{"id":157,"date":"2025-08-07T11:01:25","date_gmt":"2025-08-07T10:01:25","guid":{"rendered":"https:\/\/conscia.com\/ie\/?page_id=157"},"modified":"2025-08-12T14:20:36","modified_gmt":"2025-08-12T13:20:36","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/conscia.com\/ie\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<section id=\"block_acf-block-689b3fa449252\"\n         class=\"hero alignfull   column-gap--default has-brand-background-color hero--is-height-minimal \">\n\t<div class=\"hero__media youtube-object-fit-cover\">\n\t\t\t\t\t<\/div>\n\t\t<div class=\"hero__inner  has-supergraphic has-supergraphic-middle-placement has-animated-supergraphic\">\n\t\t<div class=\"hero__inner-blocks\">\n\t\t\t<div>\n\t\t\t\t\n\n<h1 class=\"wp-block-heading spacing-after--6\"><strong>Sleep well, knowing <\/strong><br><strong>you\u2019re protected<\/strong><\/h1>\n\n\n\n<p class=\"spacing-after--6 wp-block-paragraph\">With built-in protection, real-time response, and advanced threat detection, <br>we stop threats before they stop you &#8211; so you can focus on your business.<\/p>\n\n\n\n<div class=\"wp-block-buttons spacing-before--0 is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-accent button-size--default\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/conscia.com\/contact\/\">Talk to an expert<\/a><\/div>\n\n\n<\/div>\n\n\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t<\/div>\n\t<\/section>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-image-fill-element  column-gap--default\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Cybersecurity <br>affects your business<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Every organisation relies on secure, well-functioning IT systems. From running operations to serving customers, digital infrastructure is the backbone of modern business. But the same connectivity that enables flexibility and speed also introduces risk.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Cybercriminals are constantly evolving their tactics. Threats shift daily, and staying ahead requires more than just the right tools. It demands vigilance, expertise, and ongoing attention.<\/p>\n\n\n\n<p class=\" spacing-after--0 wp-block-paragraph\">That\u2019s where we come in. We take the pressure off by helping you meet security requirements and demonstrate compliance with standards like ISO, NIST, and CIS. With deep expertise in secure system design and support, we help reduce your cyber risk, ease compliance, and free up your team to focus on what matters most. Growing your business.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-2-1024x1024.jpg\" alt=\"\" class=\"wp-image-8253 size-full\" style=\"object-position:50% 50%\"\/><\/figure><\/div>\n\n\n\n<section id=\"block_acf-block-68da97a477939\" class=\"slider-container swiper   background-animation--none background-graphics--none\"  data-autoplay=\"false\" data-slides-per-view=\"1\">\n\t<div class=\"swiper-wrapper\">\n\t\t\n\n<section id=\"block_acf-block-68da97a477944\" class=\" swiper-slide \">\n\t\t\n\n<section id=\"block_acf-block-68da97a4779df\" class=\"quote  quote--is-style-secondary\">\n\t<div class=\"quote__quote\">\n\t\t\n\n<p class=\"has-text-align-center has-heading-xxs-font-size spacing-after--5 wp-block-paragraph\">With 51,000 people in the stadium, the demand on the network is such that it&#8217;s critical our infrastructure works when we need it to work and it has to be reliable, redundant and available.<\/p>\n\n\n\t<\/div>\n\t\t\t<div class=\"quote__contact-wrapper\">\n\t\t\t\t\t\t<div class=\"quote__contact select\">\n\t\t\t\t<p class=\"quote__contact-name\">\n\t\t\t\t\tVincent Naughton\t\t\t\t<\/p>\n\t\t\t\t<p class=\"quote__contact-title\">\n\t\t\t\t\tHead of IT, Aviva Stadium \t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/section>\n\n<\/section>\n\n\n\n<section id=\"block_acf-block-68da97a4779ea\" class=\" swiper-slide \">\n\t\t\n\n<section id=\"block_acf-block-68da97a477a07\" class=\"quote  quote--is-style-secondary\">\n\t<div class=\"quote__quote\">\n\t\t\n\n<p class=\"has-text-align-center has-heading-xxs-font-size spacing-after--5 wp-block-paragraph\">It&#8217;s the fact that on a sunny day, you can choose to sit outside and work outside. It has revolutionised the campus. It has made every outdoor area of the campus a viable classroom. You can walk from one side of the campus to the other and not drop a Microsoft Teams call. It&#8217;s just completely changed the student experience for the better.