{"id":1403,"date":"2024-03-12T08:30:00","date_gmt":"2024-03-12T08:30:00","guid":{"rendered":"https:\/\/proget.pl\/en\/?p=1403"},"modified":"2025-06-09T09:03:34","modified_gmt":"2025-06-09T09:03:34","slug":"cyber-hygiene-in-business","status":"publish","type":"post","link":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/","title":{"rendered":"Cyber hygiene in business \u2013 learn the simple rules and how you can support it"},"content":{"rendered":"<div class=\"!my-16 md:!my-24\">\n  <div \n    class=\"is-layout-constrained\" style=\"--wp--style--global--content-size: 70.75rem;\"\n>\n    <main class=\"xl:grid xl:gap-10 xl:grid-cols-[741px_1fr]\">\n      <article>\n                  <div class=\"inline-grid grid-cols-2 gap-5 sm:flex sm:flex-wrap mb-3\">\n                          <a class=\"uppercase text-[10px] leading-3 text-text-tertiary font-medium w-fit hover:no-underline\"\n                 href=\"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/\"\n              >\n                Cyber smart\n              <\/a>\n                      <\/div>\n                          <h1 class=\"font-[600] text-3xl text-text-primary mb-7 md:mb-12\">Cyber hygiene in business \u2013 learn the simple rules and how you can support it<\/h1>\n                <div class=\"flex items-center gap-x-8\">\n                      <div class=\"flex items-center gap-x-1.5\">\n                              <div class=\"shrink-0\">\n                  <img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Agnieszka-P-100.webp\" class=\"w-8 h-8 object-cover rounded-full\" alt=\"\" \/>                <\/div>\n                                            <p class=\"text-xs\">Agnieszka Pierlak<\/p>\n                          <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M19.5 3.75h-15a.75.75 0 0 0-.75.75v15c0 .414.336.75.75.75h15a.75.75 0 0 0 .75-.75v-15a.75.75 0 0 0-.75-.75Zm-3-1.5v3m-9-3v3m-3.75 3h16.5\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">12.03.2024<\/p>\n            <\/div>\n                                <div class=\"flex items-center gap-x-1\">\n              <svg class=\"w-6 h-6 shrink-0 stroke-icon-tertiary\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path stroke-miterlimit=\"10\" d=\"M12 21a9 9 0 1 0 0-18 9 9 0 0 0 0 18Z\"\/><path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M12 6.75V12h5.25\"\/><\/svg>              <p class=\"text-xs whitespace-nowrap\">\n                4 min\n              <\/p>\n            <\/div>\n                  <\/div>\n        <div class=\"mt-7 md:mt-12 single-post-content\">\n          \n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/proget.pl\/en\/\">Proget<\/a><\/span> &gt; <span><a href=\"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/\">Cyber smart<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\"><strong>Cyber hygiene in business \u2013 learn the simple rules and how you can support it<\/strong><\/span><\/span><\/div>\n\n\n<div class=\"wp-block-group has-primary-50-background-color has-background has-xs-font-size is-layout-constrained wp-container-core-group-is-layout-6bf6b0c8 wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:var(--wp--preset--spacing--sm);padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm)\">\n<p class=\"has-base-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--2-xs)\"><strong>Jump to:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents\"><ul><li><a href=\"#h-cyber-hygiene-in-the-company-prevention-as-simple-as-washing-hands\" data-level=\"2\">Cyber hygiene in the company \u2013 prevention as simple as washing hands<\/a><\/li><li><a href=\"#h-cyber-hygiene-tips-for-every-employee\" data-level=\"2\">Cyber hygiene tips for every employee<\/a><\/li><\/ul><\/div>\n<\/div>\n\n\n\n<p class=\"has-2-xl-font-size\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Cyber security is an essential element of trust within an organization. This is especially true now that mobile devices are the primary tools for doing business, remote and hybrid working have proliferated, and process digitization is underway in many companies. Because of this, enterprises, employees, and customers need reassurance that their sensitive data is adequately protected.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">Unfortunately, according to the latest Verizon Mobile Security Index report, the human factor was involved in as many as 74% of all information security breaches in 2023. The Verizon Data Breach Investigations Report this year found that 19% of data leaks in organizations had an internal cause \u2013 in the form of employee inadvertent or accidental actions. No matter how specialized, any security system is only as secure as its weakest link.