{"id":16492,"date":"2022-11-22T06:00:23","date_gmt":"2022-11-22T06:00:23","guid":{"rendered":"https:\/\/www.swimage.com\/staging\/?page_id=16492"},"modified":"2023-09-02T04:42:10","modified_gmt":"2023-09-02T04:42:10","slug":"incident-response","status":"publish","type":"page","link":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/","title":{"rendered":"Incident Response"},"content":{"rendered":"\n<div class=\"wp-block-group billboard billboard--secondary\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group billboard__body\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h1 class=\"wp-block-heading billboard__title\">Incident Response<\/h1>\n<\/div><\/div>\n<\/div><\/div>\n\n\n<div class=\"row swiminnercontent\"  ><div class=\"container\"><div class=\"row \"  ><br><div class=\"col-xs-12 col-md-6\"><br><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16494 \" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incident-Response-S.png\" alt=\"\" width=\"598\" height=\"336\" srcset=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incident-Response-S.png 800w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incident-Response-S-300x169.png 300w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incident-Response-S-768x432.png 768w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><br><\/div>\n<div class=\"col-xs-12 col-md-6\"><br>In today\u2019s world, it\u2019s not a matter of <b><i>if<\/i><\/b> your company is going to be attacked, but <b><i>when<\/i><\/b>.<\/p>\n<p>Dealing with a sophisticated cybersecurity attack is a daunting task, even for large organizations with a high level of maturity.  A strong incident response capability significantly reduces the damage caused to an organization when catastrophe strikes.  Swimage performs various activities in the four stages of incident response.<\/p>\n<p><\/p>\n<\/div><br><\/div><\/div><\/div>\n<p><\/p>\n<p><\/p><center><p><\/p>\n<p><\/p>\n<h2>Incident Response Stages<\/h2>\n<p><\/p>\n<p><\/p><\/center><p><\/p>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-4-Icons-1.png\" alt=\"\" class=\"wp-image-16483\" width=\"1000\" height=\"500\"\/><\/figure><\/div>\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group layout-block layout-block--option-one\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:20% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"949\" height=\"951\" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Preparation-Icon.png\" alt=\"\" class=\"wp-image-16526 size-medium\" srcset=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Preparation-Icon.png 949w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Preparation-Icon-300x300.png 300w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Preparation-Icon-150x150.png 150w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Preparation-Icon-768x770.png 768w\" sizes=\"auto, (max-width: 949px) 100vw, 949px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading card__title\"><strong>Preparation<\/strong><\/h2>\n\n\n\n<p>Swimage activities in the Preparation stage:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Instrumenting the environment with tools to listen for triggers of suspicious and malicious activity<\/li>\n\n\n\n<li>Establishing baseline systems; understanding \u201cnormal\u201d activity so defenders can identify deviations<\/li>\n\n\n\n<li>Developing and testing courses of action (COAs) for containment and eradication<\/li>\n\n\n\n<li>Establishing means for collecting digital forensics and other data or evidence<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group layout-block layout-block--option-one\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:20% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Detection-Icon.png\" alt=\"\" class=\"wp-image-16486 size-medium\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading card__title\"><strong>Detection &amp; Analysis<\/strong><\/h2>\n\n\n\n<p>Swimage activities in the Detection &amp; Analysis stage:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Safeguarding agents on endpoints; automatically healing any compromised agent<\/li>\n\n\n\n<li>Monitoring, detecting, and alerting on anomalous and suspicious activity on known-good data sources<\/li>\n\n\n\n<li>Collecting and preserving data from affected endpoints for incident verification, categorization, prioritization, mitigation, reporting, and attribution<\/li>\n\n\n\n<li>Capturing a memory and disk image for evidence preservation<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group layout-block layout-block--option-one\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:20% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"952\" height=\"952\" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Containment-Icon.png\" alt=\"\" class=\"wp-image-16517 size-medium\" srcset=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Containment-Icon.png 952w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Containment-Icon-300x300.png 300w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Containment-Icon-150x150.png 150w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Containment-Icon-768x768.png 768w\" sizes=\"auto, (max-width: 952px) 100vw, 952px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading card__title\"><strong>Containment, Eradication, &amp; Recovery<\/strong><\/h2>\n\n\n\n<p>Swimage activities in the Containment, Eradication, &amp; Recovery stage:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Isolating impacted systems from each other and\/or from non-impacted systems and networks<\/li>\n\n\n\n<li>Updating firewall filtering; blocking of unauthorized accesses; blocking malware sources<\/li>\n\n\n\n<li>Closing specific ports and mail servers or other relevant servers and services<\/li>\n\n\n\n<li>Changing system admin passwords, rotating private keys<\/li>\n\n\n\n<li>Rebuilding affected systems from \u2018known-good\u2019 sources; eliminating rootkits; installing patches<\/li>\n\n\n\n<li>Reconnecting rebuilt\/new systems to networks, tightening perimeter security (e.g., firewall rulesets)<\/li>\n\n\n\n<li>Restoring systems to normal operations (e.g., put applications and data back in place)<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group layout-block layout-block--option-one\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:20% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"948\" src=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Post-Incident-Icon.png\" alt=\"\" class=\"wp-image-16519 size-medium\" srcset=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Post-Incident-Icon.png 950w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Post-Incident-Icon-300x300.png 300w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Post-Incident-Icon-150x150.png 150w, https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incidents-Swimage-Post-Incident-Icon-768x766.png 768w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading card__title\"><strong>Post-Incident Activity<\/strong><\/h2>\n\n\n\n<p>Swimage activities in the Post-Incident Activity stage:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Creating rule sets based on lessons learned from the previous incident<\/li>\n\n\n\n<li>Enforcing appropriate triggers and actions based on lessons learned from the previous incident<\/li>\n\n\n\n<li>Creating collections based on most vulnerable groups<\/li>\n\n\n\n<li>Applying enforcement of the rule sets to the collections<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Learn more about <a href=\"https:\/\/www.swimage.com\/staging\/benefits\/business-continuity\/\">Swimage business continuity and disaster recovery<\/a><a><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Incident Response Incident Response Stages Preparation Swimage activities in the Preparation stage: Detection &amp; Analysis Swimage activities in the Detection &amp; Analysis stage: Containment, Eradication,<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":11503,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-portfolio.php","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-16492","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Incident Response &#8226; Swimage Cybersecurity<\/title>\n<meta name=\"description\" content=\"Swimage optimizes your incident response capabilities by providing many functionalities, some of which are not available from any other solution.