<\/p>\n\n\n\t<\/div>\n\t\t\t<div class=\"quote__contact-wrapper\">\n\t\t\t\t\t\t<div class=\"quote__contact select\">\n\t\t\t\t<p class=\"quote__contact-name\">\n\t\t\t\t\tPeter Gaughran\t\t\t\t<\/p>\n\t\t\t\t<p class=\"quote__contact-title\">\n\t\t\t\t\tSenior Infrastructure Specialist, Maynooth University\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/section>\n\n<\/section>\n\n\n\n<section id=\"block_acf-block-68da97a477a0e\" class=\" swiper-slide \">\n\t\t\n\n<section id=\"block_acf-block-68da97a477a26\" class=\"quote  quote--is-style-secondary\">\n\t<div class=\"quote__quote\">\n\t\t\n\n<p class=\"has-text-align-center has-heading-xxs-font-size spacing-after--5 wp-block-paragraph\">600 seats typically means 600 laptops, 600 smart watches and 600 phones; anything up to 1,800 devices connecting to that same segment of the wireless network at any one time. Within a few days of deploying the PoC, it was clear that the network was performing much better than I had expected. It was obvious we had found our solution, and we decided to migrate the rest of the campus as soon as we could.<\/p>\n\n\n\t<\/div>\n\t\t\t<div class=\"quote__contact-wrapper\">\n\t\t\t\t\t\t<div class=\"quote__contact select\">\n\t\t\t\t<p class=\"quote__contact-name\">\n\t\t\t\t\tKevin Brew\t\t\t\t<\/p>\n\t\t\t\t<p class=\"quote__contact-title\">\n\t\t\t\t\tSenior Network Architect at RCSI\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/section>\n\n<\/section>\n\n\n\n<section id=\"block_acf-block-68da97a477a2e\" class=\" swiper-slide \">\n\t\t\n\n<section id=\"block_acf-block-68da97a477a46\" class=\"quote  quote--is-style-secondary\">\n\t<div class=\"quote__quote\">\n\t\t\n\n<p class=\"has-text-align-center has-heading-xxs-font-size spacing-after--5 wp-block-paragraph\">The ICT network is a critical component to the vessel&#8217;s operation. Performance and reliability are key requirements for us. You simply can\u2019t afford to have issues when hundreds of miles offshore. Ease of management is also critical for us. We do not have dedicated network engineers on the crew. Thus, monitoring must be on point and maintenance straightforward.<\/p>\n\n\n\t<\/div>\n\t\t\t<div class=\"quote__contact-wrapper\">\n\t\t\t\t\t\t<div class=\"quote__contact select\">\n\t\t\t\t<p class=\"quote__contact-name\">\n\t\t\t\t\tKeith Manson\t\t\t\t<\/p>\n\t\t\t\t<p class=\"quote__contact-title\">\n\t\t\t\t\tIT Operations and Systems Manager, Marine Institute\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/section>\n\n<\/section>\n\n\n\n<section id=\"block_acf-block-68da97a477a4d\" class=\" swiper-slide \">\n\t\t\n\n<section id=\"block_acf-block-68da97a477a64\" class=\"quote  quote--is-style-secondary\">\n\t<div class=\"quote__quote\">\n\t\t\n\n<p class=\"has-text-align-center has-heading-xxs-font-size spacing-after--5 wp-block-paragraph\">There&#8217;s nothing more frustrating for students than when Wi-Fi drops. Here, it just works. It&#8217;s like switching on the lights. We know that students will probably spend more time at their desks here rather than on campus this year, but capacity isn&#8217;t an issue for us.<\/p>\n\n\n\t<\/div>\n\t\t\t<div class=\"quote__contact-wrapper\">\n\t\t\t\t\t\t<div class=\"quote__contact select\">\n\t\t\t\t<p class=\"quote__contact-name\">\n\t\t\t\t\tSusan Clancy\t\t\t\t<\/p>\n\t\t\t\t<p class=\"quote__contact-title\">\n\t\t\t\t\tGeneral Manager, Goldcrest Village at Campus Living\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/section>\n\n<\/section>\n\n\n\t<\/div>\n\t<div class=\"swiper-controls-wrapper\">\n\t\t<div class=\"swiper-button-prev\"><\/div>\n\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t<div class=\"swiper-button-next\"><\/div>\n\t<\/div>\n<\/section>\n\n\n\n<div class=\"wp-block-columns alignwide  column-gap--default has-gray-300-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading background-graphics--none spacing-before--7 has-heading-s-font-size\">It\u2019s about systems, and people<\/h3>\n\n\n\n<p class=\" background-graphics--none wp-block-paragraph\">Cybersecurity is as much about people as it is about systems and technology. We help you with both. From secure infrastructure design and implementation to processes, policies, and training, we ensure your employees have the skills and confidence to use systems correctly and consistently.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">We take a holistic view of your security setup, covering every aspect of IT security to support your organisational goals.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading background-graphics--none spacing-before--7 has-heading-s-font-size\"><\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">Using Conscia\u2019s validated methodology, we guide you through every step. From analysis, risk assessment, and consulting to design, implementation, optimisation, and ongoing support when needed.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong><a href=\"https:\/\/conscia.com\/service\/managed-services\/managed-security-services\/conscia-cyberdefense\/\">Conscia MDR<\/a><\/strong> delivers advanced detection capabilities through a simple, cost-effective subscription model with minimal deployment effort. Built on the same technology used in high-end security operations centres, it provides strong protection through a simple, subscription-based model.