{"id":5204,"date":"2019-05-13T10:09:57","date_gmt":"2019-05-13T08:09:57","guid":{"rendered":"https:\/\/soflab.pl\/2021\/08\/13\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/"},"modified":"2026-03-04T17:23:46","modified_gmt":"2026-03-04T16:23:46","slug":"company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely","status":"publish","type":"post","link":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/","title":{"rendered":"Company in the cloud \u2013 how to move the company to the digital world safely"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Although the cloud is becoming more and more popular in\u00a0Poland, moving into it is still quite a\u00a0challenge for many Polish entrepreneurs. The following guidebook is for those who still hesitate or\u00a0wonder if it is worth doing, or\u00a0have no\u00a0idea how to\u00a0prepare for it.<\/h2>\n<h2><strong>The cloud \u2013 solution of the XXI century<\/strong><\/h2>\n<p>Cloud is a\u00a0modern IT environment that answers the need for flexible business support. It provides a\u00a0configurable resource shared with various entities in\u00a0order to\u00a0launch IT business solutions dedicated to\u00a0them, separated from other cloud users. Cloud services may be\u00a0delivered using different models, the most popular ones include: <strong>IaaS<\/strong>: Infrastructure as\u00a0a\u00a0service, <strong>PaaS<\/strong>: Platform as\u00a0a\u00a0service, <strong>SaaS<\/strong>: Software as\u00a0service, the remaining two, less popular, are: <strong>MBaaS<\/strong>: Mobile &#8220;backend&#8221; as\u00a0a\u00a0service\u00a0 and <strong>FaaS<\/strong>: Function as\u00a0a\u00a0service.<\/p>\n<p>Nowadays, the cloud has been commonly identified with public solutions where many companies share the resource with access via the Internet, and this solution shall be\u00a0discussed in\u00a0the further part of the article. However, it should be\u00a0kept in\u00a0mind that there are also private hybrid solutions.<\/p>\n<p>Year by\u00a0year, more Polish companies decide to\u00a0use various options for cloud services. What convinces them to\u00a0do\u00a0it are, most of all, no\u00a0need for investing in\u00a0their own infrastructure, easy scalability and flexible use. The price of cloud services is rarely an obstacle in\u00a0making the decision to\u00a0switch into them.<\/p>\n<p>The main problem and barrier for the unconvinced is the concern about security, especially about data loss or\u00a0leakage. Ironically, especially in\u00a0the case of small and medium-sized companies, <strong>migration to\u00a0cloud may be\u00a0safer than the solutions installed in\u00a0local server rooms.<\/strong><\/p>\n<h2><strong>The concerns are much exaggerated<\/strong><\/h2>\n<p>A good cloud is, among all, a\u00a0location secured against unauthorized access, 24h infrastructure monitoring, protection against DDoS attacks, environment updates, backups, a\u00a0team of qualified specialists, etc.<\/p>\n<p><strong>Nevertheless, we\u00a0need to\u00a0remember that transition to\u00a0the cloud does not mean moving the responsibility for the security of the provider.<\/strong><\/p>\n<p>Using cloud does not relieve us from this responsibility but allows to\u00a0move part of the tasks concerning security onto the provider. It is crucial to\u00a0be\u00a0fully aware of the provider\u2019s obligations and to\u00a0ensure completing the remaining tasks. This allows to\u00a0avoid the so-called grey area which nobody cares about, and this makes it the weakest link and first thing to\u00a0threat the security.<\/p>\n<h2><strong>Devil is in\u00a0the detail<\/strong><\/h2>\n<p>Task division depends on\u00a0the type of services we\u00a0use. The below-presented figure presents the standard share of responsibilities, as\u00a0for used services: <em>\u00a0<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3874\" src=\"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1.png\" alt=\"cloud scheme\" width=\"920\" height=\"602\" srcset=\"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1.png 920w, https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1-480x314.