{"id":71139,"date":"2026-03-27T11:50:39","date_gmt":"2026-03-27T16:50:39","guid":{"rendered":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/"},"modified":"2026-03-27T11:50:39","modified_gmt":"2026-03-27T16:50:39","slug":"cybersecurity-risk","status":"publish","type":"glossary","link":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/","title":{"rendered":"Cybersecurity Risk"},"content":{"rendered":"<h1>Cybersecurity Risk<\/h1>\n<h2>Definition<\/h2>\n<p><strong>Cybersecurity Risk<\/strong> is the possibility that unauthorized access, malicious attack, system vulnerability, human error, or technology failure will compromise the confidentiality, integrity, or availability of information systems, digital assets, connected operations, or sensitive data, causing operational, financial, legal, or reputational harm.<\/p>\n<h2>What is Cybersecurity Risk?<\/h2>\n<p>Cybersecurity risk exists wherever organizations depend on software, networks, cloud services, connected devices, or digital data to run business activity. The risk is not limited to external hacking. It also includes weak access control, poor system configuration, delayed patching, insider misuse, third-party exposure, and accidental data loss.<\/p>\n<p>The concept matters to IT, risk, <a href=\"https:\/\/simfoni.com\/procurement\/\" data-internallinksmanager029f6b8e52c=\"1\" title=\"Procurement\" target=\"_blank\" rel=\"noopener\">procurement<\/a>, operations, legal, and compliance teams because a cyber incident can interrupt service, expose confidential information, stop production, trigger regulatory obligations, and damage trust with customers or suppliers.<\/p>\n<h2>How Cybersecurity Risk Arises<\/h2>\n<p>Cybersecurity risk comes from the interaction of threat, vulnerability, and business exposure. Threat actors may attempt ransomware, phishing, credential theft, denial-of-service, data theft, or supply chain compromise. If the organization or its vendors have exploitable weaknesses, the threat can become an incident. The real severity then depends on what systems or information are affected.<\/p>\n<p>This means the same technical weakness can have very different consequences depending on the role of the system in the business.<\/p>\n<h2>Cybersecurity Risk in Procurement<\/h2>\n<p>Procurement is closely connected to cybersecurity because vendors often process data, provide software, connect to enterprise systems, or support critical operations. A supplier with weak security can become an entry point into the buyer\u2019s environment or a source of disruption if the supplier itself is attacked.<\/p>\n<p>As a result, cybersecurity is now part of supplier due diligence, contract review, onboarding, and ongoing third-party monitoring in many organizations.<\/p>\n<h2>How Cybersecurity Risk Is Assessed<\/h2>\n<p>Assessment typically considers asset criticality, data sensitivity, access level, control maturity, incident history, recovery capability, and regulatory requirements. Depending on risk level, organizations may use questionnaires, certifications, technical testing, audit evidence, or external security ratings to evaluate suppliers and internal systems.<\/p>\n<p>The goal is not to collect generic security statements, but to determine whether the controls are appropriate for the sensitivity and dependence of the relationship.<\/p>\n<h2>Managing Cybersecurity Risk<\/h2>\n<p>Management includes preventive controls such as identity management, encryption, patching, network segmentation, secure configuration, access restrictions, and user awareness. It also includes detective and response capabilities such as monitoring, logging, backup assurance, incident response planning, and recovery testing.<\/p>\n<p>For suppliers, management also depends on contractual obligations, notification timelines, audit rights, access governance, and secure offboarding when the relationship ends.<\/p>\n<h2>Frequently Asked Questions about Cybersecurity Risk<\/h2>\n<h3>Why does procurement need to assess cybersecurity risk in suppliers?<\/h3>\n<p>Suppliers may store sensitive data, host critical applications, manage connected devices, or hold privileged access into internal environments. If those suppliers are compromised, the impact can extend directly into operations, legal exposure, and customer trust. Procurement therefore needs to assess cybersecurity because supplier relationships often create material attack surface that the buying organization does not fully control once the contract is active.<\/p>\n<h3>Is cybersecurity risk only about external hackers?<\/h3>\n<p>No. External attackers are important, but cyber incidents also result from weak passwords, misconfiguration, excessive access rights, delayed patching, accidental disclosure, insecure integrations, and internal misuse. Risk exists whenever a weakness could affect the confidentiality, integrity, or availability of digital assets. Focusing only on external attack can leave major operational and governance vulnerabilities unaddressed.<\/p>\n<h3>How is cybersecurity risk different from general IT risk?<\/h3>\n<p>IT risk is broader and can include system obsolescence, project failure, unsupported software, weak service availability, or technology misalignment with business need. Cybersecurity risk is more specifically concerned with threats and vulnerabilities that could compromise digital systems or data. The two overlap heavily, but not every IT problem is a cyber problem, and not every cyber issue is purely technical.<\/p>\n<h3>What should contracts include to manage supplier cybersecurity risk?