{"id":4184,"date":"2023-06-13T10:13:17","date_gmt":"2023-06-13T10:13:17","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=4184"},"modified":"2024-05-20T12:58:43","modified_gmt":"2024-05-20T12:58:43","slug":"gitprotect-by-xopero-is-now-soc-2-type-ii-compliant","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/","title":{"rendered":"We got it&#8230; again! GitProtect By Xopero is SOC 2 Type II audited"},"content":{"rendered":"\n<p>Security is our DNA &#8211; we are keeping to repeat it and have already proven it many times. When you ran a backup and data protection company, your number one priority is to hold products, customers, teams, and processes according to the world-highest security standards.&nbsp;<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>We are excited and proud to announce that for the second year in a row, on May 17th 2024, we completed the SOC 2 Type II report covering all principles of information security, which are: Security, Availability, Confidentiality, and Processing Integrity as well as all common COSO and information security criteria like e.g. Logical and Physical Access Controls, System Operations, Risk Mitigation, Change Management, and more.\u00a0<\/p>\n\n\n\n<p>Therefore, we are one of the few vendors on the backup market that has passed the two most important audits on the market &#8211; both SOC 2 Type II and <a href=\"https:\/\/gitprotect.io\/blog\/iso-27001-certification-gitprotects-by-xopero-software-iso-27001-audit-process-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001. <\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is the SOC 2 Type II all about?&nbsp;<\/strong><\/h2>\n\n\n\n<p>In short: SOC 2 is the best way to prove that customers&#8217; data and its protection is your top priority.<\/p>\n\n\n\n<p>Speaking officially, SOC stands for Service Organization Control. SOC 2 is a framework applicable to technology or SaaS companies that store customer data in the cloud. Developed by the American Institute of CPAs (AICPA), it defines criteria for managing customer data based on \u201ctrust service principles\u201d.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"224\" height=\"223\" src=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/socforserviceorganizationslogosos-1.jpg\" alt=\"\" class=\"wp-image-4190\" style=\"width:178px;height:177px\" srcset=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/socforserviceorganizationslogosos-1.jpg 224w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/socforserviceorganizationslogosos-1-150x150.jpg 150w, https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/socforserviceorganizationslogosos-1-180x180.jpg 180w\" sizes=\"(max-width: 224px) 100vw, 224px\" \/><\/figure><\/div>\n\n\n<p>However, controls and reports are unique to every business. Each company designs its own controls to comply with its Trust Services Criteria (TSC).<\/p>\n\n\n\n<p>In practice, <strong>SOC 2<\/strong> is an audit procedure that results in a report detailing how your service provider manages the data entrusted to it.&nbsp;<\/p>\n\n\n\n<p><strong>SOC 2<\/strong> consists of two reports:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Type 1 &#8211; describes the information security management system and assesses its adequacy in the context of the standard&#8217;s checkpoints.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Type 2 \u2013 assesses whether the information security management system is actually functioning (describes evidence of the functioning of security measures for a specific period of time, at least 6 months).<\/li>\n<\/ul>\n\n\n\n<p>Short reminder: <a href=\"https:\/\/gitprotect.io\/blog\/we-did-it-gitprotect-io-by-xopero-software-is-soc2-compliant\/\" target=\"_blank\" rel=\"noreferrer noopener\">GitProtect completed SOC 2 Type I audit in June 2022<\/a> and unlike other DevOps backup providers, it was checked in as many as 4 principles of information security!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Our journey to SOC 2 Type II<\/strong><\/h2>\n\n\n\n<p>SOC 2 report is issued by outside auditors. For our part, we needed the right technology and IT infrastructure in place. We designed very rigorous security processes and trained each team member on the security posture and our top principles. We made a permanent process out of it &#8211; getting audited year after year is the best proof of this.<\/p>\n\n\n\n<p>In order to determine the level of security of information processing in our company and meet the requirements of TSC SOC 2 Type II, the auditors have thoughtfully analyzed our documentation, conducted interviews with our team members, and analyzed websites but on top of that scanned, checked, observed and inspected our processes and infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Checkpoint<\/strong><\/h2>\n\n\n\n<p>In fact, the official audit report that we are extremely proud of is just the beginning of the journey. We are committed and responsible for:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Meeting all the services within the Identify Control Management System<\/li>\n\n\n\n<li>Identifying the risks that threaten the achievement of the control objectives and the service organization\u2019s commitments<\/li>\n\n\n\n<li>Designing controls to mitigate those risks<\/li>\n\n\n\n<li>and more.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>There is no finish line for us. We will constantly check and improve our security measures &#8211; it remains our #1 priority.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What does SOC 2 mean for our customers?&nbsp;<\/strong><\/h2>\n\n\n\n<p>Again, in short &#8211; it means that our customers&#8217; data and its protection are our top priority. And it&#8217;s not just words &#8211; it&#8217;s an officially documented and audited pledge!<\/p>\n\n\n\n<p>Our security posture is proven by world-class security standards such as SOC 2 Type I, ISO 27001, GDPR and  SOC 2 Type II. In accordance with them, we select our technologies, create processes and establish technology partnerships.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f5f5f5\">Want to go further? Check our <a href=\"https:\/\/gitprotect.io\/security.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security &amp; Compliance use case<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>SOC 2 Type 2 compliant vendor for your SOC 2 journey<\/strong><\/h2>\n\n\n\n<p>What&#8217;s more, we help our customers go through a similar path &#8211; if you are in the process of SOC 2 certification, it is worth considering solutions that work in accordance with these standards and will help you in your own journey.&nbsp;<\/p>\n\n\n\n<p>We use Jira, and git hosting services ourselves, so we know how crucial this data is &#8211; not only for security audits and certifications. For every technology-related company source code, as Intellectual Property, repositories, and metadata as well as Jira data are the key. Data loss or even short-term loss of access to the service might cost a fortune.