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 920px, 100vw\" \/><\/p>\n<p><em>Based on\u00a0ENISA materials<\/em><\/p>\n<p>When we\u00a0move the server contents to\u00a0the cloud from a\u00a0service room (IaaS service), the provider is the party responsible for physical security, power, air conditioning or\u00a0network. Still, the responsibility for security of many components comprising our solution, such as\u00a0for instance operating the system, database, application, data or\u00a0access to\u00a0the solution is on\u00a0our side. If we\u00a0decide to\u00a0use CRM as\u00a0SaaS service instead of moving it into the cloud, our liability limits to\u00a0managing the access to\u00a0the application. With the decrease in\u00a0our responsibility, the number of tasks we\u00a0gave away to\u00a0the provider increases, as\u00a0illustrated below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3876\" src=\"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud-02.png\" alt=\"cloud scheme\" width=\"964\" height=\"554\" srcset=\"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud-02.png 964w, https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud-02-480x276.png 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 964px, 100vw\" \/><\/p>\n<p><em>Based on\u00a0ENISA materials<\/em><\/p>\n<p>In every case, no\u00a0matter which services are in\u00a0question or\u00a0what is the task division, <strong>security involves availability assurance, data confidentiality, and integrity<\/strong>, where:<\/p>\n<ul>\n<li><strong>availability<\/strong> \u2013 stands for the possibility to\u00a0use company resources on\u00a0the basis of rules preserving the continuity of operation;<\/li>\n<li><strong>confidentiality<\/strong> \u2013 preventing access by\u00a0unauthorized individuals or\u00a0systems;<\/li>\n<li><strong>integrity <\/strong>\u2013 certainty that the data was not unlawfully altered.<\/li>\n<\/ul>\n<h3 style=\"text-align: center;\"><a href=\"mailto:oferta.security@soflab.pl\" target=\"_blank\" rel=\"noopener noreferrer\">If you need a\u00a0security audit, contact our expert.<\/a><\/h3>\n<h2><strong>Make a\u00a0conscious choice<\/strong><\/h2>\n<p>Before you make the decision to\u00a0use the cloud:<\/p>\n<ol>\n<li><strong>Analyze the current situation of the company, type of processed data, check whether there are any limitations (e.g. resulting from RODO).<\/strong><br \/>Consider whether you want to\u00a0move the entire IT environment or\u00a0to\u00a0use hybrid solutions (to\u00a0move only part of the resources). Also, it is good to\u00a0identify the people with access to\u00a0the resources, verify their personal data and current privileges. Many companies make necessary authorizations but hardly ever makes sure the workers still have them even after they are no\u00a0longer needed. Minimum and only necessary authorization is one of the key issues in\u00a0security.<\/li>\n<li><strong>Determine which services (IaaS, PaaS, SaaS) you need.<\/strong> What needs to\u00a0be\u00a0developed from scratch and what can be\u00a0replaced, e.g. with SaaS services (CRM system, circulation of documents, etc.);<\/li>\n<li><strong>Plan security mechanisms,<\/strong> including:\n<ul>\n<li>the above-mentioned rule for minimum and necessary privileges;<\/li>\n<li>work based on\u00a0roles, e.g. to\u00a0avoid the common practice of connecting user\u2019s and administrator\u2019s privileges on\u00a0a\u00a0single account;<\/li>\n<li>MFA (Multi-factor authentication ) implementation, functionality that forces the user to\u00a0provide extra identity authentication, apart form login and password. It may be, for instance, using an extra USB key, or\u00a0retyping the code sent to\u00a0the user\u2019s mobile phone.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>All these mechanisms are well-known and commonly used within an on-premises infrastructure where it is often possible to\u00a0access the resources only within the network. Therefore, it is even more important to\u00a0remember about them in\u00a0terms of cloud solutions where access is possible everywhere via Internet connection.<\/p>\n<p>Along with the reduction of wide access to\u00a0the services it is worth implementing other mechanisms such as\u00a0allowed devises, locations or\u00a0login time, and many more.<\/p>\n<p>Moreover:<\/p>\n<ul>\n<li>Make sure the data is properly secured when at\u00a0rest. Most service providers store data in\u00a0a\u00a0disturbing form, encrypted using their own keys. If it is too little, check if you can use your own keys (it requires further management), or\u00a0put the highly sensitive data already encrypted in\u00a0the cloud.<\/li>\n<li>Data sent between the users, business partners should be\u00a0transferred as\u00a0encrypted files, via e-mail or\u00a0dedicated links which requires identity authentication.