{"id":2829,"date":"2024-08-02T12:55:23","date_gmt":"2024-08-02T10:55:23","guid":{"rendered":"https:\/\/loro-audit.com\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/"},"modified":"2024-09-25T15:18:39","modified_gmt":"2024-09-25T13:18:39","slug":"kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka","status":"publish","type":"post","link":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/","title":{"rendered":"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka"},"content":{"rendered":"\n<p>Provo\u0111enje IT AUDITA je klju\u010dno za osiguranje kiberneti\u010dke sigurnosti i integriteta podataka, poma\u017eu\u0107i organizacijama da za\u0161tite svoje informacijske resurse i odr\u017eavaju uskla\u0111enost s propisima.<br\/><\/p>\n\n<h3 class=\"wp-block-heading\">Procjena mjera kiberneti\u010dke sigurnosti<\/h3>\n\n<p>Provo\u0111enje IT AUDITA zapo\u010dinje sveobuhvatnom procjenom kiberneti\u010dkih mjera sigurnosti organizacije. Ovaj korak je klju\u010dan za identifikaciju potencijalnih ranjivosti i osiguranje da su svi sustavi i mre\u017ee adekvatno za\u0161ti\u0107eni od kiberneti\u010dkih prijetnji. AUDIT obi\u010dno zapo\u010dinje procjenom sigurnosnih politika, procedura i kontrola organizacije. AUDITORI pregledavaju koliko dobro su te politike implementirane i jesu li uskla\u0111ene s industrijskim standardima i regulativnim zahtjevima.<br\/>   <\/p>\n\n<p>Klju\u010dna podru\u010dja fokusa uklju\u010duju konfiguracije vatrozida, sustave za otkrivanje provale i kontrole pristupa. AUDITORI tako\u0111er ispituju kako je podataka \u0161ifrirano, kako u mirovanju, tako i u prijenosu, kako bi osigurali da su osjetljive informacije za\u0161ti\u0107ene od neovla\u0161tenog pristupa. Osim toga, procjenjuju u\u010dinkovitost planova za odgovor na incidente i sposobnost organizacije da otkrije, reagira i oporavi se od kiberneti\u010dkih napada. Ovaj proces \u010desto uklju\u010duje testiranje obrane organizacije putem simuliranih napada, poznatih kao testiranje provale, kako bi se identificirale slabosti koje bi mogli iskoristiti hakeri.   <\/p>\n\n<p>Nadalje, AUDIT \u0107e procijeniti pristup organizacije upravljanju a\u017euriranjima softvera i zakrpama. Redovito a\u017euriranje sustava je bitno za zatvaranje sigurnosnih rupa koje bi mogli iskoristiti kiberneti\u010dki kriminalci. AUDITORI provjeravaju ima li organizacija sustavni pristup pravovremenom primjeni zakrpa i a\u017euriranja te jesu li prisutni zastarjeli sustavi koji bi mogli predstavljati rizik. Temeljitim procjenjivanjem ovih mjera kiberneti\u010dke sigurnosti, IT AUDIT poma\u017ee osigurati da je digitalna infrastruktura organizacije \u010dvrsta i otporna na kiberneti\u010dke prijetnje.<br\/>   <\/p>\n\n<h3 class=\"wp-block-heading\">Osiguranje integriteta podataka i uskla\u0111enosti<\/h3>\n\n<p>Osim kiberneti\u010dke sigurnosti, IT AUDITI igraju klju\u010dnu ulogu u osiguranju integriteta podataka i uskla\u0111enosti s relevantnim propisima. Integritet podataka odnosi se na to\u010dnost, dosljednost i pouzdanost podataka tijekom njihovog \u017eivotnog ciklusa. Tijekom IT AUDITA, AUDITORI ispituju procese i sustave koji su na snazi za odr\u017eavanje integriteta podataka, uklju\u010duju\u0107i pohranu podataka, procedure izrade sigurnosnih kopija i kontrole pristupa.<br\/>  <\/p>\n\n<p>Jedan od glavnih ciljeva ove faze AUDITA je osigurati da se podaci pohranjuju sigurno i da su dostupni samo ovla\u0161tenom osoblju. AUDITORI provjeravaju prisutnost sna\u017enih mehanizama kontrole pristupa, poput vi\u0161efaktorske autentifikacije i kontrole pristupa na temelju uloga, koji poma\u017eu u sprje\u010davanju neovla\u0161tenog pristupa osjetljivim podacima. Tako\u0111er pregledavaju kako se podaci sigurnosno kopiraju i jesu li procesi izrade sigurnosnih kopija redovito testirani kako bi se osiguralo da se podaci mogu obnoviti u slu\u010daju provale ili kvara sustava.  <\/p>\n\n<p>Uskla\u0111enost s propisima o za\u0161titi podataka, kao \u0161to su GDPR ili HIPAA, jo\u0161 je jedan klju\u010dni aspekt IT AUDITA. AUDITORI procjenjuju jesu li prakse obrade podataka organizacije uskla\u0111ene s tim propisima, uklju\u010duju\u0107i kako se podaci prikupljaju, obra\u0111uju i pohranjuju. To uklju\u010duje pregled politika zadr\u017eavanja podataka kako bi se osiguralo da podaci ne ostanu du\u017ee nego \u0161to je potrebno i da se sigurno bri\u0161u kada vi\u0161e nisu potrebni. Neuskla\u0111enost mo\u017ee rezultirati zna\u010dajnim pravnim i financijskim sankcijama, \u010dine\u0107i ovaj aspekt AUDITA vitalnim za za\u0161titu organizacije od potencijalnih rizika.<br\/>   <\/p>\n\n<h3 class=\"wp-block-heading\">Zaklju\u010dak<\/h3>\n\n<p>Provo\u0111enje IT AUDITA je neophodno za osiguranje kiberneti\u010dke sigurnosti i integriteta podataka. Definiranjem opsega i ciljeva, prikupljanjem relevantnih informacija i izvo\u0111enjem detaljnih procjena, organizacije mogu identificirati ranjivosti i implementirati u\u010dinkovite kontrole za za\u0161titu svojih informacijskih resursa. <\/p>\n\n<p>Za sveobuhvatna rje\u0161enja IT AUDITA, razmotrite kori\u0161tenje LORO AUDITA. LORO AUDIT nudi napredne alate za skeniranje ranjivosti, testiranje provale i verifikaciju integriteta podataka, osiguravaju\u0107i da su IT sustavi va\u0161e organizacije sigurni i uskla\u0111eni s propisima.