{"id":33819,"date":"2025-10-17T09:00:54","date_gmt":"2025-10-17T08:00:54","guid":{"rendered":"https:\/\/www.topdesk.mom\/en\/?p=33819"},"modified":"2025-11-04T12:54:57","modified_gmt":"2025-11-04T12:54:57","slug":"incident-response-plan-benefits","status":"publish","type":"post","link":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/","title":{"rendered":"The benefits of incident response plans in cybersecurity"},"content":{"rendered":"<p>Cybersecurity incidents and cyber threats aren\u2019t a matter of if \u2013 they\u2019re a matter of when. Globally, <a href=\"https:\/\/blog.checkpoint.com\/research\/check-point-research-reports-highest-increase-of-global-cyber-attacks-seen-in-last-two-years-a-30-increase-in-q2-2024-global-cyber-attacks\/\" target=\"_blank\" rel=\"noopener\">cyberattacks increased by 30% in the second quarter of 2024<\/a>, reaching 1636 attacks per organization per week.<\/p>\n<p>When a cyberattack inevitably happens in your organization, do you know how to respond to minimize the fallout?<\/p>\n<p>Whether you&#8217;re dealing with a data breach, malware attack or service outage, responding to cyberattacks without a proper plan in place is difficult. Effective response planning is crucial: a well-thought-out incident response plan can make all the difference between a minor hiccup and a major disaster.<\/p>\n<p>This blog will explore what incident response plans entail, what the benefits and key components of incident response plans are and how <a href=\"https:\/\/www.topdesk.mom\/en\/itsm-software\/\">ITSM software<\/a> can support effective incident response.<\/p>\n<h2>What is an incident response plan?<\/h2>\n<p>An incident response plan is a structured approach for handling potential security incidents, like security breaches, cyberattacks or any other major security incident.<\/p>\n<p>Essentially, it\u2019s your blueprint for dealing with the mess when something goes wrong. Instead of scrambling to figure things out after the fact, an incident response plan outlines a clear set of actions, roles and responsibilities that allow you to manage the situation in the best way possible.<\/p>\n<p>But incident response plans aren&#8217;t just about staying afloat when something goes wrong: they&#8217;re also part of regulatory compliance. New <a href=\"https:\/\/www.topdesk.mom\/en\/blog\/nis2-ready\/\">cybersecurity directives like NIS 2<\/a> place extra emphasis on having incident response plans in place.<\/p>\n<h2>Benefits of having an incident response plan in place<\/h2>\n<p>Why invest time and effort into building a solid incident response plan? These are the main benefits of effective incident response:<\/p>\n<p><strong>Minimizing the impact and damage of incidents<\/strong>: the quicker you act, the less damage a security incident can cause.<\/p>\n<p><strong>Improving your response time<\/strong>: having a predefined process in place means you\u2019re not wasting time figuring out who does what in the heat of the moment, which can save you time, money and a lot of headaches.<\/p>\n<p><strong>Better communication<\/strong>: with clear protocols in place, everyone \u2013 from your IT team to external stakeholders who might be affected by an incident \u2013 knows exactly what\u2019s happening.<\/p>\n<h2>Key components of incident response plans<\/h2>\n<p>There is no one-size-fits-all example when it comes to incident response plans \u2013 they need to be tailored to your organization and its specific business needs. Still, every incident response plan should include some type of protocol for these four key components:<\/p>\n<h3>1. Preparation<\/h3>\n<p>The best way to deal with an incident is to be ready for it. This involves creating clear policies, procedures and incident response protocols. Part of preparing for incidents includes training your team so they understand their roles and responsibilities when an incident happens and can act accordingly.<\/p>\n<h3>2. Detection and analysis<\/h3>\n<p>The faster you identify a potential incident, the quicker you can respond. Identifying potential incidents involves monitoring systems for unusual activity or spotting incidents as they happen. Once you detect a threat, the next step is assessing its scope and severity and determining how it should be handled.<\/p>\n<h3>3. Containment, eradication, and recovery<\/h3>\n<p>Once you know what kind of incident you\u2019re dealing with, the next step is containing the threat to prevent further damage. Once the incident is contained, the next priority is to identify the root cause of the incident and eliminate that, after which you should focus on restoring affected systems and making sure business operations return to normal as quickly as possible.<\/p>\n<h3>4. Post-incident review<\/h3>\n<p>Once the dust has settled, conducting a post-incident analysis can help you understand what happened, how you handled it and what can be improved a next time. Your lessons learned will help you strengthen your defenses and refine your incident response plan, hopefully reducing the risk of similar incidents happening.<\/p>\n<p>A well-structured incident response plan is a key component of a strong cybersecurity strategy. Learn more about the connection between ITSM and cybersecurity in our blog on <a href=\"https:\/\/www.topdesk.mom\/en\/blog\/itsm-cybersecurity\/\">ITSM and Cybersecurity<\/a>.<\/p>\n<h2>Support your incident response plan with an ITSM tool<\/h2>\n<p><a href=\"https:\/\/www.topdesk.mom\/en\/blog\/itsm-tool-selection\/\">IT service management (ITSM) tools<\/a> help you manage your IT services and incidents \u2013 a perfect match with incident response plans.