<\/h3>\n<p>Strong contracts usually cover security standards, access restrictions, incident notification timelines, audit rights, encryption expectations, subcontractor controls, data-use limits, breach cooperation, and secure return or destruction of data at termination. The clauses should be proportionate to the actual sensitivity of the service. Generic boilerplate is rarely strong enough for high-impact supplier relationships or regulated data environments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity risk is the possibility that digital systems, data, or connected operations will be harmed by unauthorized access, attack, error, or technology weakness. It affects procurement, supplier management, operations, and compliance.<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"template":"","meta":{"give_campaign_id":0,"footnotes":""},"glossary-categories":[],"glossary-tags":[],"glossary-languages":[],"class_list":["post-71139","glossary","type-glossary","status-publish","hentry"],"post_title":"Cybersecurity Risk","post_content":"<h1>Cybersecurity Risk<\/h1>\n<h2>Definition<\/h2>\n<p><strong>Cybersecurity Risk<\/strong> is the possibility that unauthorized access, malicious attack, system vulnerability, human error, or technology failure will compromise the confidentiality, integrity, or availability of information systems, digital assets, connected operations, or sensitive data, causing operational, financial, legal, or reputational harm.<\/p>\n<h2>What is Cybersecurity Risk?<\/h2>\n<p>Cybersecurity risk exists wherever organizations depend on software, networks, cloud services, connected devices, or digital data to run business activity. The risk is not limited to external hacking. It also includes weak access control, poor system configuration, delayed patching, insider misuse, third-party exposure, and accidental data loss.<\/p>\n<p>The concept matters to IT, risk, procurement, operations, legal, and compliance teams because a cyber incident can interrupt service, expose confidential information, stop production, trigger regulatory obligations, and damage trust with customers or suppliers.<\/p>\n<h2>How Cybersecurity Risk Arises<\/h2>\n<p>Cybersecurity risk comes from the interaction of threat, vulnerability, and business exposure. Threat actors may attempt ransomware, phishing, credential theft, denial-of-service, data theft, or supply chain compromise. If the organization or its vendors have exploitable weaknesses, the threat can become an incident. The real severity then depends on what systems or information are affected.<\/p>\n<p>This means the same technical weakness can have very different consequences depending on the role of the system in the business.<\/p>\n<h2>Cybersecurity Risk in Procurement<\/h2>\n<p>Procurement is closely connected to cybersecurity because vendors often process data, provide software, connect to enterprise systems, or support critical operations. A supplier with weak security can become an entry point into the buyer\u2019s environment or a source of disruption if the supplier itself is attacked.<\/p>\n<p>As a result, cybersecurity is now part of supplier due diligence, contract review, onboarding, and ongoing third-party monitoring in many organizations.<\/p>\n<h2>How Cybersecurity Risk Is Assessed<\/h2>\n<p>Assessment typically considers asset criticality, data sensitivity, access level, control maturity, incident history, recovery capability, and regulatory requirements. Depending on risk level, organizations may use questionnaires, certifications, technical testing, audit evidence, or external security ratings to evaluate suppliers and internal systems.<\/p>\n<p>The goal is not to collect generic security statements, but to determine whether the controls are appropriate for the sensitivity and dependence of the relationship.<\/p>\n<h2>Managing Cybersecurity Risk<\/h2>\n<p>Management includes preventive controls such as identity management, encryption, patching, network segmentation, secure configuration, access restrictions, and user awareness. It also includes detective and response capabilities such as monitoring, logging, backup assurance, incident response planning, and recovery testing.<\/p>\n<p>For suppliers, management also depends on contractual obligations, notification timelines, audit rights, access governance, and secure offboarding when the relationship ends.<\/p>\n<h2>Frequently Asked Questions about Cybersecurity Risk<\/h2>\n<h3>Why does procurement need to assess cybersecurity risk in suppliers?<\/h3>\n<p>Suppliers may store sensitive data, host critical applications, manage connected devices, or hold privileged access into internal environments. If those suppliers are compromised, the impact can extend directly into operations, legal exposure, and customer trust. Procurement therefore needs to assess cybersecurity because supplier relationships often create material attack surface that the buying organization does not fully control once the contract is active.<\/p>\n<h3>Is cybersecurity risk only about external hackers?<\/h3>\n<p>No. External attackers are important, but cyber incidents also result from weak passwords, misconfiguration, excessive access rights, delayed patching, accidental disclosure, insecure integrations, and internal misuse. Risk exists whenever a weakness could affect the confidentiality, integrity, or availability of digital assets. Focusing only on external attack can leave major operational and governance vulnerabilities unaddressed.<\/p>\n<h3>How is cybersecurity risk different from general IT risk?