{"id":13690,"date":"2025-06-25T14:57:21","date_gmt":"2025-06-25T18:57:21","guid":{"rendered":"https:\/\/qa.cybereco.ca\/fraudulent-personification\/"},"modified":"2026-04-25T07:46:30","modified_gmt":"2026-04-25T11:46:30","slug":"fraudulent-personification","status":"publish","type":"post","link":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/","title":{"rendered":"Fraud by personification"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13690\" class=\"elementor elementor-13690 elementor-12053\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e91b5a9 e-flex e-con-boxed e-con e-parent\" data-id=\"e91b5a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4869e3 elementor-widget elementor-widget-text-editor\" data-id=\"f4869e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Impersonation fraud, which consists of pretending to be an administrator of your company or a supplier, is aimed for forcing a transfer of a large sum of money to a bank account abroad. Fortunately, several clues will allow you to identify a CEO scam and a fake supplier scam.<\/strong><\/p><p>Cybereco offers you a kit on impersonation fraud. You will find tools to better understand how it works, to prevent an attack, to make your team or your loved ones aware of it and thus better protect yourself.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34cb361 e-con-full e-flex e-con e-child\" data-id=\"34cb361\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-30544fe e-grid e-con-full e-con e-child\" data-id=\"30544fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9fb1933 e-con-full e-flex e-con e-child\" data-id=\"9fb1933\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c9d574 elementor-widget elementor-widget-shortcode\" data-id=\"4c9d574\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><a href=\"https:\/\/cybereco.ca\/wp-content\/uploads\/guide_reunion_fraude_personnification_final.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">guide_reunion_fraude_personnification_final<\/a><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b96324a elementor-widget elementor-widget-button\" data-id=\"b96324a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_Fraude-par-personnification_presentation_maj-janvier-2026.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">T\u00e9l\u00e9chargez la pr\u00e9sentation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b9e311 elementor-widget elementor-widget-button\" data-id=\"9b9e311\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cybereco.ca\/wp-content\/uploads\/Cybertrousse_Fraude-par-personnification_Notes-de-presentation.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-file-download\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224 136V0H24C10.7 0 0 10.7 0 24v464c0 13.3 10.7 24 24 24h336c13.3 0 24-10.7 24-24V160H248c-13.2 0-24-10.8-24-24zm76.45 211.36l-96.42 95.7c-6.65 6.61-17.39 6.61-24.04 0l-96.42-95.7C73.42 337.29 80.54 320 94.82 320H160v-80c0-8.84 7.16-16 16-16h32c8.84 0 16 7.16 16 16v80h65.18c14.28 0 21.4 17.29 11.27 27.36zM377 105L279.1 7c-4.5-4.5-10.6-7-17-7H256v128h128v-6.1c0-6.3-2.5-12.4-7-16.9z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">T\u00e9l\u00e9chargez les notes de pr\u00e9sentation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c7a796d e-con-full e-flex e-con e-child\" data-id=\"c7a796d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-831257c elementor-widget elementor-widget-video\" data-id=\"831257c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/usQiVxZIsmM&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Impersonation fraud, which consists of pretending to be an administrator of your company or a supplier, is aimed for forcing a transfer of a large sum of money to a bank account abroad. Fortunately, several clues will allow you to identify a CEO scam and a fake supplier scam. Cybereco offers you a kit on [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":14994,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","content-type":"","footnotes":""},"categories":[11,148,147],"tags":[185],"class_list":["post-13690","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberkit","category-cybersecurity","category-knowledge-center","tag-cyberkit"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fraud by personification - Cybereco<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybereco.ca\/en\/fraudulent-personification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fraud by personification - Cybereco\" \/>\n<meta property=\"og:description\" content=\"Impersonation fraud, which consists of pretending to be an administrator of your company or a supplier, is aimed for forcing a transfer of a large sum of money to a bank account abroad. Fortunately, several clues will allow you to identify a CEO scam and a fake supplier scam. Cybereco offers you a kit on [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybereco.ca\/en\/fraudulent-personification\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybereco\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cybereco.ca\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-25T18:57:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-25T11:46:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybereco.ca\/wp-content\/uploads\/PresentationVideo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1333\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ahmed\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Cybereco1\" \/>\n<meta name=\"twitter:site\" content=\"@Cybereco1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ahmed\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/\"},\"author\":{\"name\":\"Ahmed\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/#\\\/schema\\\/person\\\/f4826cb8aaf00ae2a18171d24fb9e142\"},\"headline\":\"Fraud by personification\",\"datePublished\":\"2025-06-25T18:57:21+00:00\",\"dateModified\":\"2026-04-25T11:46:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/\"},\"wordCount\":124,\"image\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybereco.ca\\\/wp-content\\\/uploads\\\/PresentationVideo.jpg\",\"keywords\":[\"Cyberkit\"],\"articleSection\":[\"Cyberkit\",\"Cybersecurity\",\"Knowledge