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-cyber-hygiene-in-the-company-prevention-as-simple-as-washing-hands\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Cyber hygiene in the company \u2013 prevention as simple as washing hands<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">With the rapid development of technology and increased scale and sophistication of attacks, cyber security breaches cannot be avoided entirely. Prevention is much cheaper than repairing the damages. And in the case of businesses, these can not only be costly but also irreversible, resulting in loss of trust and reputation. That&#8217;s why it&#8217;s worth taking every measure to minimize risk \u2013 you can increase the resilience of your company and yourself as an employee by implementing good practices known as cyber hygiene.<\/p>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\"><strong>Cyber hygiene<\/strong> is defined as a set of rules, behaviors, and recommendations that, if followed, help increase the security of users, devices, networks, and data. This definition may sound daunting because it is associated with complicated and time-consuming activities that require technical knowledge. Meanwhile, for the average user who is not an IT administrator, cyber HSE is about simple, everyday habits, often compared to personal hygiene.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-2-xl-font-size\" id=\"h-cyber-hygiene-tips-for-every-employee\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Cyber hygiene tips for every employee<\/h2>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">Below are cyber hygiene tips that you can implement in a business environment and at the private level. To systematize your knowledge, they have been divided into several categories corresponding to the most critical threat areas.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-messages\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Messages<\/h3>\n\n\n\n<ul style=\"margin-bottom:var(--wp--preset--spacing--sm)\" class=\"wp-block-list has-lg-font-size\">\n<li><strong>Do not open suspicious e-mails, SMS, MMS<\/strong>. Especially if they contain information about winning a contest, transferring money from a bank, hacking into an account.<\/li>\n\n\n\n<li><strong>Check the sender&#8217;s ID<\/strong> (email address, phone number). If you are not sure, contact the sender by phone or in person.<\/li>\n\n\n\n<li><strong>Pay attention to the linguistic and compositional correctness of the content<\/strong>. Trustworthy organizations usually verify their messages before sending them: do not make blatant spelling and stylistic errors, and do not use strange formatting.<\/li>\n\n\n\n<li><strong>Don&#8217;t act if you feel that the sender is putting unnatural pressure on you<\/strong> or creating a sense of guilt while trying to get you to act urgently within a specific, very short deadline (for example, to make a money transfer or provide personal information).<\/li>\n\n\n\n<li><strong>Watch out for links and attachments<\/strong>. Don&#8217;t open attached files without ascertaining their source. Preview without clicking (by pointing with your mouse cursor) the actual destination address of the page the link will take you to. Watch for errors and typos in the URL \u2013 for example, an uppercase I as a lowercase L or the number 0 instead of an uppercase O.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-neutral-100-background-color has-background has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\"><em>PRACTICAL USE CASE<\/em>: find the differences between www.bankofamerica.com and www.bankofarnerica.oom.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-passwords-and-accesses\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Passwords and accesses<\/h3>\n\n\n\n<ul style=\"margin-bottom:var(--wp--preset--spacing--sm)\" class=\"wp-block-list has-lg-font-size\">\n<li><strong>Use strong passwords<\/strong> (length, upper and lower case letters, numbers, special characters). Create them unique for each account \u2013 1 account = 1 password. Change them regularly; do so immediately when you suspect someone has figured them out or stolen them.<\/li>\n\n\n\n<li><strong>Don&#8217;t share passwords with others<\/strong>. Don&#8217;t type them while someone looks over your shoulder, at your screen or keyboard. Also, don&#8217;t write them down on paper or in an unsecured file \u2013 a better option is to use a proven password manager or authentication data management program.