<\/p>\n<p>These key ITSM software features can support your incident response plan:<\/p>\n<p><a href=\"https:\/\/www.topdesk.mom\/en\/glossary\/what-is-incident-management\/\"><strong>Incident management<\/strong> <\/a>helps you track, manage and resolve incidents in a structured way. With a centralized platform for logging incidents, you can ensure nothing slips through the cracks and keep your most important stakeholders in the loop.<\/p>\n<p>With <a href=\"https:\/\/www.topdesk.mom\/en\/products\/it-service-management-platform\/\">TOPdesk&#8217;s ITSM software<\/a>, for example, you can give your end-users access to a panic button. In case of major incidents, end-users can click this button and automatically alert the incident response team via Microsoft Teams, email and\/or text \u2013 depending on your preferences.<\/p>\n<p><a href=\"https:\/\/www.topdesk.mom\/en\/glossary\/what-is-it-change-management\/\"><strong>IT change management<\/strong><\/a>: When responding to an incident, you might need to make changes to your systems. IT change management helps you implement those changes and document them in a well-defined change management process, minimizing the risk of introducing new vulnerabilities.<\/p>\n<p><a href=\"https:\/\/www.topdesk.mom\/en\/glossary\/what-is-it-asset-management\/\"><strong>IT asset management<\/strong><\/a>: When you keep track of your most important assets through IT asset management, it&#8217;s easier to classify incidents that involve these assets as having high priority. Effective IT asset management can also support problem management by helping you identify the assets that are frequently causing incidents.<\/p>\n<p><strong>Problem management<\/strong>: Once the immediate threat of an incident is neutralized, problem management helps you dive into the root cause of the threat so you can make sure it doesn\u2019t happen again \u2013 an important aspect of any incident response plan. With <a href=\"https:\/\/www.topdesk.mom\/en\/features\/dashboard-and-reporting\/\">dashboarding and reporting features<\/a> that modern ITSM tools like TOPdesk offer, you\u2019ll understand exactly what went wrong and how you can prevent it.<\/p>\n<p><a href=\"https:\/\/www.topdesk.mom\/en\/glossary\/what-is-knowledge-management\/\"><strong>Knowledge management<\/strong><\/a>: Knowledge management and in particular a knowledge base lets you store the solution to incidents that have happened before, helping you \u2013 and others \u2013 handle similar situations way faster the next time around. Your incident response plan can link to known solutions in knowledge items to improve your response time.<\/p>\n<p>Learn more about <a href=\"https:\/\/www.topdesk.mom\/en\/e-books\/cybersecurity\/\">how ITSM can strengthen cybersecurity in our e-book.<\/a><\/p>\n<h2>ITSM and cybersecurity: better together<\/h2>\n<p>Incident response plans aren&#8217;t the only area where ITSM and cybersecurity overlap. With the right ITSM tool in place, not only your incident response plan becomes more effective, but your security defenses and IT operations do too.<\/p>\n<p>With TOPdesk\u2019s ITSM software, protecting your IT services from threats has never been easier. Keep track of vulnerable assets, respond quickly to incidents, and manage security tasks in one overview. Discover how TOPdesk&#8217;s ITSM software can strengthen your defenses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover the benefits of incident response plans in cybersecurity and how ITSM tools can support them.<\/p>\n","protected":false},"author":370,"featured_media":41016,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-33819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":37263,"blog_hubspot_cta_link":{"title":"Discover TOPdesk for cybersecurity","url":"https:\/\/www.topdesk.mom\/en\/cybersecurity-solution\/","target":""},"toc_display":"full","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Benefits of Incident Response Plans | TOPdesk<\/title>\n<meta name=\"description\" content=\"Discover the benefits of an incident response plan and how it can enhance your organization&#039;s security and resilience. Learn more in this insightful blog post.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The benefits of incident response plans in cybersecurity | Better support, happy customers | TOPdesk\" \/>\n<meta property=\"og:description\" content=\"Discover the benefits of an incident response plan and how it can enhance your organization&#039;s security and resilience. Learn more in this insightful blog post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/\" \/>\n<meta property=\"og:site_name\" content=\"T1 TOPdesk - EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-17T08:00:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-04T12:54:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"851\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Naima\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Naima\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/\"},\"author\":{\"name\":\"Naima\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/#\/schema\/person\/d7ab259d97570989da47771760144895\"},\"headline\":\"The benefits of incident response plans in cybersecurity\",\"datePublished\":\"2025-10-17T08:00:54+00:00\",\"dateModified\":\"2025-11-04T12:54:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/\"},\"wordCount\":1083,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/\",\"url\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/\",\"name\":\"Benefits of Incident Response Plans | TOPdesk\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png\",\"datePublished\":\"2025-10-17T08:00:54+00:00\",\"dateModified\":\"2025-11-04T12:54:57+00:00\",\"description\":\"Discover the benefits of an incident response plan and how it can enhance your organization's security and resilience. Learn more in this insightful blog post.