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill-element\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-1-1024x1024.jpg\" alt=\"\" class=\"wp-image-8252 size-full\" style=\"object-position:50% 50%\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<h3 class=\"wp-block-heading  wp-block-paragraph\">Managed Security Services<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">Built for speed, scalability, and precision, Conscia MDR helps you detect, investigate, and respond to cyber threats quickly, with minimal overhead and full visibility across your digital infrastructure.<\/p>\n\n\n\n<p class=\" spacing-after--5 wp-block-paragraph\">Delivered as a Managed Detection and Response (MDR) service, Conscia MDR gives you access to advanced threat detection once limited to enterprise-level Security Operations Centres. It\u2019s easy to deploy, simple to manage, and available through a cost-effective subscription model.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill button-size--default\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/conscia.com\/ie\/managed-services\/managed-security-services\/\">More about Managed Security Services<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull  background-graphics--none has-gray-300-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-image-fill-element\"><div class=\"wp-block-media-text__content\">\n<h3 class=\"wp-block-heading  wp-block-paragraph\">Cybersecurity solutions<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">Cybersecurity shouldn&#8217;t stop at tools or technology. Real protection comes from scaling security across systems, processes, and people. It starts with the right solution and grows into a structured approach, embedded in your culture and ready for anything.<\/p>\n\n\n\n<p class=\" spacing-after--5 wp-block-paragraph\">With the support of Conscia\u2019s Network of Knowledge, we help you identify the right technologies and processes for every challenge. Our broad portfolio is built to support you before, during, and after a security incident.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill button-size--default\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/conscia.com\/ie\/solutions\/cybersecurity-solutions\/\">More about our cybersecurity solutions<\/a><\/div>\n<\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-3-1024x1024.jpg\" alt=\"\" class=\"wp-image-8254 size-full\" style=\"object-position:50% 50%\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading alignwide  background-graphics--none\" id=\"h-from-our-knowledge-hub\">Success stories<\/h2>\n\n\n\n<section id=\"block_acf-block-6989a0c77b17c\"\n         class=\"post-query   background-graphics--none alignwide swiper\"  data-autoplay=\"false\" data-slides-per-view=\"1\">\n\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<a  href=\"https:\/\/conscia.com\/ie\/cases\/students-enjoy-high-speed-video-streaming-and-reliable-computing\/\" class=\"featured-post has-peach-background-color featured-post--\">\n\t\t<div class=\"featured-post__media  \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"951\" height=\"481\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2020\/09\/agile-case-study-goldcrest.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2020\/09\/agile-case-study-goldcrest.jpg 951w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2020\/09\/agile-case-study-goldcrest-300x152.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2020\/09\/agile-case-study-goldcrest-768x388.jpg 768w\" sizes=\"auto, (max-width: 951px) 100vw, 951px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<div class=\"featured-post__content\">\n\t\t\t<div>\n\t\t\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Case<\/p>\n\t\t\t<\/div>\n\t\t\t\t\t<h3 class=\"featured-post__post-title\">\n\t\t\t\t\tStudents enjoy high-speed video streaming and reliable computing\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"featured-post__post-excerpt\">\n\t\t\t\t\t\tOverview Opened in 2018, Goldcrest Village is a state-of-the-art student residence, located on the NUI Galway campus. It consists of 76 non-smoking apartments with 3 apartment types of 4, 5 and 6-bedr&#8230;\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"featured-post__bottom-wrapper\">\n\t\t\t\t<div class=\"featured-post__bottom-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"featured-post__button is-style-icon wp-block-button button-size--small\">\n\t\t\t\t\t<span class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color wp-element-button\"\n\t\t\t\t\t   href=\"https:\/\/conscia.com\/ie\/cases\/students-enjoy-high-speed-video-streaming-and-reliable-computing\/\">\n\t\t\t\t\t\tRead\t\t\t\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<a  href=\"https:\/\/conscia.com\/ie\/cases\/conscia-managed-services-for-aarsleff-provides-assurance-security-and-a-future-proof-network\/\" class=\"featured-post has-peach-background-color featured-post--\">\n\t\t<div class=\"featured-post__media  \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/aarsleff-hq-hd-1024x576.