<\/li>\n<\/ul>\n<ol start=\"4\">\n<li><strong>Determine how many and which cloud services you need<\/strong> <strong>and provide a\u00a0list of service providers that are able to\u00a0provide them.<\/strong><\/li>\n<li><strong>Choose the provider<\/strong>, check at\u00a0least:\n<ul>\n<li>Does he\u00a0support solution development and migration?<\/li>\n<li>How can you increase or\u00a0decrease your need for resources? What is the change duration tame?<\/li>\n<li>Where will your data be\u00a0stored? It is especially important in\u00a0terms of RODO. Sometimes, depending on\u00a0the services, one provider stores data in\u00a0various locations, also outside the EU.<\/li>\n<li>How does the provider care about security? Does he\u00a0have a\u00a0security policy, allow for internal audits, present reports drafted by\u00a0independent auditors? Does he\u00a0have security certificates issued by\u00a0independent organizations such as\u00a0ISO\/IEC 27017?<\/li>\n<li>Does the provider allow to\u00a0monitor the used services? On\u00a0what level?<\/li>\n<li>Is there a\u00a0notification process for users informing them about failures and scheduled works? If and how you can influence the time of scheduled works?<\/li>\n<li>How can you report problems and whether the operator guarantees the time of taking the notification and solving the problem (SLA)?<\/li>\n<li>How often and how is backup made? What does the process of restoring the data look like? When dealing with highly sensitive or\u00a0significant in\u00a0terms of business data it is good to\u00a0verify if there is a\u00a0possibility to\u00a0export it to\u00a0an external system, e.g. at\u00a0another could provider.<\/li>\n<li>Sometimes it is necessary to\u00a0resign from the used cloud. It may happen due to\u00a0various reasons, such as\u00a0provider\u2019s downfall, lack of newly required functionalities, or\u00a0prices inadequate to\u00a0the market level. Such a\u00a0situation requires checking whether the provider offers data access via standardized interfaces, stored in\u00a0known formats. Alternatively, if he\u00a0ensures tools allowing data conversion. The lack of such mechanisms may lead to\u00a0Vendor Locking which prolongs the time and increases the effort and cost of the solution which surpasses the benefits.<\/li>\n<\/ul>\n<\/li>\n<li>Think <strong>if your organization has enough competence to\u00a0choose the best services<\/strong> for your needs, plan the architecture and conduct migration, and then to\u00a0provide maintenance. If not, employ specialists or\u00a0provide your workers engaged in\u00a0the project with appropriate training, or\u00a0find a\u00a0reliable and experienced partner.<\/li>\n<li><strong>Plan migration.<\/strong> In\u00a0what order and what should be\u00a0moved? Start with less critical resources form the business point of view.<\/li>\n<li><strong>Prepare internal communication in\u00a0the company.<\/strong> Projects concerning migrating data to\u00a0the cloud very often set not only technological or\u00a0operational challenges but also require facing the lack of acceptation or\u00a0negation from prospective recipients. This is a\u00a0natural reacting for changes. In\u00a0order to\u00a0mitigate the resulting risks, you should:\n<ul>\n<li>Prepare a\u00a0detailed communication plan involving all people and collecting feedback. It will allow for a\u00a0fast reaction when problems occur, to\u00a0adjust actions to\u00a0the current situation, plus, it will increase the engagement and co-responsibility for the project among the workers.<\/li>\n<li>Prepare and pass knowledge about new solutions for future users and administrators.<\/li>\n<li>Plan the support for users after solution launching.<\/li>\n<\/ul>\n<\/li>\n<li>If your users intend to\u00a0work in\u00a0a\u00a0crowded space, <strong>make sure the Internet connection is fast enough.<\/strong> After data migration, the slow connection often becomes a\u00a0bottleneck.<\/li>\n<li><strong>Evaluate risks.<\/strong> Moving into the cloud environment may cause extra risks, new for the own infrastructure. It is required to\u00a0conduct an analysis of the new threats, classify them in\u00a0terms of occurrence probability and their influence on\u00a0business activity. Next, you need to\u00a0plan and implement mechanisms that will allow to\u00a0monitor them. It is good to\u00a0get acquainted with the provider\u2019s offer who very often provides necessary tools.<\/li>\n<li><strong>Update or\u00a0create a\u00a0security policy and make sure that users know it and understand it.