<\/h3>\n<p>IT risk is broader and can include system obsolescence, project failure, unsupported software, weak service availability, or technology misalignment with business need. Cybersecurity risk is more specifically concerned with threats and vulnerabilities that could compromise digital systems or data. The two overlap heavily, but not every IT problem is a cyber problem, and not every cyber issue is purely technical.<\/p>\n<h3>What should contracts include to manage supplier cybersecurity risk?<\/h3>\n<p>Strong contracts usually cover security standards, access restrictions, incident notification timelines, audit rights, encryption expectations, subcontractor controls, data-use limits, breach cooperation, and secure return or destruction of data at termination. The clauses should be proportionate to the actual sensitivity of the service. Generic boilerplate is rarely strong enough for high-impact supplier relationships or regulated data environments.<\/p>","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Risk - Simfoni<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Risk\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity risk is the possibility that digital systems, data, or connected operations will be harmed by unauthorized access, attack, error, or technology weakness. It affects procurement, supplier management, operations, and compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Simfoni\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SimfoniApps\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/\",\"url\":\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/\",\"name\":\"Cybersecurity Risk - Simfoni\",\"isPartOf\":{\"@id\":\"https:\/\/simfoni.com\/#website\"},\"datePublished\":\"2026-03-27T16:50:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/simfoni.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/simfoni.com\/#website\",\"url\":\"https:\/\/simfoni.com\/\",\"name\":\"Simfoni\",\"description\":\"Spend Intelligence and Spend Automation\",\"publisher\":{\"@id\":\"https:\/\/simfoni.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/simfoni.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/simfoni.com\/#organization\",\"name\":\"Simfoni\",\"alternateName\":\"Simfoni\",\"url\":\"https:\/\/simfoni.com\/\",\"logo\":{\"@id\":\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-organization-logo\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SimfoniApps\/\",\"https:\/\/x.com\/simfoniapps\",\"https:\/\/www.instagram.com\/simfoniapps\/\",\"https:\/\/www.linkedin.com\/company\/simfoni\/\",\"https:\/\/www.youtube.com\/@simfoni\",\"https:\/\/g.page\/r\/CTMP26g2qypHEBM\/\",\"https:\/\/www.capterra.com\/p\/206211\/Spend-Analytics\/\",\"https:\/\/www.g2.com\/products\/simfoni-spend-analytics\/\",\"https:\/\/www.glassdoor.com\/Overview\/Working-at-Simfoni-EI_IE3290778.11,18.htm\",\"https:\/\/sourceforge.net\/software\/product\/Simfoni\/\",\"https:\/\/news.google.com\/publications\/CAAqBwgKMMaWxAsw6bHbAw\"],\"description\":\"Simfoni is an AI-powered procurement and spend management platform designed to help enterprises gain complete visibility into organizational spend and turn procurement insight into measurable financial impact. The platform combines advanced spend analytics, intelligent sourcing automation, and tail spend management to enable procurement teams to identify savings opportunities, execute sourcing strategies efficiently, and improve supplier performance across global operations. Built for modern procurement organizations, Simfoni supports Chief Procurement Officers, strategic sourcing leaders, and finance teams who are responsible for driving cost optimization, supplier governance, and operational efficiency. By consolidating procurement data across multiple systems and suppliers, Simfoni provides a unified view of enterprise spend and enables organizations to prioritize sourcing initiatives that deliver measurable savings. Simfoni\u2019s platform integrates spend intelligence with automated sourcing execution, allowing procurement teams to scale sourcing activities without increasing headcount. The system helps organizations manage indirect spend, improve supplier engagement, and strengthen procurement governance through data-driven decision making. Trusted by global enterprises, Simfoni enables organizations to transform procurement from a reactive cost center into a strategic value driver by delivering visibility, automation, and measurable financial outcomes across the procurement lifecycle.\",\"legalName\":\"Simfoni\",\"foundingDate\":\"2015-08-25\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"201\",\"maxValue\":\"500\"},\"address\":{\"@id\":\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-place-address\"},\"telephone\":[\"+1-973-718-7071\",\"+44-208-098-2115\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"23:59\"}],\"email\":\"info@simfoni.com\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-place-address\",\"streetAddress\":\"90 Washington Valley Road\",\"addressLocality\":\"Bedminster\",\"postalCode\":\"07921\",\"addressRegion\":\"New Jersey\",\"addressCountry\":\"US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-organization-logo\",\"url\":\"https:\/\/simfoni.com\/wp-content\/uploads\/2021\/10\/Simfoni.com-Logo.jpg\",\"contentUrl\":\"https:\/\/simfoni.com\/wp-content\/uploads\/2021\/10\/Simfoni.com-Logo.jpg\",\"width\":1000,\"height\":1000,\"caption\":\"Simfoni\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Bedminster\" \/>\n<meta name=\"geo.region\" content=\"United