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incident Response &#8226; Swimage Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Swimage optimizes your incident response capabilities by providing many functionalities, some of which are not available from any other solution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Swimage\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Swimage-154425397911672\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-02T04:42:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incident-Response-S.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@SwimageNow\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/use-cases\\\/incident-response\\\/\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/use-cases\\\/incident-response\\\/\",\"name\":\"Incident Response &#8226; Swimage Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/use-cases\\\/incident-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/use-cases\\\/incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Incident-Response-S.png\",\"datePublished\":\"2022-11-22T06:00:23+00:00\",\"dateModified\":\"2023-09-02T04:42:10+00:00\",\"description\":\"Swimage optimizes your incident response capabilities by providing many functionalities, some of which are not available from any other solution.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/use-cases\\\/incident-response\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.swimage.com\\\/staging\\\/use-cases\\\/incident-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/use-cases\\\/incident-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Incident-Response-S.png\",\"contentUrl\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Incident-Response-S.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/use-cases\\\/incident-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Use Cases\",\"item\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/use-cases\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Incident Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#website\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/\",\"name\":\"Swimage\",\"description\":\"Modern PC Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#organization\",\"name\":\"Swimage\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Fish-blue-registered-white-background-768x512.png\",\"contentUrl\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/Fish-blue-registered-white-background-768x512.png\",\"width\":768,\"height\":512,\"caption\":\"Swimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.swimage.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Swimage-154425397911672\",\"https:\\\/\\\/x.com\\\/SwimageNow\",\"https:\\\/\\\/youtu.be\\\/17rWsOZLSxk\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incident Response &#8226; Swimage Cybersecurity","description":"Swimage optimizes your incident response capabilities by providing many functionalities, some of which are not available from any other solution.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/","og_locale":"en_US","og_type":"article","og_title":"Incident Response &#8226; Swimage Cybersecurity","og_description":"Swimage optimizes your incident response capabilities by providing many functionalities, some of which are not available from any other solution.","og_url":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/","og_site_name":"Swimage","article_publisher":"https:\/\/www.facebook.com\/Swimage-154425397911672","article_modified_time":"2023-09-02T04:42:10+00:00","og_image":[{"url":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incident-Response-S.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@SwimageNow","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/","url":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/","name":"Incident Response &#8226; Swimage Cybersecurity","isPartOf":{"@id":"https:\/\/www.swimage.com\/staging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/#primaryimage"},"image":{"@id":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incident-Response-S.png","datePublished":"2022-11-22T06:00:23+00:00","dateModified":"2023-09-02T04:42:10+00:00","description":"Swimage optimizes your incident response capabilities by providing many functionalities, some of which are not available from any other solution.","breadcrumb":{"@id":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/#primaryimage","url":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incident-Response-S.png","contentUrl":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2022\/11\/Incident-Response-S.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.swimage.com\/staging\/use-cases\/incident-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.swimage.com\/staging\/"},{"@type":"ListItem","position":2,"name":"Use Cases","item":"https:\/\/www.swimage.com\/staging\/use-cases\/"},{"@type":"ListItem","position":3,"name":"Incident Response"}]},{"@type":"WebSite","@id":"https:\/\/www.swimage.com\/staging\/#website","url":"https:\/\/www.swimage.com\/staging\/","name":"Swimage","description":"Modern PC Management","publisher":{"@id":"https:\/\/www.swimage.com\/staging\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.swimage.com\/staging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.swimage.com\/staging\/#organization","name":"Swimage","url":"https:\/\/www.swimage.com\/staging\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.swimage.com\/staging\/#\/schema\/logo\/image\/","url":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2021\/07\/Fish-blue-registered-white-background-768x512.png","contentUrl":"https:\/\/www.swimage.com\/staging\/wp-content\/uploads\/2021\/07\/Fish-blue-registered-white-background-768x512.png","width":768,"height":512,"caption":"Swimage"},"image":{"@id":"https:\/\/www.swimage.com\/staging\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Swimage-154425397911672","https:\/\/x.com\/SwimageNow","https:\/\/youtu.be\/17rWsOZLSxk"]}]}},"_links":{"self":[{"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages\/16492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/comments?post=16492"}],"version-history":[{"count":43,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages\/16492\/revisions"}],"predecessor-version":[{"id":17310,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages\/16492\/revisions\/17310"}],"up":[{"embeddable":true,"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/pages\/11503"}],"wp:attachment":[{"href":"https:\/\/www.swimage.com\/staging\/wp-json\/wp\/v2\/media?parent=16492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}