<\/strong><\/li>\n<\/ol>\n<h2><strong>No\u00a0more or\u00a0no\u00a0less?<\/strong><\/h2>\n<p>A defined aim, a\u00a0good plan, a\u00a0set division of duties, proper execution, and we\u00a0are safe in\u00a0the cloud. It seems like a\u00a0perfect time to\u00a0relax. Not at\u00a0all. Security is not a\u00a0state that can be\u00a0reached once and forever. It is a\u00a0constant process: following the changes everywhere around, monitoring threats, preparing to\u00a0prevent them, verifying security efficiency, fixing vulnerabilities and continuing to\u00a0follow the changes. It is a\u00a0never-ending work, no\u00a0matter if we\u00a0use our own resources of the cloud.<\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/soflab.pl\/en\/security-test\/\" target=\"_blank\" rel=\"noopener noreferrer\">More about our offer of audits and security testing. \u00a0<\/a><\/h3>\n<p>&nbsp;<\/p>\n<p><em>Written by\u00a0Marcin Szyd\u0142owski, CITO, Soflab Technology Sp. z\u00a0o.o.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Fotografia\u00a0Philipp Birmes\u00a0\/ Pexels<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Although the cloud is becoming more and more popular in\u00a0Poland, moving into it is still quite a\u00a0challenge for many Polish entrepreneurs. The following guidebook is for those who still hesitate or\u00a0wonder if it is worth doing, or\u00a0have no\u00a0idea how to\u00a0prepare for it. The cloud \u2013 solution of the XXI century Cloud is a\u00a0modern IT environment [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<h2>Although the cloud is becoming more and more popular in Poland, moving into it is still quite a challenge for many Polish entrepreneurs. The following guidebook is for those who still hesitate or wonder if it is worth doing, or have no idea how to prepare for it.<\/h2>\n<h2><strong>The cloud \u2013 solution of the XXI century<\/strong><\/h2>\nCloud is a modern IT environment that answers the need for flexible business support. It provides a configurable resource shared with various entities in order to launch IT business solutions dedicated to them, separated from other cloud users. Cloud services may be delivered using different models, the most popular ones include: <strong>IaaS<\/strong>: Infrastructure as a service, <strong>PaaS<\/strong>: Platform as a service, <strong>SaaS<\/strong>: Software as service, the remaining two, less popular, are: <strong>MBaaS<\/strong>: Mobile \"backend\" as a service&nbsp; and <strong>FaaS<\/strong>: Function as a service.\n\nNowadays, the cloud has been commonly identified with public solutions where many companies share the resource with access via the Internet, and this solution shall be discussed in the further part of the article. However, it should be kept in mind that there are also private hybrid solutions.\n\nYear by year, more Polish companies decide to use various options for cloud services. What convinces them to do it are, most of all, no need for investing in their own infrastructure, easy scalability and flexible use. The price of cloud services is rarely an obstacle in making the decision to switch into them.\n\nThe main problem and barrier for the unconvinced is the concern about security, especially about data loss or leakage. Ironically, especially in the case of small and medium-sized companies, <strong>migration to cloud may be safer than the solutions installed in local server rooms.<\/strong>\n<h2><strong>The concerns are much exaggerated<\/strong><\/h2>\nA good cloud is, among all, a location secured against unauthorized access, 24h infrastructure monitoring, protection against DDoS attacks, environment updates, backups, a team of qualified specialists, etc.\n\n<strong>Nevertheless, we need to remember that transition to the cloud does not mean moving the responsibility for the security of the provider.<\/strong>\n\nUsing cloud does not relieve us from this responsibility but allows to move part of the tasks concerning security onto the provider. It is crucial to be fully aware of the provider\u2019s obligations and to ensure completing the remaining tasks. This allows to avoid the so-called grey area which nobody cares about, and this makes it the weakest link and first thing to threat the security.