it. DDoS attacks overload target servers with traffic, causing system outages and major disruptions.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"block core-heading container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<h2 class=\"wp-block-heading\">Cybersecurity for small businesses<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"block core-paragraph container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<p>It is a common misconception that smaller businesses are not attractive targets for cybercriminals. However, the reality is that smaller organizations are often particularly vulnerable because they may lack the resources and security infrastructure that larger companies have. This makes them easier targets for cyber attacks. Being a smaller business does not mean being safer; rather, the consequences of an attack can be even more devastating, with less capacity to recover quickly.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"block core-heading container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<h2 class=\"wp-block-heading\">Why It's important to take action now<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"block core-paragraph container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<p>Recent events serve as a reminder that it has never been more important to review, evaluate, and strengthen digital security measures and routines. Companies must be proactive in protecting their data, systems, and operations. Identifying and addressing security vulnerabilities is not only a technical necessity but should be prioritized as the potential cost can be significant.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"block core-heading container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<h2 class=\"wp-block-heading\">A continuous process, not a one-time project<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"block core-paragraph container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<p>One of the most important insights when it comes to cybersecurity is that it is not a one-time effort or something that can be done sporadically. Instead, it requires a constant, proactive approach to security. Cybersecurity is an ongoing effort that requires daily attention and regular updates. It involves constantly evaluating and improving security measures, educating staff, and being vigilant against new threats. In short, ensuring that there is a widespread security mindset that permeates your entire organization.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"block core-heading container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<h2 class=\"wp-block-heading\">We are here to discuss security and safety online<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"block core-paragraph container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<p>As a digital agency, we understand the importance of robust cybersecurity. When it comes to WordPress and hosting, our methods and solutions have been effective. For customers in Mild Cloud, we ensure the following:<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"block core-list container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<ul class=\"wp-block-list\">\n<li><strong>Firewalls for Protection: <\/strong>Our firewalls protect against not only DDoS attacks but also other common cyber threats.<\/li>\n\n\n\n<li><strong>No Unauthorized Logins or Injections:<\/strong> We have implemented systems that effectively prevent unauthorized access and injections.<\/li>\n\n\n\n<li><strong>Detection of Malicious Code:<\/strong> When taking over an existing website, we often detect malicious code. We ensure that the platforms are secure and free from such threats.<\/li>\n\n\n\n<li><strong>Advanced Security Measures as Standard:<\/strong> With features like file locking, we can ensure that no malicious code is injected. Everything is locked until it needs to be opened, providing an extra level of security.<\/li>\n\n\n\n<li><strong>Cloud Firewalls and Operational Reliability:<\/strong> We guarantee operational reliability by mirroring everything in another data center. With failover solutions, we can ensure continuity even during unforeseen events.<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n\n<div class=\"block core-paragraph container \"><div class=\"row justify-content-center\"><div class=\"col-lg-8\">\n<p><br>That being said, there are always additional measures and vulnerabilities that can be addressed. If you are concerned or considering how to evaluate your systems, we are happy to help and start an initial dialogue.<\/p>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The recent surge in cyber threats has likely not escaped anyone&#8217;s notice. In a world where our digital solutions are becoming increasingly integrated into our daily lives, the importance of cybersecurity has also grown exponentially.