<\/li>\n\n\n\n<li><strong>Secure your devices with passwords<\/strong>. Lock them or log out when you pause or finish work.<\/li>\n\n\n\n<li><strong>Use two-step verification<\/strong> to secure your accounts further. Enable this feature wherever you can.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-software-and-hardware\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Software and hardware<\/h3>\n\n\n\n<ul style=\"margin-bottom:var(--wp--preset--spacing--sm)\" class=\"wp-block-list has-lg-font-size\">\n<li><strong>Regularly update your system, programs and applications<\/strong> \u2013 if you use your own device for work. Otherwise, ask your administrator to do so.<\/li>\n\n\n\n<li><strong>Only use software from legal sources<\/strong>. This is especially true for <span style=\"text-decoration: underline\"><a href=\"https:\/\/proget.pl\/en\/blog\/are-all-mobile-apps-safe\/\">mobile applications<\/a><\/span>.<\/li>\n\n\n\n<li><strong>Don&#8217;t plug unknown data carriers<\/strong> into company devices.<\/li>\n\n\n\n<li><strong>Try to avoid using public charging stations<\/strong>. They can become a tool for <a href=\"https:\/\/en.wikipedia.org\/wiki\/Juice_jacking\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span style=\"text-decoration: underline\">juice jacking<\/span><\/a> \u2013 an attack that uses USB cables crafted by cybercriminals to infect your equipment or steal your data. If you must plug into a public USB station, assess the risks. You can use your own cables, preferably stripped of data transmission functions.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading has-xl-font-size\" id=\"h-network\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:var(--wp--preset--spacing--xs);font-style:normal;font-weight:600\">Network<\/h3>\n\n\n\n<ul style=\"margin-bottom:var(--wp--preset--spacing--sm)\" class=\"wp-block-list has-lg-font-size\">\n<li><strong>When working remotely, do not connect to public or unknown WiFi networks<\/strong>, especially when logging into accounts that contain sensitive data. However, if it&#8217;s really necessary, you can secure your online activity by enabling a VPN service. Ask your administrator to install and configure it.<\/li>\n\n\n\n<li><strong>Protect your online privacy<\/strong>. Don&#8217;t share information whose publication could even potentially compromise your or your organization&#8217;s security and give cybercriminals grounds for blackmail. Follow the rule: the less, the better.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-lg-font-size\" style=\"margin-bottom:var(--wp--preset--spacing--sm)\">By applying the recommendations above, you will contribute to raising the level of cyber security in your company and increase the security of your daily activities, not just business. Pass this knowledge on to your colleagues.<\/p>\n\n\n<div class=\"alignfull !px-0 bg-background-black text-text-inverted\">\n  <div \n    class=\"is-layout-constrained is-layout-constrained-root px-6 md:px-16\"\n>\n    \n\n<div class=\"wp-block-group has-lg-font-size is-layout-constrained wp-block-group-is-layout-constrained\"><div\n  id=\"block_45c8d451ddb71e268d28f892e8f3899d\"\n  class=\"grid grid-cols-1 lg:grid-cols-12 gap-y-16 gap-x-10 py-[--wp--preset--spacing--2-xl] items-center\"\n  style=\"padding-top:var(--wp--preset--spacing--lg);padding-bottom:var(--wp--preset--spacing--lg)\"\n>\n  <div \n    class=\"is-layout-constrained lg:col-span-6 lg:order-1 order-3\"\n>\n    \n<h2\n  class=\"text-3xl !leading-[1.2] font-bold wp-block-heading align-text-left\" style=\";\" id=\"block_c2131c3cadbb7c72f9144288fb639016\"\n>\n  Your data in&nbsp;the right hands.\n<\/h2>\n\n<div \n  id=\"block_b4308508eca44083da1cad260a6ea91c\"\n  class=\"flex flex-wrap gap-4 wp-block-buttons justify-start\"\n  style=\"padding-top:var(--wp--preset--spacing--sm)\"\n>\n  \n<a\n    href=\"https:\/\/proget.pl\/en\/trial\/\" target=\"\" rel=\"noopener\" style=\"min-width: 200px\" class=\"!inline-flex items-center justify-center outline outline-1 -outline-offset-1 rounded-full font-prebold no-underline hover:no-underline focus:no-underline transition-colors duration-300 linear whitespace-nowrap font-sans-alt !leading-[1.362] [&amp;_svg]:flex-none bg-button-primary-main-fill !text-button-primary-main-text outline-button-primary-main-outline hover:bg-button-primary-hover-fill hover:!text-button-primary-hover-text hover:outline-button-primary-hover-outline disabled:bg-button-primary-disabled-fill disabled:!text-button-primary-disabled-text disabled:outline-button-primary-disabled-outline focus:bg-button-primary-selected-fill