\n<h2><strong>Devil is in the detail<\/strong><\/h2>\nTask division depends on the type of services we use. The below-presented figure presents the standard share of responsibilities, as for used services: <em>&nbsp;<\/em>\n\n<img class=\"alignnone size-full wp-image-3874\" src=\"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1.png\" alt=\"cloud scheme\" width=\"920\" height=\"602\">\n\n<em>Based on ENISA materials<\/em>\n\nWhen we move the server contents to the cloud from a service room (IaaS service), the provider is the party responsible for physical security, power, air conditioning or network. Still, the responsibility for security of many components comprising our solution, such as for instance operating the system, database, application, data or access to the solution is on our side. If we decide to use CRM as SaaS service instead of moving it into the cloud, our liability limits to managing the access to the application. With the decrease in our responsibility, the number of tasks we gave away to the provider increases, as illustrated below:\n\n<img class=\"alignnone size-full wp-image-3876\" src=\"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud-02.png\" alt=\"cloud scheme\" width=\"964\" height=\"554\">\n\n<em>Based on ENISA materials<\/em>\n\nIn every case, no matter which services are in question or what is the task division, <strong>security involves availability assurance, data confidentiality, and integrity<\/strong>, where:\n<ul>\n \t<li><strong>availability<\/strong> \u2013 stands for the possibility to use company resources on the basis of rules preserving the continuity of operation;<\/li>\n \t<li><strong>confidentiality<\/strong> \u2013 preventing access by unauthorized individuals or systems;<\/li>\n \t<li><strong>integrity <\/strong>\u2013 certainty that the data was not unlawfully altered.<\/li>\n<\/ul>\n<h3 style=\"text-align: center;\"><a href=\"mailto:oferta.security@soflab.pl\" target=\"_blank\" rel=\"noopener noreferrer\">If you need a security audit, contact our expert.<\/a><\/h3>\n<h2><strong>Make a conscious choice<\/strong><\/h2>\nBefore you make the decision to use the cloud:\n<ol>\n \t<li><strong>Analyze the current situation of the company, type of processed data, check whether there are any limitations (e.g. resulting from RODO).<\/strong>\nConsider whether you want to move the entire IT environment or to use hybrid solutions (to move only part of the resources). Also, it is good to identify the people with access to the resources, verify their personal data and current privileges. Many companies make necessary authorizations but hardly ever makes sure the workers still have them even after they are no longer needed. Minimum and only necessary authorization is one of the key issues in security.<\/li>\n \t<li><strong>Determine which services (IaaS, PaaS, SaaS) you need.<\/strong> What needs to be developed from scratch and what can be replaced, e.g. with SaaS services (CRM system, circulation of documents, etc.);<\/li>\n \t<li><strong>Plan security mechanisms,<\/strong> including:\n<ul>\n \t<li>the above-mentioned rule for minimum and necessary privileges;<\/li>\n \t<li>work based on roles, e.g. to avoid the common practice of connecting user\u2019s and administrator\u2019s privileges on a single account;<\/li>\n \t<li>MFA (Multi-factor authentication ) implementation, functionality that forces the user to provide extra identity authentication, apart form login and password. It may be, for instance, using an extra USB key, or retyping the code sent to the user\u2019s mobile phone.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\nAll these mechanisms are well-known and commonly used within an on-premises infrastructure where it is often possible to access the resources only within the network. Therefore, it is even more important to remember about them in terms of cloud solutions where access is possible everywhere via Internet connection.\n\nAlong with the reduction of wide access to the services it is worth implementing other mechanisms such as allowed devises, locations or login time, and many more.\n\nMoreover:\n<ul>\n \t<li>Make sure the data is properly secured when at rest. Most service providers store data in a disturbing form, encrypted using their own keys. If it is too little, check if you can use your own keys (it requires further management), or put the highly sensitive data already encrypted in the cloud.<\/li>\n \t<li>Data sent between the users, business partners should be transferred as encrypted files, via e-mail or dedicated links which requires identity authentication.<\/li>\n<\/ul>\n<ol start=\"4\">\n \t<li><strong>Determine how many and which cloud services you need<\/strong> <strong>and provide a list of service providers that are able to provide them.