{"id":3138,"date":"2025-01-17T15:34:45","date_gmt":"2025-01-17T14:34:45","guid":{"rendered":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/"},"modified":"2025-11-06T11:18:07","modified_gmt":"2025-11-06T10:18:07","slug":"cybersecurity","status":"publish","type":"nase-sluzby","link":"https:\/\/xevos.eu\/en\/nase-sluzby\/cyber-security\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_section el_class=&#8221;page-header&#8221;][vc_row el_class=&#8221;page-header-row&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\r\n<div class=\"page-header-content\">\r\n\r\n<span class=\"text-md text-blue\">Prevent Cyber Attacks<\/span>\r\n<h2>We protect your privacy, data, and finances<\/h2>\r\n<p class=\"none\">A&nbsp;cyber attack means financial loss, reputation damage, and disruption of sales or production. It only takes downloading a&nbsp;malicious attachment, clicking a&nbsp;fake link, or ignoring updates. We\u2019ll build a&nbsp;protective wall against such threats \u2014 so you stay safe.<\/p>\r\n\r\n<\/div>\r\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\r\n<div class=\"page-header-buttons-wrapper\"><a class=\"btn btn-primary\" href=\"#request\">I\u2019m interested<\/a><a class=\"btn btn-secondary\" href=\"#learn-more\">Learn more<\/a><\/div>\r\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;fakta&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;80 %&#8221; font_container=&#8221;tag:span|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221; el_class=&#8221;text-blue text-xl&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;fs-16&#8243;]of companies have faced a&nbsp;cyber attack.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;1000&#8243; font_container=&#8221;tag:span|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221; el_class=&#8221;text-blue text-xl&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;fs-16&#8243;]attacks per week targeted Czech organizations last year.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_custom_heading text=&#8221;50 %&#8221; font_container=&#8221;tag:h1|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221; el_class=&#8221;text-blue text-xl&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;fs-16&#8243;]increase in the number of cyber attacks.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;ctyri-duvody&#8221; el_id=&#8221;learn-more&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;4 Benefits&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221; el_class=&#8221;heading-secondary text-md&#8221;][vc_custom_heading text=&#8221;You\u2019ll gain with us&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221;][vc_row_inner el_class=&#8221;podnety-slider&#8221; css=&#8221;.vc_custom_1734088011464{margin-right: 0px !important;margin-left: 0px !important;}&#8221;][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;.vc_custom_1738230485090{background-color: #F5F6F900 !important;}&#8221;]\r\n<div class=\"duvod-card\">\r\n<div class=\"duvod-no\">01<\/div>\r\n<div class=\"duvod-headline\">Years of Experience<\/div>\r\n<div class=\"duvod-popis\">We\u2019ve been helping businesses with cybersecurity since our founding in 2008.<\/div>\r\n<\/div>\r\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;.vc_custom_1738230509804{background-color: #F5F6F900 !important;}&#8221;]\r\n<div class=\"duvod-card\">\r\n<div class=\"duvod-no\">02<\/div>\r\n<div class=\"duvod-headline\">Expert Knowledge<\/div>\r\n<div class=\"duvod-popis\">We\u2019re a&nbsp;certified partner of several renowned cybersecurity specialists such as ESET, Avast, Cisco, and others.<\/div>\r\n<\/div>\r\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;.vc_custom_1738230526432{background-color: #F5F6F900 !important;}&#8221;]\r\n<div class=\"duvod-card\">\r\n<div class=\"duvod-no\">03<\/div>\r\n<div class=\"duvod-headline\">Individual Approach<\/div>\r\n<div class=\"duvod-popis\">We create the most suitable custom solution for you \u2014 selecting the right tools, not just pushing one brand at all costs.<\/div>\r\n<\/div>\r\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text css=&#8221;.vc_custom_1738230552319{background-color: #F5F6F900 !important;}&#8221;]\r\n<div class=\"duvod-card\">\r\n<div class=\"duvod-no\">04<\/div>\r\n<div class=\"duvod-headline\">Additional Services<\/div>\r\n<div class=\"duvod-popis\">Our work doesn\u2019t end with implementation. If you wish, we\u2019ll continuously monitor and update your security system and its components.<\/div>\r\n<\/div>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;cervene-puntiky&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Trust the Experts&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221; el_class=&#8221;heading-secondary text-md&#8221;][vc_custom_heading text=&#8221;We\u2019ll handle everything necessary&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221; el_class=&#8221;text-2xl text-dark-blue&#8221;][vc_column_text css=&#8221;&#8221;]\r\n<ul>\r\n \t<li><strong class=\"text-sm text-dark-blue\">Security Status Analysis<\/strong>\r\n<ul>\r\n \t<li>So you know where you stand. We\u2019ll perform a&nbsp;security audit and risk analysis of your systems and test your employees\u2019 cybersecurity awareness.