focus:!text-button-primary-selected-text focus:outline-button-primary-selected-outline button-small text-[0.8125rem] px-4 py-2 gap-2 [&amp;_svg]:w-4 [&amp;_svg]:h-4 wp-block-button !inline-flex\"\n>\n    \n    <span\n        class=\"\"\n    >\n        Test the system\n    <\/span>\n\n            <svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M2.5 8H13.5\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n<path d=\"M9 3.5L13.5 8L9 12.5\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n<\/svg>\n    <\/a>\n\n<\/div>\n\n<\/div>\n  <div class=\"hidden lg:block order-2\"><\/div>\n\n  <div class=\"text-center lg:col-span-5 hidden md:block lg:order-3 order-1\">\n          <img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"350\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp\" class=\"inline-block w-full h-auto rounded-lg\" alt=\"tablet and phone, home screen view with application icons\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp 510w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4-300x206.webp 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/>      <\/div>\n\n      <div class=\"text-center lg:col-span-5 block md:hidden lg:order-3 order-1\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"350\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp\" class=\"inline-block w-full h-auto rounded-lg\" alt=\"tablet and phone, home screen view with application icons\" srcset=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4.webp 510w, https:\/\/proget.pl\/app\/uploads\/2\/2024\/11\/510x350_reklama-grafika-4-300x206.webp 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/>    <\/div>\n  <\/div><\/div>\n\n\n<\/div><\/div>\n\n\n<hr class=\"wp-block-separator has-text-color has-brand-fog-color has-alpha-channel-opacity has-brand-fog-background-color has-background is-style-default\" style=\"margin-top:var(--wp--preset--spacing--md);margin-bottom:0\" \/>\n\n\n\n<div class=\"wp-block-group has-base-white-background-color has-background is-nowrap is-layout-flex wp-container-core-group-is-layout-837611ba wp-block-group-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--sm);margin-bottom:0;padding-top:0;padding-right:var(--wp--preset--spacing--sm);padding-bottom:0;padding-left:var(--wp--preset--spacing--sm)\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-700cb50f wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-f078265f wp-block-column-is-layout-constrained\" style=\"padding-right:0;flex-basis:48px\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2025\/06\/Agnieszka-P-100.webp\" alt=\"\" class=\"wp-image-2976\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-constrained wp-container-core-column-is-layout-e1564d08 wp-block-column-is-layout-constrained\" style=\"padding-left:0\">\n<p>Author: Agnieszka Pierlak<\/p>\n\n\n\n<p style=\"margin-top:0;margin-bottom:0.7em;font-size:0.7em\">Marketing specialist with experience in the IT industry. Interested in issues related to cybersecurity and internal security. Privately, a lover of good literature, Asian cuisine and mountain hiking.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n        <\/div>\n      <\/article>\n      <aside class=\"mt-10 xl:mt-0\">\n        <div class=\"hidden xl:block xl:mb-10\">\n          <form role=\"search\" action=\"https:\/\/proget.pl\/en\/blog\/\" autocomplete=\"off\">\n  <div class=\"w-full inline-block relative \">\n    <input\n      class=\"peer w-full bg-transparent text-text-primary font-medium text-sm shadow-01 pr-3 pl-10 pt-xs border border-border-secondary rounded-lg transition-all hover:border-border-active hover:bg-surface-hover-01 focus:border-border-active focus:outline-0 focus:ring-0 disabled:bg-border-disabled disabled:text-text-disabled disabled:cursor-not-allowed disabled:border-border-disabled h-[50px]\"\n      placeholder=\" \"\n      type=\"text\"\n      name=\"s\"\n      value=\"\"\n      id=\"search\"\n    \/>\n    <label\n      class=\"flex w-full h-full select-none pointer-events-none absolute left-0 pr-3 pl-10 transition-all !overflow-visible truncate leading-tigh text-text-tertiary peer-placeholder-shown:text-text-tertiary peer-disabled:text-text-disabled peer-disabled:peer-placeholder-shown:text-text-disabled peer-placeholder-shown:text-sm text-xs peer-focus:text-xs top-[7px] peer-placeholder-shown:top-[15px] peer-focus:top-[7px]\"\n      for=\"search\"\n    >\n      Search\n    <\/label>\n    <button type=\"submit\" class=\"absolute left-0 top-[calc(50%-20px)] w-10 h-[40px] pl-1 flex items-center justify-center\">\n      <svg class=\"w-5 h-5 shrink-0 stroke-primary-500 