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/aarsleff-hq-hd-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/aarsleff-hq-hd-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/aarsleff-hq-hd-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/aarsleff-hq-hd-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/aarsleff-hq-hd.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tManaged service\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tNetworking\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<div class=\"featured-post__content\">\n\t\t\t<div>\n\t\t\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Case<\/p>\n\t\t\t<\/div>\n\t\t\t\t\t<h3 class=\"featured-post__post-title\">\n\t\t\t\t\tConscia Managed Services for Aarsleff&nbsp;provides assurance, security,(\u2026)\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"featured-post__post-excerpt\">\n\t\t\t\t\t\tWhen others handle the tedious tasks, there is more capacity to focus on development and business needs. This has been the experience of the Danish construction company Aarsleff since Conscia began ma&#8230;\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"featured-post__bottom-wrapper\">\n\t\t\t\t<div class=\"featured-post__bottom-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"featured-post__button is-style-icon wp-block-button button-size--small\">\n\t\t\t\t\t<span class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color wp-element-button\"\n\t\t\t\t\t   href=\"https:\/\/conscia.com\/ie\/cases\/conscia-managed-services-for-aarsleff-provides-assurance-security-and-a-future-proof-network\/\">\n\t\t\t\t\t\tRead\t\t\t\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<a  href=\"https:\/\/conscia.com\/ie\/cases\/folkuniversitetet-enhances-cybersecurity-with-conscia-soc\/\" class=\"featured-post has-peach-background-color featured-post--\">\n\t\t<div class=\"featured-post__media  \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image-1024x576.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/nil-soc-fearure-image.jpg 1498w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tSOC\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<div class=\"featured-post__content\">\n\t\t\t<div>\n\t\t\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Case<\/p>\n\t\t\t<\/div>\n\t\t\t\t\t<h3 class=\"featured-post__post-title\">\n\t\t\t\t\tFolkuniversitetet enhances cybersecurity with Conscia SOC\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"featured-post__post-excerpt\">\n\t\t\t\t\t\tAfter a data breach in 2021, it became clear that Folkuniversitetet needed an external security service, a so-called SOC (Security Operations Center). Managing cybersecurity across all 120 locations n&#8230;\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"featured-post__bottom-wrapper\">\n\t\t\t\t<div class=\"featured-post__bottom-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"featured-post__button is-style-icon wp-block-button button-size--small\">\n\t\t\t\t\t<span class=\"wp-block-button__link has-white-color has-black-background-color has-text-color has-background has-link-color wp-element-button\"\n\t\t\t\t\t   href=\"https:\/\/conscia.com\/ie\/cases\/folkuniversitetet-enhances-cybersecurity-with-conscia-soc\/\">\n\t\t\t\t\t\tRead\t\t\t\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"swiper-controls-wrapper\">\n\t\t\t<div class=\"swiper-button-prev\"><\/div>\n\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t<div class=\"swiper-button-next\"><\/div>\n\t\t<\/div>\n\t<\/section>\n\n\n\n<h2 class=\"wp-block-heading alignwide  background-graphics--none\" id=\"h-from-our-knowledge-hub\">From our knowledge hub<\/h2>\n\n\n\n<section id=\"block_acf-block-6989a0c77b197\"\n         class=\"post-query   background-graphics--none alignwide swiper\"  data-autoplay=\"false\" data-slides-per-view=\"3\">\n\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/videos\/nis-2-understanding-what-matters-now\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/02\/16by9-industry-7-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/02\/16by9-industry-7-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/02\/16by9-industry-7-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/02\/16by9-industry-7-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/02\/16by9-industry-7-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/02\/16by9-industry-7.