{"id":1665,"date":"2026-02-25T11:16:17","date_gmt":"2026-02-25T11:16:17","guid":{"rendered":"https:\/\/clientsproject.com\/pexo\/?p=1665"},"modified":"2026-02-23T11:47:02","modified_gmt":"2026-02-23T11:47:02","slug":"difference-between-cyber-security-vs-information-security","status":"publish","type":"post","link":"https:\/\/clientsproject.com\/pexo\/difference-between-cyber-security-vs-information-security\/","title":{"rendered":"Difference Between Cyber Security Vs. Information Security"},"content":{"rendered":"\n<p>Nowadays, data has become extremely valuable due to a nation&#8217;s increasing interconnection over the internet. If companies want to protect themselves and comply with the law, specialists should ensure the data is secured against unauthorized access, data leaks, or misuse.<\/p>\n\n\n\n<p>Information Security and Cybersecurity are the two main pillars of such protection. Knowledge of their differences enables organizations to develop a multifaceted, multilayered security architecture. Technical security models state that Information Security is a broader field, and cybersecurity is a specific practice area that addresses digital risks and defends cyberspace.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>What is Cyber Security?<\/h2>\n\n\n\n<p>Cybersecurity is the art or science of protecting computer systems, networks, and applications, and securing data against malware, ransomware, phishing, and unauthorized access. It focuses on the cyber sphere, the area where information is recorded, processed, and transmitted electronically.<\/p>\n\n\n\n<p>It involves the use of advanced technology resources, infrastructure, and response capabilities to identify, prevent and react to attacks of digital infrastructure. These are common cybersecurity practices, which are:<\/p>\n\n\n\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Intrusion Detection systems\/ intrusion prevention systems.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Software of network intrusion detection.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Security event monitoring information management (SIEM).<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identity and Access Management (IAM).<\/p>\n\n\n\n<p>The primary goal of cybersecurity is to safeguard digital assets and systems that are related to the network against new threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Benefits of Cyber Security<\/h2>\n\n\n\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Computer-based crime and Internet fraud insurance.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Securing cloud and web environments as well as mobile environments.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Response to incident and real time threat\/detection.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Business continuity in digital business.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Information Security: What is it?<\/h2>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"375\" data-id=\"1671\" src=\"https:\/\/clientsproject.com\/pexo\/wp-content\/uploads\/2026\/02\/Screenshot_1-edited.png\" alt=\"Information Security\" class=\"wp-image-1671\" title=\"\" srcset=\"https:\/\/clientsproject.com\/pexo\/wp-content\/uploads\/2026\/02\/Screenshot_1-edited.png 500w, https:\/\/clientsproject.com\/pexo\/wp-content\/uploads\/2026\/02\/Screenshot_1-edited-300x225.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/figure>\n<\/div><\/figure>\n\n\n\n<p>Information in all its forms, be it digital, physical, or verbal, should definitely be included in the materials that Information Security (InfoSec) protects from unauthorized viewing, changing, sharing, or destruction. It is grounded on 3 fundamental principles:<\/p>\n\n\n\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Privacy &#8211; Site security by keeping unwarranted people out.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Integrity -Ensuring data safety and consistency.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Availability -The data should be available when needed.<\/p>\n\n\n\n<p>Just as there is no information security in the virtual world, there is no cybersecurity either. It also includes:<\/p>\n\n\n\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Physical security controls<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Administrative policies and procedures.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Corporate compliance and risk management.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Supervision and management of data.<\/p>\n\n\n\n<p>Information security, including cybersecurity, is not an independent strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Advantages of Information Security:<\/h2>\n\n\n\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The information of any type that is kept secret.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Regulatory and legal standards (e.g., ISO 27001, GDPP, HIPAA).<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Decreased chances of insider threat and data leakage.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Risk management and good governance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Difference Between Cyber Security and Information Security<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Aspect<\/strong><\/td><td><strong>Cyber Security<\/strong><\/td><td><strong>Information Security<\/strong><\/td><\/tr><tr><td><strong>Definition<\/strong><\/td><td>Protecting the digital systems, including networks and data, from cyber attacks<\/td><td>Protecting information in all forms from unauthorized access<\/td><\/tr><tr><td><strong>Scope<\/strong><\/td><td>Only Limited to cyberspace<\/td><td>Broader domain that includes cybersecurity<\/td><\/tr><tr><td><strong>Security Focus<\/strong><\/td><td>Digital threats such as malware, phishing, and ransomware<\/td><td>Confidentiality, integrity, and availability of all data<\/td><\/tr><tr><td><strong>Data Protection<\/strong><\/td><td>Protects only digital data<\/td><td>Mainly protects digital, physical, and verbal information<\/td><\/tr><tr><td><strong>Approach<\/strong><\/td><td>Technology-driven and operational<\/td><td>Risk management, governance, and control-driven<\/td><\/tr><tr><td><strong>Threat Coverage<\/strong><\/td><td>Hacking, DoS, advanced persistent threats<\/td><td>Data leakage, unauthorized disclosure, and physical theft<\/td><\/tr><tr><td><strong>Implementation<\/strong><\/td><td>Firewalls, SIEM, endpoint protection<\/td><td>Policies, access control, encryption, compliance frameworks<\/td><\/tr><tr><td><strong>Domain<\/strong><\/td><td>Cyber environment<\/td><td>Organizational and enterprise-wide<\/td><\/tr><tr><td><strong>Relationship<\/strong><\/td><td>Subset of Information Security<\/td><td>Superset that includes cybersecurity<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Information Security and Cyber Security Relationship.