pointer-events-none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 20 20\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M9.063 15.625a6.562 6.562 0 1 0 0-13.125 6.562 6.562 0 0 0 0 13.125Zm4.64-1.922L17.5 17.5\"\/><\/svg>    <\/button>\n  <\/div>\n<\/form>\n        <\/div>\n                  <h2 class=\"text-text-secondary text-lg font-semibold mb-6\">More articles:<\/h2>\n          <div class=\"grid gap-6\">\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/does-your-company-need-mdm\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/06\/7-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with a laptop and a shield icon with MDM written on it\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Check if your company also needs a professional MDM solution\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/choosing-mdm-solution\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/06\/37-mdm_03-EN-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and graphics, Proget MDM signpost, price, features, support, All-in-One\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    What to consider when choosing an MDM solution? \u2013 explore practical tips\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/cyber-reality-cybersecurity\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2022\/12\/2-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and shield icon with keyhole, next to phone\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Is cyber reality the reality already or is it still a faraway possibility?\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/proget-iso-27001-certificate\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/08\/17-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and ISO 27001 logo\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Do you know why you should bet on an ISO 27001- and 9001-certified provider?\n                  <\/h3>\n                <\/div>\n              <\/a>\n                          <a href=\"https:\/\/proget.pl\/en\/blog\/are-all-mobile-apps-safe\/\" class=\"flex items-center rounded-lg bg-[#F3F4FF] overflow-hidden hover:no-underline\">\n                                  <img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/proget.pl\/app\/uploads\/2\/2023\/02\/9-150x150.webp\" class=\"h-[100px] w-[100px] object-cover shrink-0\" alt=\"banner with laptop and shield icon with keyhole, Play Store icon, Apple App Store icon\" \/>                                <div class=\"w-full p-3.5 pr-6 pl-8\">\n                  <h3 class=\"text-text-secondary block text-sm font-medium leading-[1.25]\">\n                    Are all mobile apps safe and why you should avoid those out of the official stores?\n                  <\/h3>\n                <\/div>\n              <\/a>\n                      <\/div>\n              <\/aside>\n    <\/main>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is an essential element of trust within an organization. This is especially true now that mobile devices are the primary tools for doing business, remote and hybrid working have proliferated, and process digitization is underway in many companies. Because of this, enterprises, employees, and customers need reassurance that their sensitive data is adequately protected. Unfortunately, according to the latest Verizon Mobile Security Index report, the human factor was involved in as many as 74% of all information security breaches in 2023. The Verizon Data Breach Investigations Report this year found that 19% of data leaks in organizations had an internal cause \u2013 in the form of employee inadvertent or accidental actions. No matter how specialized, any security system is only as secure as its weakest link.<\/p>\n","protected":false},"author":3,"featured_media":2705,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-1403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersmart"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber hygiene in business: why is it important?<\/title>\n<meta name=\"description\" content=\"Strengthen your organization&#039;s cyber security. Apply our practical cyber hygiene tips and protect your business data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber hygiene in business \u2013 learn the simple rules and how you can support it\" \/>\n<meta property=\"og:description\" content=\"Strengthen your organization&#039;s cyber security. Apply our practical cyber hygiene tips and protect your business data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Proget\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-12T08:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T09:03:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proget.pl\/app\/uploads\/2\/2024\/03\/24.