<br\/> <br\/> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Provo\u0111enje IT AUDITA je klju\u010dno za osiguranje kiberneti\u010dke sigurnosti i integriteta podataka, poma\u017eu\u0107i organizacijama da za\u0161tite svoje informacijske resurse i odr\u017eavaju uskla\u0111enost s propisima. Procjena mjera kiberneti\u010dke sigurnosti Provo\u0111enje IT AUDITA zapo\u010dinje sveobuhvatnom procjenom kiberneti\u010dkih mjera sigurnosti organizacije. Ovaj korak je klju\u010dan za identifikaciju potencijalnih ranjivosti i osiguranje da su svi sustavi i mre\u017ee adekvatno [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1926,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41],"tags":[],"class_list":["post-2829","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-hr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka - LORO Audit<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/\" \/>\n<meta property=\"og:locale\" content=\"hr_HR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka - LORO Audit\" \/>\n<meta property=\"og:description\" content=\"Provo\u0111enje IT AUDITA je klju\u010dno za osiguranje kiberneti\u010dke sigurnosti i integriteta podataka, poma\u017eu\u0107i organizacijama da za\u0161tite svoje informacijske resurse i odr\u017eavaju uskla\u0111enost s propisima. Procjena mjera kiberneti\u010dke sigurnosti Provo\u0111enje IT AUDITA zapo\u010dinje sveobuhvatnom procjenom kiberneti\u010dkih mjera sigurnosti organizacije. Ovaj korak je klju\u010dan za identifikaciju potencijalnih ranjivosti i osiguranje da su svi sustavi i mre\u017ee adekvatno [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/\" \/>\n<meta property=\"og:site_name\" content=\"LORO Audit\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T10:55:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-25T13:18:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Luka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisao\/la\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luka\" \/>\n\t<meta name=\"twitter:label2\" content=\"Procijenjeno vrijeme \u010ditanja\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/\"},\"author\":{\"name\":\"Luka\",\"@id\":\"https:\/\/loro-audit.com\/en\/#\/schema\/person\/eedba1a008091837cec4daa31ec0511e\"},\"headline\":\"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka\",\"datePublished\":\"2024-08-02T10:55:23+00:00\",\"dateModified\":\"2024-09-25T13:18:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\/\/loro-audit.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"hr\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/\",\"url\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/\",\"name\":\"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka - LORO Audit\",\"isPartOf\":{\"@id\":\"https:\/\/loro-audit.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png\",\"datePublished\":\"2024-08-02T10:55:23+00:00\",\"dateModified\":\"2024-09-25T13:18:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#breadcrumb\"},\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hr\",\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#primaryimage\",\"url\":\"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png\",\"contentUrl\":\"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png\",\"width\":1280,\"height\":600,\"caption\":\"LORO Audit - Cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/loro-audit.com\/hr\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/loro-audit.com\/en\/#website\",\"url\":\"https:\/\/loro-audit.com\/en\/\",\"name\":\"LORO Audit\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/loro-audit.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/loro-audit.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/loro-audit.com\/en\/#organization\",\"name\":\"LORO Audit\",\"url\":\"https:\/\/loro-audit.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hr\",\"@id\":\"https:\/\/loro-audit.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/LORO-Audit-logo.png\",\"contentUrl\":\"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/LORO-Audit-logo.png\",\"width\":543,\"height\":192,\"caption\":\"LORO Audit\"},\"image\":{\"@id\":\"https:\/\/loro-audit.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/loro-audit.com\/en\/#\/schema\/person\/eedba1a008091837cec4daa31ec0511e\",\"name\":\"Luka\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hr\",\"@id\":\"https:\/\/loro-audit.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fea11c75419d908f5e898ae56f131a49d125eb829dd5e6f963f837f606eb9f74?