Center\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/\",\"url\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/\",\"name\":\"Fraud by personification - Cybereco\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybereco.ca\\\/wp-content\\\/uploads\\\/PresentationVideo.jpg\",\"datePublished\":\"2025-06-25T18:57:21+00:00\",\"dateModified\":\"2026-04-25T11:46:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/#\\\/schema\\\/person\\\/f4826cb8aaf00ae2a18171d24fb9e142\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybereco.ca\\\/wp-content\\\/uploads\\\/PresentationVideo.jpg\",\"contentUrl\":\"https:\\\/\\\/cybereco.ca\\\/wp-content\\\/uploads\\\/PresentationVideo.jpg\",\"width\":2000,\"height\":1333},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/fraudulent-personification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraud by personification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/\",\"name\":\"Cybereco\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/#\\\/schema\\\/person\\\/f4826cb8aaf00ae2a18171d24fb9e142\",\"name\":\"Ahmed\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/acbfb211edadb2f8a417cd7478f08bfae21f9d5bab68d3928554e7a59b4344e5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/acbfb211edadb2f8a417cd7478f08bfae21f9d5bab68d3928554e7a59b4344e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/acbfb211edadb2f8a417cd7478f08bfae21f9d5bab68d3928554e7a59b4344e5?s=96&d=mm&r=g\",\"caption\":\"Ahmed\"},\"url\":\"https:\\\/\\\/cybereco.ca\\\/en\\\/author\\\/amahicybercap-qc-ca\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fraud by personification - Cybereco","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/","og_locale":"en_US","og_type":"article","og_title":"Fraud by personification - Cybereco","og_description":"Impersonation fraud, which consists of pretending to be an administrator of your company or a supplier, is aimed for forcing a transfer of a large sum of money to a bank account abroad. Fortunately, several clues will allow you to identify a CEO scam and a fake supplier scam. Cybereco offers you a kit on [&hellip;]","og_url":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/","og_site_name":"Cybereco","article_publisher":"https:\/\/www.facebook.com\/cybereco.ca\/","article_published_time":"2025-06-25T18:57:21+00:00","article_modified_time":"2026-04-25T11:46:30+00:00","og_image":[{"width":2000,"height":1333,"url":"https:\/\/cybereco.ca\/wp-content\/uploads\/PresentationVideo.jpg","type":"image\/jpeg"}],"author":"Ahmed","twitter_card":"summary_large_image","twitter_creator":"@Cybereco1","twitter_site":"@Cybereco1","twitter_misc":{"Written by":"Ahmed","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/#article","isPartOf":{"@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/"},"author":{"name":"Ahmed","@id":"https:\/\/cybereco.ca\/en\/#\/schema\/person\/f4826cb8aaf00ae2a18171d24fb9e142"},"headline":"Fraud by personification","datePublished":"2025-06-25T18:57:21+00:00","dateModified":"2026-04-25T11:46:30+00:00","mainEntityOfPage":{"@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/"},"wordCount":124,"image":{"@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/#primaryimage"},"thumbnailUrl":"https:\/\/cybereco.ca\/wp-content\/uploads\/PresentationVideo.jpg","keywords":["Cyberkit"],"articleSection":["Cyberkit","Cybersecurity","Knowledge Center"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/","url":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/","name":"Fraud by personification - Cybereco","isPartOf":{"@id":"https:\/\/cybereco.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/#primaryimage"},"image":{"@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/#primaryimage"},"thumbnailUrl":"https:\/\/cybereco.ca\/wp-content\/uploads\/PresentationVideo.jpg","datePublished":"2025-06-25T18:57:21+00:00","dateModified":"2026-04-25T11:46:30+00:00","author":{"@id":"https:\/\/cybereco.ca\/en\/#\/schema\/person\/f4826cb8aaf00ae2a18171d24fb9e142"},"breadcrumb":{"@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybereco.ca\/en\/fraudulent-personification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/#primaryimage","url":"https:\/\/cybereco.ca\/wp-content\/uploads\/PresentationVideo.jpg","contentUrl":"https:\/\/cybereco.ca\/wp-content\/uploads\/PresentationVideo.jpg","width":2000,"height":1333},{"@type":"BreadcrumbList","@id":"https:\/\/cybereco.ca\/en\/fraudulent-personification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cybereco.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Fraud by personification"}]},{"@type":"WebSite","@id":"https:\/\/cybereco.ca\/en\/#website","url":"https:\/\/cybereco.ca\/en\/","name":"Cybereco","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybereco.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cybereco.ca\/en\/#\/schema\/person\/f4826cb8aaf00ae2a18171d24fb9e142","name":"Ahmed","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/acbfb211edadb2f8a417cd7478f08bfae21f9d5bab68d3928554e7a59b4344e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/acbfb211edadb2f8a417cd7478f08bfae21f9d5bab68d3928554e7a59b4344e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/acbfb211edadb2f8a417cd7478f08bfae21f9d5bab68d3928554e7a59b4344e5?s=96&d=mm&r=g","caption":"Ahmed"},"url":"https:\/\/cybereco.ca\/en\/author\/amahicybercap-qc-ca\/"}]}},"_links":{"self":[{"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/posts\/13690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/comments?post=13690"}],"version-history":[{"count":6,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/posts\/13690\/revisions"}],"predecessor-version":[{"id":19314,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/posts\/13690\/revisions\/19314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/media\/14994"}],"wp:attachment":[{"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/media?parent=13690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/categories?post=13690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybereco.ca\/en\/wp-json\/wp\/v2\/tags?post=13690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}