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tNIS2\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Video<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">March 25, 2026<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tNIS 2: Understanding what matters now\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\">\n\t\t<div class=\"post-card__media  has-no-media has-supergraphic has-green-background-color\">\n\t\t\t\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">September 23, 2025<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tNew 0-day vulnerabilities in Microsoft Exchange Server actively exploited\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\">\n\t\t\t\t\t<a class=\"post-card\" href=\"https:\/\/conscia.com\/ie\/blog\/siems-falling-short-80-of-threat-techniques-go-undetected\/\">\n\t\t<div class=\"post-card__media \">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1024x576.jpg\" class=\"post-card__img\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1024x576.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-300x169.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-768x432.jpg 768w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3-1536x864.jpg 1536w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-3.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<div class=\"post-tags\">\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tCybersecurity\t\t\t<\/span>\n\t\t\t\t\t<span class=\"post-tags__tag\">\n\t\t\t\tThreat Intelligence\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"post-meta\">\n\t\t<p class=\"post-meta__post-type\">Blog<\/p>\n\t\t\t\t\t<p class=\"post-meta__published\">September 12, 2025<\/p>\n\t\t\t<\/div>\n\t\t\t<h6 class=\"post-card__title\">\n\t\t\tSIEMs falling short: 80% of threat techniques go undetected\t\t<\/h6>\n\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"swiper-controls-wrapper\">\n\t\t\t<div class=\"swiper-button-prev\"><\/div>\n\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t<div class=\"swiper-button-next\"><\/div>\n\t\t<\/div>\n\t<\/section>\n\n\n\n<div class=\"wp-block-group alignwide  background-graphics--none is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-center is-style-icon button-size--default\" id=\"h-security-is-just-the-start\"><strong>Security is just the start<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-center is-style-icon button-size--default wp-block-paragraph\">From network architecture to cloud scalability and observability, <br>our services support your business where it matters most.<\/p>\n\n\n\n<section id=\"block_acf-block-6989a0c77b1aa\" class=\"grid-cards  is-style-icon button-size--default alignwide has-3-columns\">\n\t\n\n<a href=\"https:\/\/conscia.com\/ie\/networking\/\" id=\"block_acf-block-6989a0c77b1b6\"\n   class=\"featured-page   spacing-before--0 spacing-after--0 has-brand-background-color\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"1080\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/1by1-servers-5-1.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/1by1-servers-5-1.jpg 1080w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/1by1-servers-5-1-300x300.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/1by1-servers-5-1-1024x1024.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/1by1-servers-5-1-150x150.jpg 150w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/1by1-servers-5-1-768x768.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/>\t<div class=\"featured-page__title-wrapper\">\n\t\t<h5 class=\"featured-page__title\">\n\t\t\tNetworking\t\t<\/h5>\n\t\t<div class=\"featured-page__arrow-button\">\n\t\t\t<svg viewBox=\"0 0 40 40\"><use xlink:href=\"https:\/\/conscia.com\/ie\/wp-content\/themes\/conscia\/assets\/dist\/icons\/dist\/icon-sprite.svg#arrow-right\"><\/use><\/svg>\t\t<\/div>\n\t<\/div>\n\t\t\t<p class=\"wp-block-paragraph featured-page__excerpt\">\n\t\t\tWe design and manage robust, reliable networks that scale with you, from first rollout to everyday performance.\t\t<\/p>\n\t<\/a>\n\n\n<a href=\"https:\/\/conscia.com\/ie\/hybrid-cloud\/\" id=\"block_acf-block-6989a0c77b1c0\"\n   class=\"featured-page   spacing-before--0 spacing-after--0 has-no-media  has-supergraphic-secondary has-green-background-color\">\n\t\t<div class=\"featured-page__title-wrapper\">\n\t\t<h5 class=\"featured-page__title\">\n\t\t\tHybrid cloud\t\t<\/h5>\n\t\t<div class=\"featured-page__arrow-button\">\n\t\t\t<svg viewBox=\"0 0 40 40\"><use xlink:href=\"https:\/\/conscia.com\/ie\/wp-content\/themes\/conscia\/assets\/dist\/icons\/dist\/icon-sprite.svg#arrow-right\"><\/use><\/svg>\t\t<\/div>\n\t<\/div>\n\t\t\t<p class=\"wp-block-paragraph featured-page__excerpt\">\n\t\t\tWe combine on-premises and cloud infrastructure into a secure, scalable environment &#8211; tailored to your needs today and ready for whatever comes next.\t\t<\/p>\n\t<\/a>\n\n\n<a href=\"https:\/\/conscia.com\/ie\/observability\/\" id=\"block_acf-block-6989a0c77b264\"\n   class=\"featured-page   spacing-before--0 spacing-after--0 has-brand-background-color\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"1080\" src=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/01\/1by1-using-tech-2-dark2.