<\/strong><\/li>\n \t<li><strong>Choose the provider<\/strong>, check at least:\n<ul>\n \t<li>Does he support solution development and migration?<\/li>\n \t<li>How can you increase or decrease your need for resources? What is the change duration tame?<\/li>\n \t<li>Where will your data be stored? It is especially important in terms of RODO. Sometimes, depending on the services, one provider stores data in various locations, also outside the EU.<\/li>\n \t<li>How does the provider care about security? Does he have a security policy, allow for internal audits, present reports drafted by independent auditors? Does he have security certificates issued by independent organizations such as ISO\/IEC 27017?<\/li>\n \t<li>Does the provider allow to monitor the used services? On what level?<\/li>\n \t<li>Is there a notification process for users informing them about failures and scheduled works? If and how you can influence the time of scheduled works?<\/li>\n \t<li>How can you report problems and whether the operator guarantees the time of taking the notification and solving the problem (SLA)?<\/li>\n \t<li>How often and how is backup made? What does the process of restoring the data look like? When dealing with highly sensitive or significant in terms of business data it is good to verify if there is a possibility to export it to an external system, e.g. at another could provider.<\/li>\n \t<li>Sometimes it is necessary to resign from the used cloud. It may happen due to various reasons, such as provider\u2019s downfall, lack of newly required functionalities, or prices inadequate to the market level. Such a situation requires checking whether the provider offers data access via standardized interfaces, stored in known formats. Alternatively, if he ensures tools allowing data conversion. The lack of such mechanisms may lead to Vendor Locking which prolongs the time and increases the effort and cost of the solution which surpasses the benefits.<\/li>\n<\/ul>\n<\/li>\n \t<li>Think <strong>if your organization has enough competence to choose the best services<\/strong> for your needs, plan the architecture and conduct migration, and then to provide maintenance. If not, employ specialists or provide your workers engaged in the project with appropriate training, or find a reliable and experienced partner.<\/li>\n \t<li><strong>Plan migration.<\/strong> In what order and what should be moved? Start with less critical resources form the business point of view.<\/li>\n \t<li><strong>Prepare internal communication in the company.<\/strong> Projects concerning migrating data to the cloud very often set not only technological or operational challenges but also require facing the lack of acceptation or negation from prospective recipients. This is a natural reacting for changes. In order to mitigate the resulting risks, you should:\n<ul>\n \t<li>Prepare a detailed communication plan involving all people and collecting feedback. It will allow for a fast reaction when problems occur, to adjust actions to the current situation, plus, it will increase the engagement and co-responsibility for the project among the workers.<\/li>\n \t<li>Prepare and pass knowledge about new solutions for future users and administrators.<\/li>\n \t<li>Plan the support for users after solution launching.<\/li>\n<\/ul>\n<\/li>\n \t<li>If your users intend to work in a crowded space, <strong>make sure the Internet connection is fast enough.<\/strong> After data migration, the slow connection often becomes a bottleneck.<\/li>\n \t<li><strong>Evaluate risks.<\/strong> Moving into the cloud environment may cause extra risks, new for the own infrastructure. It is required to conduct an analysis of the new threats, classify them in terms of occurrence probability and their influence on business activity. Next, you need to plan and implement mechanisms that will allow to monitor them. It is good to get acquainted with the provider\u2019s offer who very often provides necessary tools.<\/li>\n \t<li><strong>Update or create a security policy and make sure that users know it and understand it.<\/strong><\/li>\n<\/ol>\n<h2><strong>No more or no less?<\/strong><\/h2>\nA defined aim, a good plan, a set division of duties, proper execution, and we are safe in the cloud. It seems like a perfect time to relax. Not at all. Security is not a state that can be reached once and forever. It is a constant process: following the changes everywhere around, monitoring threats, preparing to prevent them, verifying security efficiency, fixing vulnerabilities and continuing to follow the changes. It is a never-ending work, no matter if we use our own resources of the cloud.