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1351\" \/>\n\t<meta property=\"og:image:height\" content=\"296\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Agnieszka Pierlak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Agnieszka Pierlak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/\"},\"author\":{\"name\":\"Agnieszka Pierlak\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/person\\\/2511d4c9e540e5daf31b4f90bc874539\"},\"headline\":\"Cyber hygiene in business \u2013 learn the simple rules and how you can support it\",\"datePublished\":\"2024-03-12T08:30:00+00:00\",\"dateModified\":\"2025-06-09T09:03:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/\"},\"wordCount\":901,\"publisher\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/03\\\/24.webp\",\"articleSection\":[\"Cyber smart\"],\"inLanguage\":\"en-GB\",\"accessibilityFeature\":[\"tableOfContents\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/\",\"name\":\"Cyber hygiene in business: why is it important?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/03\\\/24.webp\",\"datePublished\":\"2024-03-12T08:30:00+00:00\",\"dateModified\":\"2025-06-09T09:03:34+00:00\",\"description\":\"Strengthen your organization's cyber security. Apply our practical cyber hygiene tips and protect your business data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/03\\\/24.webp\",\"contentUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/03\\\/24.webp\",\"width\":1351,\"height\":296,\"caption\":\"banner with laptop and padlocked shield icon, cogs, tile with password stars\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/cyber-hygiene-in-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Proget\",\"item\":\"https:\\\/\\\/proget.pl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber smart\",\"item\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/category\\\/cybersmart\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber hygiene in business \u2013 learn the simple rules and how you can support it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/\",\"name\":\"Proget\",\"description\":\"Enterprise Mobility Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/proget.pl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#organization\",\"name\":\"Proget Sp. z o.o.\",\"alternateName\":\"Proget\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/04\\\/logo-space-white-1.svg\",\"contentUrl\":\"https:\\\/\\\/proget.pl\\\/app\\\/uploads\\\/2\\\/2024\\\/04\\\/logo-space-white-1.svg\",\"width\":1,\"height\":1,\"caption\":\"Proget Sp. z o.o.\"},\"image\":{\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/proget-software\\\/\"],\"description\":\"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\\\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.\",\"legalName\":\"Proget Sp. z o.o.\",\"foundingDate\":\"2012-03-27\",\"taxID\":\"5472142508\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/proget.pl\\\/en\\\/#\\\/schema\\\/person\\\/2511d4c9e540e5daf31b4f90bc874539\",\"name\":\"Agnieszka Pierlak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g\",\"caption\":\"Agnieszka Pierlak\"},\"description\":\"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.\",\"url\":\"https:\\\/\\\/proget.pl\\\/en\\\/blog\\\/author\\\/apierlak\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber hygiene in business: why is it important?","description":"Strengthen your organization's cyber security. Apply our practical cyber hygiene tips and protect your business data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber hygiene in business \u2013 learn the simple rules and how you can support it","og_description":"Strengthen your organization's cyber security. Apply our practical cyber hygiene tips and protect your business data.","og_url":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/","og_site_name":"Proget","article_published_time":"2024-03-12T08:30:00+00:00","article_modified_time":"2025-06-09T09:03:34+00:00","og_image":[{"width":1351,"height":296,"url":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/03\/24.webp","type":"image\/webp"}],"author":"Agnieszka Pierlak","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Agnieszka Pierlak","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/#article","isPartOf":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/"},"author":{"name":"Agnieszka Pierlak","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539"},"headline":"Cyber hygiene in business \u2013 learn the