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong class=\"text-sm text-dark-blue\">Solution Design<\/strong>\r\n<ul>\r\n \t<li>So you know what to do. We\u2019ll recommend the most suitable tools and methods to protect your IT against cyber threats \u2014 from antivirus and firewalls to email protection, network architecture, and mobile device security.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong class=\"text-sm text-dark-blue\">Solution Implementation<\/strong>\r\n<ul>\r\n \t<li>For complete ICT protection. We\u2019ll deploy and configure all necessary tools and ensure ongoing updates.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong class=\"text-sm text-dark-blue\">Security Training<\/strong>\r\n<ul>\r\n \t<li>So you won\u2019t get tricked. We\u2019ll train your employees in cybersecurity, including the increasingly common methods of phishing and social engineering.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong class=\"text-sm text-dark-blue\">Incident Response<\/strong>\r\n<ul>\r\n \t<li>So everything returns to normal. In case of a&nbsp;security incident, we\u2019ll guide you through resolving it \u2014 from threat removal to full recovery.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong class=\"text-sm text-dark-blue\">Compliance with Legal Requirements<\/strong>\r\n<ul>\r\n \t<li>To stay compliant with the law. We\u2019ll configure your IT to meet internal and legal security standards (e.g., GDPR, NIS2, Cybersecurity Act).<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;form-section&#8221; el_id=&#8221;request&#8221;][vc_row][vc_column width=&#8221;2\/5&#8243;][vc_custom_heading text=&#8221;Fill out the form&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221; el_class=&#8221;heading-secondary text-md&#8221;][vc_custom_heading text=&#8221;We\u2019ll prepare a&nbsp;non-binding quote for you&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;3\/5&#8243;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f3143-o1\" lang=\"cs-CZ\" dir=\"ltr\" data-wpcf7-id=\"3143\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/nase-sluzby\/3138#wpcf7-f3143-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Kontaktn\u00ed formul\u00e1\u0159\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"3143\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"cs_CZ\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f3143-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"contact-form-container\">\n  <div class=\"form-row\">\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"name-and-surname\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Full Name\" value=\"\" type=\"text\" name=\"name-and-surname\" \/><\/span>\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone Number\" value=\"\" type=\"tel\" name=\"phone\" \/><\/span>\n  <\/div>\n  <div class=\"form-row\">\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email Address\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n    <span class=\"wpcf7-form-control-wrap nase-sluzby\"><select name=\"nase-sluzby\" class=\"wpcf7-form-control wpcf7-select\"><option value=\"\">-- Vyberte slu\u017ebu --<\/option><option value=\"Apple for Business\">Apple for Business<\/option><option value=\"Business\">Business<\/option><option value=\"Cisco Umbrella\">Cisco Umbrella<\/option><option value=\"Cloud solutions\">Cloud solutions<\/option><option value=\"Cyber Security\">Cyber Security<\/option><option value=\"Cybersecurity\">Cybersecurity<\/option><option value=\"Data and WiFi networks\">Data and WiFi networks<\/option><option value=\"Digit\u00e1ln\u00ed slu\u017eby\">Digit\u00e1ln\u00ed slu\u017eby<\/option><option value=\"Digitization\">Digitization<\/option><option value=\"For companies\">For companies<\/option><option value=\"For individuals\">For individuals<\/option><option value=\"Hardware &amp; Software\">Hardware &amp; Software<\/option><option value=\"Implementace\">Implementace<\/option><option value=\"IT Service &amp; Technical Support\">IT Service &amp; Technical Support<\/option><option value=\"IT services\">IT services<\/option><option value=\"Konzulta\u010dn\u00ed slu\u017eby\">Konzulta\u010dn\u00ed slu\u017eby<\/option><option value=\"Microsoft 365\">Microsoft 365<\/option><option value=\"Microsoft 365 Enterprise\">Microsoft 365 Enterprise<\/option><option value=\"Microsoft Surface\">Microsoft Surface<\/option><option value=\"MS 365 Copilot\">MS 365 Copilot<\/option><option value=\"NIS2\">NIS2<\/option><option value=\"Online media and graphic design\">Online media and graphic design<\/option><option value=\"Outsourcing IT\">Outsourcing IT<\/option><option value=\"Pentera\">Pentera<\/option><option value=\"Plan Comparison\">Plan Comparison<\/option><option value=\"Products\">Products<\/option><option value=\"Software development\">Software development<\/option><option value=\"Software studio\">Software studio<\/option><option value=\"Starlink\">Starlink<\/option><option value=\"Starlink\">Starlink<\/option><option value=\"Subsidy and EU projects\">Subsidy and EU projects<\/option><option value=\"Training\">Training<\/option><option value=\"VoIP\">VoIP<\/option><\/select><\/span>\n  <\/div>\n  <div class=\"form-row submit-row\">\n    <input class=\"wpcf7-form-control wpcf7-submit has-spinner btn btn-primary\" type=\"submit\" value=\"Send\" \/>\n  <\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][\/vc_row][\/vc_section]<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section el_class=&#8221;page-header&#8221;][vc_row el_class=&#8221;page-header-row&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;] Prevent Cyber Attacks We protect your privacy, data, and finances A&nbsp;cyber attack means financial loss, reputation damage, and disruption of sales or production. It only takes downloading a&nbsp;malicious attachment, clicking a&nbsp;fake link, or ignoring updates. We\u2019ll build a&nbsp;protective wall against such threats \u2014 so you stay safe. [\/vc_column_text][vc_column_text css=&#8221;&#8221;] I\u2019m [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":3133,"menu_order":0,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-3138","nase-sluzby","type-nase-sluzby","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - XEVOS | Empowering IT. Securing tommorow.<\/title>\n<meta name=\"description\" content=\"Comprehensive cybersecurity \u2013 security audits, penetration testing, threat monitoring, and incident response. Proactive protection of your IT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - XEVOS | Empowering IT. Securing tommorow.\" \/>\n<meta property=\"og:description\" content=\"Comprehensive cybersecurity \u2013 security audits, penetration testing, threat monitoring, and incident response. Proactive protection of your IT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/\" \/>\n<meta property=\"og:site_name\" content=\"XEVOS | Empowering IT. Securing tommorow.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xevoscz\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-06T10:18:07+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@xevoscz\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/\",\"url\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/\",\"name\":\"Cybersecurity - XEVOS | Empowering IT. Securing tommorow.\",\"isPartOf\":{\"@id\":\"https:\/\/xevos.eu\/#website\"},\"datePublished\":\"2025-01-17T14:34:45+00:00\",\"dateModified\":\"2025-11-06T10:18:07+00:00\",\"description\":\"Comprehensive cybersecurity \u2013 security audits, penetration testing, threat monitoring, and incident response. Proactive protection of your IT.\",\"breadcrumb\":{\"@id\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\/\/xevos.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Na\u0161e slu\u017eby\",\"item\":\"https:\/\/xevos.eu\/nase-sluzby\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security\",\"item\":\"https:\/\/xevos.eu\/en\/nase-sluzby\/cyber-security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xevos.eu\/#website\",\"url\":\"https:\/\/xevos.eu\/\",\"name\":\"XEVOS | Empowering IT. Securing tommorow.\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xevos.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - XEVOS | Empowering IT. Securing tommorow.","description":"Comprehensive cybersecurity \u2013 security audits, penetration testing, threat monitoring, and incident response. Proactive protection of your IT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - XEVOS | Empowering IT. Securing tommorow.","og_description":"Comprehensive cybersecurity \u2013 security audits, penetration testing, threat monitoring, and incident response. Proactive protection of your IT.","og_url":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/","og_site_name":"XEVOS | Empowering IT. Securing tommorow.","article_publisher":"https:\/\/www.facebook.com\/xevoscz","article_modified_time":"2025-11-06T10:18:07+00:00","twitter_card":"summary_large_image","twitter_site":"@xevoscz","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/","url":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/","name":"Cybersecurity - XEVOS | Empowering IT. Securing tommorow.","isPartOf":{"@id":"https:\/\/xevos.eu\/#website"},"datePublished":"2025-01-17T14:34:45+00:00","dateModified":"2025-11-06T10:18:07+00:00","description":"Comprehensive cybersecurity \u2013 security audits, penetration testing, threat monitoring, and incident response. Proactive protection of your IT.","breadcrumb":{"@id":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/kyberneticka-bezpecnost\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/xevos.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Na\u0161e slu\u017eby","item":"https:\/\/xevos.eu\/nase-sluzby\/"},{"@type":"ListItem","position":3,"name":"Cyber Security","item":"https:\/\/xevos.eu\/en\/nase-sluzby\/cyber-security\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/xevos.eu\/#website","url":"https:\/\/xevos.eu\/","name":"XEVOS | Empowering IT. Securing tommorow.","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xevos.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/nase-sluzby\/3138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/nase-sluzby"}],"about":[{"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/types\/nase-sluzby"}],"version-history":[{"count":0,"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/nase-sluzby\/3138\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/nase-sluzby\/3133"}],"wp:attachment":[{"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/media?parent=3138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}