<\/h2>\n\n\n\n<p>Information security and cybersecurity are not some exclusive entities, but they are two sides of the same security solution, which are complementary to each other. Information security entails finding out the individuals or groups that require protection, what must be the kind of protection required and why should these measures be put in place.<\/p>\n\n\n\n<p>Say a firm encrypts its database, reinvents its access control policies and physically secures its information hub. In that instance, it will be practicing information security.<\/p>\n\n\n\n<p>In order to ensure data security against computer attacks and to have a well-developed system of cybersecurity, it is necessary to install endpoint detection and network surveillance systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Use Cases in Modern Enterprises<\/h2>\n\n\n\n<p>Cyber Security Use Cases<\/p>\n\n\n\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protecting cloud applications and SaaS.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ransomware attack prevention.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Securing the enterprise networks.<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Incident response and threat hunting.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Information Security Use Cases<\/h2>\n\n\n\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Designing data governance frameworks<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Regulatory compliance and audit readiness<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Business risk assessment<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Secure document lifecycle management<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Why Organizations Need Both?<\/h2>\n\n\n\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The modern-day business is operated in a hybridized world where information is stored in:<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 On-premise infrastructure<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud platforms<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Remote devices<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Physical storage<\/p>\n\n\n\n<p>Cybersecurity alone will lead to suboptimal policy implementation, compliance, and physical data protection, as well as to information security alone; despite robust cybersecurity, the digital infrastructure will remain vulnerable to sophisticated attacks.<\/p>\n\n\n\n<p>A combined strategy ensures:<\/p>\n\n\n\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 End-to-end data protection<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Reduced attack surface<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Improved resilience<br>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Stronger stakeholder trust<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>How Pexo Helps Strengthen Your Cyber Security Strategy<\/h2>\n\n\n\n<p>Every properly working organization requires enterprise-level protection to leverage advanced solutions. <a href=\"https:\/\/clientsproject.com\/pexo\/services\/cyber-security\/\">Pexo provides a broad range of cybersecurity services<\/a>, including vulnerability detection and management, cloud security, and risk management, most of which are tailored to the client\u2019s current digital infrastructure. Based on real-time monitoring, regulatory compliance, and a scalable security architecture, Pexo helps enterprises protect against unknown cyber threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Conclusion<\/h2>\n\n\n\n<p>Information and cybersecurity remain two of the main pillars supporting data security, alongside many other security components, and therefore play a crucial role. Cybersecurity is basically about protecting cyber assets from cyberattack, while the major concern of information security, which is several notches above the former in terms of scope, is the protection of all kinds of information, and it is also controlled through governance, risk management, and control.<\/p>\n\n\n\n<p>Understanding the differences between the two will enable an organization to develop a security architecture that is future-proof, resilient, and layered. Moreover, in a business context, the two should be integrated to provide the highest level of security in a permanently data-driven world, rather than treated as counterparts.<\/p>\n\n    <div class=\"xs_social_share_widget xs_share_url after_content \t\tmain_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content\">\n\n\t\t\n        <ul>\n\t\t\t        <\/ul>\n    <\/div> \n","protected":false},"excerpt":{"rendered":"<p>Nowadays, data has become extremely valuable due to a nation&#8217;s increasing interconnection over the internet. If companies want to protect themselves and comply with the law, specialists should ensure the data is secured against unauthorized access, data leaks, or misuse. Information Security and Cybersecurity are the two main pillars of such protection. Knowledge of their differences enables organizations to develop a multifaceted, multilayered security architecture. Technical security models state that Information Security is a broader field, and cybersecurity is a specific practice area that addresses digital risks and defends cyberspace. What is Cyber Security? Cybersecurity is the art or science of protecting computer systems, networks, and applications, and securing data against malware, ransomware, phishing, and unauthorized access. It focuses on the cyber sphere, the area where information is recorded, processed, and transmitted electronically. It involves the use of advanced technology resources, infrastructure, and response capabilities to identify, prevent and react to attacks of digital infrastructure. These are common cybersecurity practices, which are: \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Intrusion Detection systems\/ intrusion prevention systems.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Software of network intrusion detection.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Security event monitoring information management (SIEM).\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Identity and Access Management (IAM). The primary goal of cybersecurity is to safeguard digital assets and systems that are related to the network against new threats. Benefits of Cyber Security \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Computer-based crime and Internet fraud insurance.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Securing cloud and web environments as well as mobile environments.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Response to incident and real time threat\/detection.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Business continuity in digital business. Information Security: What is it? Information in all its forms, be it digital, physical, or verbal, should definitely be included in the materials that Information Security (InfoSec) protects from unauthorized viewing, changing, sharing, or destruction. It is grounded on 3 fundamental principles: \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Privacy &#8211; Site security by keeping unwarranted people out.