<\/p>\n","protected":false},"author":1,"featured_media":7132,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[222],"tags":[],"class_list":["post-7658","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insikter-fran-branschen-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in Sweden&#039;s digital landscape - time to review your solutions - Mild<\/title>\n<meta name=\"description\" content=\"The recent surge in cyber threats has likely not escaped anyone&#039;s notice. In a world where our digital solutions are becoming increasingly integrated into our daily lives, the importance of cybersecurity has also grown exponentially.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in Sweden&#039;s digital landscape - time to review your solutions - Mild\" \/>\n<meta property=\"og:description\" content=\"The recent surge in cyber threats has likely not escaped anyone&#039;s notice. In a world where our digital solutions are becoming increasingly integrated into our daily lives, the importance of cybersecurity has also grown exponentially.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Mild\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mildmedia\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-30T14:54:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-27T14:30:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mild.se\/wp-content\/uploads\/2024\/01\/thumbnail-cybersakerhet-mild.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"noreply@mildmedia.se\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"noreply@mildmedia.se\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/\"},\"author\":{\"name\":\"noreply@mildmedia.se\",\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/#\\\/schema\\\/person\\\/b9378373e6b4a72da339f8d15c519aad\"},\"headline\":\"Cybersecurity in Sweden&#8217;s digital landscape &#8211; time to review your solutions\",\"datePublished\":\"2024-01-30T14:54:41+00:00\",\"dateModified\":\"2024-02-27T14:30:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/\"},\"wordCount\":597,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mild.se\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/thumbnail-cybersakerhet-mild.jpg\",\"articleSection\":[\"Insights from the industry\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/\",\"url\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/\",\"name\":\"Cybersecurity in Sweden's digital landscape - time to review your solutions - Mild\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mild.se\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/thumbnail-cybersakerhet-mild.jpg\",\"datePublished\":\"2024-01-30T14:54:41+00:00\",\"dateModified\":\"2024-02-27T14:30:46+00:00\",\"description\":\"The recent surge in cyber threats has likely not escaped anyone's notice. In a world where our digital solutions are becoming increasingly integrated into our daily lives, the importance of cybersecurity has also grown exponentially.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mild.se\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/thumbnail-cybersakerhet-mild.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mild.se\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/thumbnail-cybersakerhet-mild.jpg\",\"width\":700,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mild.se\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in Sweden&#8217;s digital landscape &#8211; time to review your solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mild.se\\\/en\\\/\",\"name\":\"Mild\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mild.se\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/#organization\",\"name\":\"Mild\",\"url\":\"https:\\\/\\\/www.mild.se\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mild.se\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/logotype-social-mild.png\",\"contentUrl\":\"https:\\\/\\\/www.mild.se\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/logotype-social-mild.png\",\"width\":1080,\"height\":1080,\"caption\":\"Mild\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mildmedia\\\/\",\"https:\\\/\\\/www.instagram.com\\\/mildmedia\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mild-media\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mild.se\\\/en\\\/#\\\/schema\\\/person\\\/b9378373e6b4a72da339f8d15c519aad\",\"name\":\"noreply@mildmedia.se\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f0fccb7434988c70ea66c2a5db05102e4b7ea8d34d6097f92abbc1174b13d2a5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f0fccb7434988c70ea66c2a5db05102e4b7ea8d34d6097f92abbc1174b13d2a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f0fccb7434988c70ea66c2a5db05102e4b7ea8d34d6097f92abbc1174b13d2a5?s=96&d=mm&r=g\",\"caption\":\"noreply@mildmedia.se\"},\"sameAs\":[\"https:\\\/\\\/www.mild.se\"],\"url\":\"https:\\\/\\\/www.mild.se\\\/en\\\/author\\\/noreplymildmedia-se\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in Sweden's digital landscape - time to review your solutions - Mild","description":"The recent surge in cyber threats has likely not escaped anyone's notice. In a world where our digital solutions are becoming increasingly integrated into our daily lives, the importance of cybersecurity has also grown exponentially.