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fea11c75419d908f5e898ae56f131a49d125eb829dd5e6f963f837f606eb9f74?s=96&d=mm&r=g\",\"caption\":\"Luka\"},\"url\":\"https:\/\/loro-audit.com\/hr\/author\/luka\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka - LORO Audit","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/","og_locale":"hr_HR","og_type":"article","og_title":"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka - LORO Audit","og_description":"Provo\u0111enje IT AUDITA je klju\u010dno za osiguranje kiberneti\u010dke sigurnosti i integriteta podataka, poma\u017eu\u0107i organizacijama da za\u0161tite svoje informacijske resurse i odr\u017eavaju uskla\u0111enost s propisima. Procjena mjera kiberneti\u010dke sigurnosti Provo\u0111enje IT AUDITA zapo\u010dinje sveobuhvatnom procjenom kiberneti\u010dkih mjera sigurnosti organizacije. Ovaj korak je klju\u010dan za identifikaciju potencijalnih ranjivosti i osiguranje da su svi sustavi i mre\u017ee adekvatno [&hellip;]","og_url":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/","og_site_name":"LORO Audit","article_published_time":"2024-08-02T10:55:23+00:00","article_modified_time":"2024-09-25T13:18:39+00:00","og_image":[{"width":1280,"height":600,"url":"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png","type":"image\/png"}],"author":"Luka","twitter_card":"summary_large_image","twitter_misc":{"Napisao\/la":"Luka","Procijenjeno vrijeme \u010ditanja":"3 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#article","isPartOf":{"@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/"},"author":{"name":"Luka","@id":"https:\/\/loro-audit.com\/en\/#\/schema\/person\/eedba1a008091837cec4daa31ec0511e"},"headline":"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka","datePublished":"2024-08-02T10:55:23+00:00","dateModified":"2024-09-25T13:18:39+00:00","mainEntityOfPage":{"@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/"},"wordCount":628,"publisher":{"@id":"https:\/\/loro-audit.com\/en\/#organization"},"image":{"@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#primaryimage"},"thumbnailUrl":"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png","articleSection":["Blog"],"inLanguage":"hr"},{"@type":"WebPage","@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/","url":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/","name":"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka - LORO Audit","isPartOf":{"@id":"https:\/\/loro-audit.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#primaryimage"},"image":{"@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#primaryimage"},"thumbnailUrl":"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png","datePublished":"2024-08-02T10:55:23+00:00","dateModified":"2024-09-25T13:18:39+00:00","breadcrumb":{"@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#breadcrumb"},"inLanguage":"hr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/"]}]},{"@type":"ImageObject","inLanguage":"hr","@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#primaryimage","url":"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png","contentUrl":"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/3-1.png","width":1280,"height":600,"caption":"LORO Audit - Cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/loro-audit.com\/hr\/kako-provesti-it-audite-osiguranje-kiberneticke-sigurnosti-i-integriteta-podataka\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/loro-audit.com\/hr\/home\/"},{"@type":"ListItem","position":2,"name":"Kako provesti IT AUDITE: osiguranje kiberneti\u010dke sigurnosti i integriteta podataka"}]},{"@type":"WebSite","@id":"https:\/\/loro-audit.com\/en\/#website","url":"https:\/\/loro-audit.com\/en\/","name":"LORO Audit","description":"","publisher":{"@id":"https:\/\/loro-audit.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/loro-audit.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hr"},{"@type":"Organization","@id":"https:\/\/loro-audit.com\/en\/#organization","name":"LORO Audit","url":"https:\/\/loro-audit.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"hr","@id":"https:\/\/loro-audit.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/LORO-Audit-logo.png","contentUrl":"https:\/\/loro-audit.com\/wp-content\/uploads\/2024\/08\/LORO-Audit-logo.png","width":543,"height":192,"caption":"LORO Audit"},"image":{"@id":"https:\/\/loro-audit.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/loro-audit.com\/en\/#\/schema\/person\/eedba1a008091837cec4daa31ec0511e","name":"Luka","image":{"@type":"ImageObject","inLanguage":"hr","@id":"https:\/\/loro-audit.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fea11c75419d908f5e898ae56f131a49d125eb829dd5e6f963f837f606eb9f74?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fea11c75419d908f5e898ae56f131a49d125eb829dd5e6f963f837f606eb9f74?s=96&d=mm&r=g","caption":"Luka"},"url":"https:\/\/loro-audit.com\/hr\/author\/luka\/"}]}},"_links":{"self":[{"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/posts\/2829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/comments?post=2829"}],"version-history":[{"count":1,"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/posts\/2829\/revisions"}],"predecessor-version":[{"id":2830,"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/posts\/2829\/revisions\/2830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/media\/1926"}],"wp:attachment":[{"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/media?parent=2829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/categories?post=2829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/loro-audit.com\/hr\/wp-json\/wp\/v2\/tags?post=2829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}