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Integrity -Ensuring data safety and consistency.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Availability -The data should be available when needed. Just as there is no information security in the virtual world, there is no cybersecurity either. It also includes: \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Physical security controls\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Administrative policies and procedures.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Corporate compliance and risk management.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Supervision and management of data. Information security, including cybersecurity, is not an independent strategy. Advantages of Information Security: \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The information of any type that is kept secret.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Regulatory and legal standards (e.g., ISO 27001, GDPP, HIPAA).\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Decreased chances of insider threat and data leakage.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Risk management and good governance. Difference Between Cyber Security and Information Security Aspect Cyber Security Information Security Definition Protecting the digital systems, including networks and data, from cyber attacks Protecting information in all forms from unauthorized access Scope Only Limited to cyberspace Broader domain that includes cybersecurity Security Focus Digital threats such as malware, phishing, and ransomware Confidentiality, integrity, and availability of all data Data Protection Protects only digital data Mainly protects digital, physical, and verbal information Approach Technology-driven and operational Risk management, governance, and control-driven Threat Coverage Hacking, DoS, advanced persistent threats Data leakage, unauthorized disclosure, and physical theft Implementation Firewalls, SIEM, endpoint protection Policies, access control, encryption, compliance frameworks Domain Cyber environment Organizational and enterprise-wide Relationship Subset of Information Security Superset that includes cybersecurity Information Security and Cyber Security Relationship. Information security and cybersecurity are not some exclusive entities, but they are two sides of the same security solution, which are complementary to each other. Information security entails finding out the individuals or groups that require protection, what must be the kind of protection required and why should these measures be put in place. Say a firm encrypts its database, reinvents its access control policies and physically secures its information hub. In that instance, it will be practicing information security. In order to ensure data security against computer attacks and to have a well-developed system of cybersecurity, it is necessary to install endpoint detection and network surveillance systems. Use Cases in Modern Enterprises Cyber Security Use Cases \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protecting cloud applications and SaaS.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ransomware attack prevention.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Securing the enterprise networks.\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Incident response and threat hunting. Information Security Use Cases \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Designing data governance frameworks\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Regulatory compliance and audit readiness\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Business risk assessment\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Secure document lifecycle management Why Organizations Need Both? \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The modern-day business is operated in a hybridized world where information is stored in:\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 On-premise infrastructure\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud platforms\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Remote devices\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Physical storage Cybersecurity alone will lead to suboptimal policy implementation, compliance, and physical data protection, as well as to information security alone; despite robust cybersecurity, the digital infrastructure will remain vulnerable to sophisticated attacks. A combined strategy ensures: \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 End-to-end data protection\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Reduced attack surface\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Improved resilience\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Stronger stakeholder trust How Pexo Helps Strengthen Your Cyber Security Strategy Every properly working organization requires enterprise-level protection to leverage advanced solutions. Pexo provides a broad range of cybersecurity services, including vulnerability detection and management, cloud security, and risk management, most of which are tailored to the client\u2019s current digital infrastructure. Based on real-time monitoring, regulatory compliance, and a scalable security architecture, Pexo helps enterprises protect against unknown cyber threats. Conclusion Information and cybersecurity remain two of the main pillars supporting data security, alongside many other security components, and therefore play a crucial role. Cybersecurity is basically about protecting cyber assets from cyberattack, while the major concern of information security, which is several notches above the former in terms of scope, is the protection of all kinds of information, and it is also controlled through governance, risk management, and control. Understanding the differences between the two will enable an organization to develop a security architecture that is future-proof, resilient, and layered. Moreover, in a business context, the two should be integrated to provide the highest level of security in a permanently data-driven world, rather than treated as counterparts.<\/p>\n","protected":false},"author":7,"featured_media":1668,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[2],"tags":[],"class_list":["post-1665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"_links":{"self":[{"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/posts\/1665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/comments?post=1665"}],"version-history":[{"count":3,"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/posts\/1665\/revisions"}],"predecessor-version":[{"id":1675,"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/posts\/1665\/revisions\/1675"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/media\/1668"}],"wp:attachment":[{"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/media?parent=1665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/categories?post=1665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clientsproject.com\/pexo\/wp-json\/wp\/v2\/tags?post=1665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}