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in Sweden's digital landscape - time to review your solutions - Mild","og_description":"The recent surge in cyber threats has likely not escaped anyone's notice. In a world where our digital solutions are becoming increasingly integrated into our daily lives, the importance of cybersecurity has also grown exponentially.","og_url":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/","og_site_name":"Mild","article_publisher":"https:\/\/www.facebook.com\/mildmedia\/","article_published_time":"2024-01-30T14:54:41+00:00","article_modified_time":"2024-02-27T14:30:46+00:00","og_image":[{"width":700,"height":560,"url":"https:\/\/www.mild.se\/wp-content\/uploads\/2024\/01\/thumbnail-cybersakerhet-mild.jpg","type":"image\/jpeg"}],"author":"noreply@mildmedia.se","twitter_card":"summary_large_image","twitter_misc":{"Written by":"noreply@mildmedia.se","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/#article","isPartOf":{"@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/"},"author":{"name":"noreply@mildmedia.se","@id":"https:\/\/www.mild.se\/en\/#\/schema\/person\/b9378373e6b4a72da339f8d15c519aad"},"headline":"Cybersecurity in Sweden&#8217;s digital landscape &#8211; time to review your solutions","datePublished":"2024-01-30T14:54:41+00:00","dateModified":"2024-02-27T14:30:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/"},"wordCount":597,"publisher":{"@id":"https:\/\/www.mild.se\/en\/#organization"},"image":{"@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mild.se\/wp-content\/uploads\/2024\/01\/thumbnail-cybersakerhet-mild.jpg","articleSection":["Insights from the industry"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/","url":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/","name":"Cybersecurity in Sweden's digital landscape - time to review your solutions - Mild","isPartOf":{"@id":"https:\/\/www.mild.se\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mild.se\/wp-content\/uploads\/2024\/01\/thumbnail-cybersakerhet-mild.jpg","datePublished":"2024-01-30T14:54:41+00:00","dateModified":"2024-02-27T14:30:46+00:00","description":"The recent surge in cyber threats has likely not escaped anyone's notice. In a world where our digital solutions are becoming increasingly integrated into our daily lives, the importance of cybersecurity has also grown exponentially.","breadcrumb":{"@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/#primaryimage","url":"https:\/\/www.mild.se\/wp-content\/uploads\/2024\/01\/thumbnail-cybersakerhet-mild.jpg","contentUrl":"https:\/\/www.mild.se\/wp-content\/uploads\/2024\/01\/thumbnail-cybersakerhet-mild.jpg","width":700,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/www.mild.se\/en\/cybersecurity-in-swedens-digital-landscape-time-to-review-your-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mild.se\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in Sweden&#8217;s digital landscape &#8211; time to review your solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.mild.se\/en\/#website","url":"https:\/\/www.mild.se\/en\/","name":"Mild","description":"","publisher":{"@id":"https:\/\/www.mild.se\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mild.se\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mild.se\/en\/#organization","name":"Mild","url":"https:\/\/www.mild.se\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mild.se\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mild.se\/wp-content\/uploads\/2020\/10\/logotype-social-mild.png","contentUrl":"https:\/\/www.mild.se\/wp-content\/uploads\/2020\/10\/logotype-social-mild.png","width":1080,"height":1080,"caption":"Mild"},"image":{"@id":"https:\/\/www.mild.se\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mildmedia\/","https:\/\/www.instagram.com\/mildmedia\/","https:\/\/www.linkedin.com\/company\/mild-media\/"]},{"@type":"Person","@id":"https:\/\/www.mild.se\/en\/#\/schema\/person\/b9378373e6b4a72da339f8d15c519aad","name":"noreply@mildmedia.se","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f0fccb7434988c70ea66c2a5db05102e4b7ea8d34d6097f92abbc1174b13d2a5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f0fccb7434988c70ea66c2a5db05102e4b7ea8d34d6097f92abbc1174b13d2a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0fccb7434988c70ea66c2a5db05102e4b7ea8d34d6097f92abbc1174b13d2a5?s=96&d=mm&r=g","caption":"noreply@mildmedia.se"},"sameAs":["https:\/\/www.mild.se"],"url":"https:\/\/www.mild.se\/en\/author\/noreplymildmedia-se\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/posts\/7658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/comments?post=7658"}],"version-history":[{"count":12,"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/posts\/7658\/revisions"}],"predecessor-version":[{"id":7849,"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/posts\/7658\/revisions\/7849"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/media\/7132"}],"wp:attachment":[{"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/media?parent=7658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/categories?post=7658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mild.se\/en\/wp-json\/wp\/v2\/tags?post=7658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}