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png\",\"contentUrl\":\"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png\",\"width\":1200,\"height\":851},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.mom\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The benefits of incident response plans in cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/#website\",\"url\":\"https:\/\/www.topdesk.mom\/en\/\",\"name\":\"TOPdesk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.mom\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.mom\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.mom\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\",\"https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk\",\"https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/\",\"https:\/\/www.trustradius.com\/products\/topdesk\/reviews\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/#\/schema\/person\/d7ab259d97570989da47771760144895\",\"name\":\"Naima\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.mom\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/29de09aea9c15f13963f2c4f6b33c187b9d82472de10de007c32f0cd91b6e561?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/29de09aea9c15f13963f2c4f6b33c187b9d82472de10de007c32f0cd91b6e561?s=96&d=mm&r=g\",\"caption\":\"Naima\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Benefits of Incident Response Plans | TOPdesk","description":"Discover the benefits of an incident response plan and how it can enhance your organization's security and resilience. Learn more in this insightful blog post.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/","og_locale":"en_US","og_type":"article","og_title":"The benefits of incident response plans in cybersecurity | Better support, happy customers | TOPdesk","og_description":"Discover the benefits of an incident response plan and how it can enhance your organization's security and resilience. Learn more in this insightful blog post.","og_url":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/","og_site_name":"T1 TOPdesk - EN","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2025-10-17T08:00:54+00:00","article_modified_time":"2025-11-04T12:54:57+00:00","og_image":[{"width":1200,"height":851,"url":"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png","type":"image\/png"}],"author":"Naima","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Naima","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/"},"author":{"name":"Naima","@id":"https:\/\/www.topdesk.mom\/en\/#\/schema\/person\/d7ab259d97570989da47771760144895"},"headline":"The benefits of incident response plans in cybersecurity","datePublished":"2025-10-17T08:00:54+00:00","dateModified":"2025-11-04T12:54:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/"},"wordCount":1083,"publisher":{"@id":"https:\/\/www.topdesk.mom\/en\/#organization"},"image":{"@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/","url":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/","name":"Benefits of Incident Response Plans | TOPdesk","isPartOf":{"@id":"https:\/\/www.topdesk.mom\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png","datePublished":"2025-10-17T08:00:54+00:00","dateModified":"2025-11-04T12:54:57+00:00","description":"Discover the benefits of an incident response plan and how it can enhance your organization's security and resilience. Learn more in this insightful blog post.","breadcrumb":{"@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#primaryimage","url":"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png","contentUrl":"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/Cybersecurity-operations-management-landingpage-1.png","width":1200,"height":851},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.mom\/en\/blog\/incident-response-plan-benefits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.mom\/en\/"},{"@type":"ListItem","position":2,"name":"The benefits of incident response plans in cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.mom\/en\/#website","url":"https:\/\/www.topdesk.mom\/en\/","name":"TOPdesk","description":"","publisher":{"@id":"https:\/\/www.topdesk.mom\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.mom\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.mom\/en\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.mom\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.mom\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.mom\/en\/wp-content\/media\/sites\/30\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.mom\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk","https:\/\/www.gartner.com\/reviews\/market\/it-service-management-platforms\/vendor\/topdesk","https:\/\/www.capterra.com\/p\/127562\/TOPdesk\/","https:\/\/www.trustradius.com\/products\/topdesk\/reviews"]},{"@type":"Person","@id":"https:\/\/www.topdesk.mom\/en\/#\/schema\/person\/d7ab259d97570989da47771760144895","name":"Naima","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.mom\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/29de09aea9c15f13963f2c4f6b33c187b9d82472de10de007c32f0cd91b6e561?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29de09aea9c15f13963f2c4f6b33c187b9d82472de10de007c32f0cd91b6e561?s=96&d=mm&r=g","caption":"Naima"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/posts\/33819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/users\/370"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/comments?post=33819"}],"version-history":[{"count":8,"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/posts\/33819\/revisions"}],"predecessor-version":[{"id":45033,"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/posts\/33819\/revisions\/45033"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/person\/37263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/media\/41016"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.mom\/en\/wp-json\/wp\/v2\/media?parent=33819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}