States (US)\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Risk - Simfoni","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Risk","og_description":"Cybersecurity risk is the possibility that digital systems, data, or connected operations will be harmed by unauthorized access, attack, error, or technology weakness. It affects procurement, supplier management, operations, and compliance.","og_url":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/","og_site_name":"Simfoni","article_publisher":"https:\/\/www.facebook.com\/SimfoniApps\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/","url":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/","name":"Cybersecurity Risk - Simfoni","isPartOf":{"@id":"https:\/\/simfoni.com\/#website"},"datePublished":"2026-03-27T16:50:39+00:00","breadcrumb":{"@id":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/simfoni.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Risk"}]},{"@type":"WebSite","@id":"https:\/\/simfoni.com\/#website","url":"https:\/\/simfoni.com\/","name":"Simfoni","description":"Spend Intelligence and Spend Automation","publisher":{"@id":"https:\/\/simfoni.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/simfoni.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":["Organization","Place"],"@id":"https:\/\/simfoni.com\/#organization","name":"Simfoni","alternateName":"Simfoni","url":"https:\/\/simfoni.com\/","logo":{"@id":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-organization-logo"},"image":{"@id":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/SimfoniApps\/","https:\/\/x.com\/simfoniapps","https:\/\/www.instagram.com\/simfoniapps\/","https:\/\/www.linkedin.com\/company\/simfoni\/","https:\/\/www.youtube.com\/@simfoni","https:\/\/g.page\/r\/CTMP26g2qypHEBM\/","https:\/\/www.capterra.com\/p\/206211\/Spend-Analytics\/","https:\/\/www.g2.com\/products\/simfoni-spend-analytics\/","https:\/\/www.glassdoor.com\/Overview\/Working-at-Simfoni-EI_IE3290778.11,18.htm","https:\/\/sourceforge.net\/software\/product\/Simfoni\/","https:\/\/news.google.com\/publications\/CAAqBwgKMMaWxAsw6bHbAw"],"description":"Simfoni is an AI-powered procurement and spend management platform designed to help enterprises gain complete visibility into organizational spend and turn procurement insight into measurable financial impact. The platform combines advanced spend analytics, intelligent sourcing automation, and tail spend management to enable procurement teams to identify savings opportunities, execute sourcing strategies efficiently, and improve supplier performance across global operations. Built for modern procurement organizations, Simfoni supports Chief Procurement Officers, strategic sourcing leaders, and finance teams who are responsible for driving cost optimization, supplier governance, and operational efficiency. By consolidating procurement data across multiple systems and suppliers, Simfoni provides a unified view of enterprise spend and enables organizations to prioritize sourcing initiatives that deliver measurable savings. Simfoni\u2019s platform integrates spend intelligence with automated sourcing execution, allowing procurement teams to scale sourcing activities without increasing headcount. The system helps organizations manage indirect spend, improve supplier engagement, and strengthen procurement governance through data-driven decision making. Trusted by global enterprises, Simfoni enables organizations to transform procurement from a reactive cost center into a strategic value driver by delivering visibility, automation, and measurable financial outcomes across the procurement lifecycle.","legalName":"Simfoni","foundingDate":"2015-08-25","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"201","maxValue":"500"},"address":{"@id":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-place-address"},"telephone":["+1-973-718-7071","+44-208-098-2115"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"00:00","closes":"23:59"}],"email":"info@simfoni.com"},{"@type":"PostalAddress","@id":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-place-address","streetAddress":"90 Washington Valley Road","addressLocality":"Bedminster","postalCode":"07921","addressRegion":"New Jersey","addressCountry":"US"},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/simfoni.com\/glossary\/cybersecurity-risk\/#local-main-organization-logo","url":"https:\/\/simfoni.com\/wp-content\/uploads\/2021\/10\/Simfoni.com-Logo.jpg","contentUrl":"https:\/\/simfoni.com\/wp-content\/uploads\/2021\/10\/Simfoni.com-Logo.jpg","width":1000,"height":1000,"caption":"Simfoni"}]},"geo.placename":"Bedminster","geo.region":"United States (US)"},"_links":{"self":[{"href":"https:\/\/simfoni.com\/wp-json\/wp\/v2\/glossary\/71139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/simfoni.com\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/simfoni.com\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/simfoni.com\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":0,"href":"https:\/\/simfoni.com\/wp-json\/wp\/v2\/glossary\/71139\/revisions"}],"wp:attachment":[{"href":"https:\/\/simfoni.com\/wp-json\/wp\/v2\/media?parent=71139"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/simfoni.com\/wp-json\/wp\/v2\/glossary-categories?post=71139"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/simfoni.com\/wp-json\/wp\/v2\/glossary-tags?post=71139"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/simfoni.com\/wp-json\/wp\/v2\/glossary-languages?post=71139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}