simple rules and how you can support it","datePublished":"2024-03-12T08:30:00+00:00","dateModified":"2025-06-09T09:03:34+00:00","mainEntityOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/"},"wordCount":901,"publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/03\/24.webp","articleSection":["Cyber smart"],"inLanguage":"en-GB","accessibilityFeature":["tableOfContents"]},{"@type":"WebPage","@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/","url":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/","name":"Cyber hygiene in business: why is it important?","isPartOf":{"@id":"https:\/\/proget.pl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/#primaryimage"},"image":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/#primaryimage"},"thumbnailUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/03\/24.webp","datePublished":"2024-03-12T08:30:00+00:00","dateModified":"2025-06-09T09:03:34+00:00","description":"Strengthen your organization's cyber security. Apply our practical cyber hygiene tips and protect your business data.","breadcrumb":{"@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/#primaryimage","url":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/03\/24.webp","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/03\/24.webp","width":1351,"height":296,"caption":"banner with laptop and padlocked shield icon, cogs, tile with password stars"},{"@type":"BreadcrumbList","@id":"https:\/\/proget.pl\/en\/blog\/cyber-hygiene-in-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Proget","item":"https:\/\/proget.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber smart","item":"https:\/\/proget.pl\/en\/blog\/category\/cybersmart\/"},{"@type":"ListItem","position":3,"name":"Cyber hygiene in business \u2013 learn the simple rules and how you can support it"}]},{"@type":"WebSite","@id":"https:\/\/proget.pl\/en\/#website","url":"https:\/\/proget.pl\/en\/","name":"Proget","description":"Enterprise Mobility Management","publisher":{"@id":"https:\/\/proget.pl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proget.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/proget.pl\/en\/#organization","name":"Proget Sp. z o.o.","alternateName":"Proget","url":"https:\/\/proget.pl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","contentUrl":"https:\/\/proget.pl\/app\/uploads\/2\/2024\/04\/logo-space-white-1.svg","width":1,"height":1,"caption":"Proget Sp. z o.o."},"image":{"@id":"https:\/\/proget.pl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/proget-software\/"],"description":"We are a Polish manufacturer of a proprietary mobility management solution. We operate in accordance with international standards: Information Security Management PN-EN ISO\/IEC 27001:2023 and Quality Management PN-EN ISO 9001:2015. For our financial performance in recent years, we have been listed as one of the most dynamically growing organizations in Poland according to Forbes, and Puls Biznesu magazine has awarded us the Business Gazelle award. We have been developing our competence in the cybersecurity sector continuously since 2007. We are actively building cybersecurity awareness. For several years we have been a member of\u00a0the PWCyber government agreement and the Cyber Made in Poland cluster.","legalName":"Proget Sp. z o.o.","foundingDate":"2012-03-27","taxID":"5472142508"},{"@type":"Person","@id":"https:\/\/proget.pl\/en\/#\/schema\/person\/2511d4c9e540e5daf31b4f90bc874539","name":"Agnieszka Pierlak","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1ae940a0bd079ee423514c6784aff6cfbc2ceadc678206380bb98eee8e71104?s=96&d=mm&r=g","caption":"Agnieszka Pierlak"},"description":"Specjalista ds. marketingu i cyberbezpiecze\u0144stwa. \u0141\u0105czy do\u015bwiadczenie w budowaniu skutecznych strategii online z praktyczn\u0105 wiedz\u0105 o ochronie danych i bezpiecze\u0144stwie w sieci.","url":"https:\/\/proget.pl\/en\/blog\/author\/apierlak\/"}]}},"_links":{"self":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/comments?post=1403"}],"version-history":[{"count":10,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1403\/revisions"}],"predecessor-version":[{"id":3021,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/posts\/1403\/revisions\/3021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media\/2705"}],"wp:attachment":[{"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/media?parent=1403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/categories?post=1403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/proget.pl\/en\/wp-json\/wp\/v2\/tags?post=1403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}