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/01\/1by1-using-tech-2-dark2.jpg 1080w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/01\/1by1-using-tech-2-dark2-300x300.jpg 300w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/01\/1by1-using-tech-2-dark2-1024x1024.jpg 1024w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/01\/1by1-using-tech-2-dark2-150x150.jpg 150w, https:\/\/conscia.com\/ie\/wp-content\/uploads\/2026\/01\/1by1-using-tech-2-dark2-768x768.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/>\t<div class=\"featured-page__title-wrapper\">\n\t\t<h5 class=\"featured-page__title\">\n\t\t\tObservability\t\t<\/h5>\n\t\t<div class=\"featured-page__arrow-button\">\n\t\t\t<svg viewBox=\"0 0 40 40\"><use xlink:href=\"https:\/\/conscia.com\/ie\/wp-content\/themes\/conscia\/assets\/dist\/icons\/dist\/icon-sprite.svg#arrow-right\"><\/use><\/svg>\t\t<\/div>\n\t<\/div>\n\t\t\t<p class=\"wp-block-paragraph featured-page__excerpt\">\n\t\t\tGet the visibility you need to understand, optimise, and act Modern IT environments evolve at high speed. New services are deployed daily, architectures shift toward cloud and microservices, and telem&#8230;\t\t<\/p>\n\t<\/a>\n\n<\/section><\/div>\n\n\n\n<p class=\" background-graphics--none wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We embed security into every layer of your infrastructure, blocking threats before they disrupt, so you can stay focused on your business.<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"global_solutions":[],"global_partners":[],"global_industries":[],"global_business_outcome":[],"global_types":[],"class_list":["post-157","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity - Conscia Ireland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/ie\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"We embed security into every layer of your infrastructure, blocking threats before they disrupt, so you can stay focused on your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/ie\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T13:20:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-2-1024x1024.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/cybersecurity\/\",\"url\":\"https:\/\/conscia.com\/ie\/cybersecurity\/\",\"name\":\"Cybersecurity - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-2-1024x1024.jpg\",\"datePublished\":\"2025-08-07T10:01:25+00:00\",\"dateModified\":\"2025-08-12T13:20:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/ie\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/ie\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-2-1024x1024.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-2-1024x1024.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/ie\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity - Conscia Ireland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/ie\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity","og_description":"We embed security into every layer of your infrastructure, blocking threats before they disrupt, so you can stay focused on your business.","og_url":"https:\/\/conscia.com\/ie\/cybersecurity\/","og_site_name":"Conscia Ireland","article_modified_time":"2025-08-12T13:20:36+00:00","og_image":[{"url":"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-2-1024x1024.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/cybersecurity\/","url":"https:\/\/conscia.com\/ie\/cybersecurity\/","name":"Cybersecurity - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/ie\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/ie\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-2-1024x1024.jpg","datePublished":"2025-08-07T10:01:25+00:00","dateModified":"2025-08-12T13:20:36+00:00","breadcrumb":{"@id":"https:\/\/conscia.com\/ie\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/ie\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/cybersecurity\/#primaryimage","url":"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-2-1024x1024.jpg","contentUrl":"https:\/\/conscia.com\/wp-content\/uploads\/2025\/05\/1by1-soc-2-1024x1024.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/ie\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/pages\/157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=157"}],"version-history":[{"count":6,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/pages\/157\/revisions"}],"predecessor-version":[{"id":385,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/pages\/157\/revisions\/385"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=157"}],"wp:term":[{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=157"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=157"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=157"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=157"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}