<\/p>\n\n\n\n<p>On your own SOC 2 certification journey, you&#8217;d better not forget to design and implement backup and data protection best practices for your DevOps data. And remember &#8211; We have got your back(up)!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is our DNA &#8211; we are keeping to repeat it and have already proven it many times. When you ran a backup and data protection company, your number one priority is to hold products, customers, teams, and processes according to the world-highest security standards.&nbsp;<\/p>\n","protected":false},"author":5,"featured_media":4185,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-4184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>We got it... again! GitProtect By Xopero is SOC 2 Type II audited - Blog | GitProtect.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"We got it... again! GitProtect By Xopero is SOC 2 Type II audited - Blog | GitProtect.io\" \/>\n<meta property=\"og:description\" content=\"Security is our DNA &#8211; we are keeping to repeat it and have already proven it many times. When you ran a backup and data protection company, your number one priority is to hold products, customers, teams, and processes according to the world-highest security standards.&nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-13T10:13:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-20T12:58:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marta Przybylska, Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marta Przybylska, Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/\"},\"author\":{\"name\":\"Marta Przybylska, Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/fa22c4de2bf6a4418caa83f17a206621\"},\"headline\":\"We got it&#8230; again! GitProtect By Xopero is SOC 2 Type II audited\",\"datePublished\":\"2023-06-13T10:13:17+00:00\",\"dateModified\":\"2024-05-20T12:58:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/\"},\"wordCount\":780,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/\",\"name\":\"We got it... again! GitProtect By Xopero is SOC 2 Type II audited - Blog | GitProtect.io\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png\",\"datePublished\":\"2023-06-13T10:13:17+00:00\",\"dateModified\":\"2024-05-20T12:58:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"We got it&#8230; again! GitProtect By Xopero is SOC 2 Type II audited\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/fa22c4de2bf6a4418caa83f17a206621\",\"name\":\"Marta Przybylska, Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fdc25e906234f27fdc12626a083958cd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fdc25e906234f27fdc12626a083958cd?s=96&d=mm&r=g\",\"caption\":\"Marta Przybylska, Content Writer at GitProtect.io\"},\"description\":\"Marta is the CMO of GitProtect and Xopero. She has done all her career in the software industry - starting from gaming, through startups, ending with Developer Marketing and cybersecurity. In everyday duties, it quickly turned out that it was easier for her to understand and learn technology than to wait for developers' answers. And that's how the deep relationship with technology, DevOps and cybersecurity started.\",\"url\":\"https:\/\/gitprotect.io\/blog\/author\/m-przybylska\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"We got it... again! GitProtect By Xopero is SOC 2 Type II audited - Blog | GitProtect.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/","og_locale":"en_US","og_type":"article","og_title":"We got it... again! GitProtect By Xopero is SOC 2 Type II audited - Blog | GitProtect.io","og_description":"Security is our DNA &#8211; we are keeping to repeat it and have already proven it many times. When you ran a backup and data protection company, your number one priority is to hold products, customers, teams, and processes according to the world-highest security standards.&nbsp;","og_url":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2023-06-13T10:13:17+00:00","article_modified_time":"2024-05-20T12:58:43+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png","type":"image\/png"}],"author":"Marta Przybylska, Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Marta Przybylska, Content Writer at GitProtect.io","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/"},"author":{"name":"Marta Przybylska, Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/fa22c4de2bf6a4418caa83f17a206621"},"headline":"We got it&#8230; again! GitProtect By Xopero is SOC 2 Type II audited","datePublished":"2023-06-13T10:13:17+00:00","dateModified":"2024-05-20T12:58:43+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/"},"wordCount":780,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/","url":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/","name":"We got it... again! GitProtect By Xopero is SOC 2 Type II audited - Blog | GitProtect.io","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png","datePublished":"2023-06-13T10:13:17+00:00","dateModified":"2024-05-20T12:58:43+00:00","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/06\/blog-atom.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/gitprotect-by-xopero-is-now-soc-2-type-ii-compliant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"We got it&#8230; again! GitProtect By Xopero is SOC 2 Type II audited"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/fa22c4de2bf6a4418caa83f17a206621","name":"Marta Przybylska, Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fdc25e906234f27fdc12626a083958cd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fdc25e906234f27fdc12626a083958cd?s=96&d=mm&r=g","caption":"Marta Przybylska, Content Writer at GitProtect.io"},"description":"Marta is the CMO of GitProtect and Xopero. She has done all her career in the software industry - starting from gaming, through startups, ending with Developer Marketing and cybersecurity. In everyday duties, it quickly turned out that it was easier for her to understand and learn technology than to wait for developers' answers. And that's how the deep relationship with technology, DevOps and cybersecurity started.","url":"https:\/\/gitprotect.io\/blog\/author\/m-przybylska\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=4184"}],"version-history":[{"count":8,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4184\/revisions"}],"predecessor-version":[{"id":5295,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/4184\/revisions\/5295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/4185"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=4184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=4184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=4184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}