\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/soflab.pl\/en\/our-services\/security-test\/\" target=\"_blank\" rel=\"noopener noreferrer\">More about our offer of audits and security testing. &nbsp;<\/a><\/h3>\n&nbsp;\n\n<em>Written by Marcin Szyd\u0142owski, CITO, Soflab Technology Sp. z o.o.<\/em>\n\n&nbsp;\n\nFotografia&nbsp;Philipp Birmes&nbsp;\/ Pexels","_et_gb_content_width":"","footnotes":""},"categories":[190],"tags":[],"class_list":["post-5204","post","type-post","status-publish","format-standard","hentry","category-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Company in the cloud \u2013 how to move the company to the digital world safely | Soflab Technology<\/title>\n<meta name=\"description\" content=\"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Company in the cloud \u2013 how to move the company to the digital world safely | Soflab Technology\" \/>\n<meta property=\"og:description\" content=\"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/\" \/>\n<meta property=\"og:site_name\" content=\"Soflab\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SoflabTechnology\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-13T08:09:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T16:23:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"920\" \/>\n\t<meta property=\"og:image:height\" content=\"602\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Katarzyna Wojtiuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katarzyna Wojtiuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/\"},\"author\":{\"name\":\"Katarzyna Wojtiuk\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#\\\/schema\\\/person\\\/91a6eb77e23b7c82e0e5435e731ca7c1\"},\"headline\":\"Company in the cloud \u2013 how to move the company to the digital world safely\",\"datePublished\":\"2019-05-13T08:09:57+00:00\",\"dateModified\":\"2026-03-04T16:23:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/\"},\"wordCount\":1850,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/soflab.pl\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/cloud_01-1.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/\",\"url\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/\",\"name\":\"Company in the cloud \u2013 how to move the company to the digital world safely | Soflab Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/soflab.pl\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/cloud_01-1.png\",\"datePublished\":\"2019-05-13T08:09:57+00:00\",\"dateModified\":\"2026-03-04T16:23:46+00:00\",\"description\":\"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/#primaryimage\",\"url\":\"https:\\\/\\\/soflab.pl\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/cloud_01-1.png\",\"contentUrl\":\"https:\\\/\\\/soflab.pl\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/cloud_01-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/news-en\\\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/soflab.pl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company in the cloud \u2013 how to move the company to the digital world safely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/soflab.pl\\\/en\\\/\",\"name\":\"Soflab\",\"description\":\"Soflab QA &amp; Testing\",\"publisher\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/soflab.pl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#organization\",\"name\":\"Soflab\",\"url\":\"https:\\\/\\\/soflab.pl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/soflab.pl\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/logo-soflab.png\",\"contentUrl\":\"https:\\\/\\\/soflab.pl\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/logo-soflab.png\",\"width\":171,\"height\":35,\"caption\":\"Soflab\"},\"image\":{\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/SoflabTechnology\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/soflab-technology-sp--z-o-o-\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/soflab.pl\\\/en\\\/#\\\/schema\\\/person\\\/91a6eb77e23b7c82e0e5435e731ca7c1\",\"name\":\"Katarzyna Wojtiuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g\",\"caption\":\"Katarzyna Wojtiuk\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Company in the cloud \u2013 how to move the company to the digital world safely | Soflab Technology","description":"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/","og_locale":"en_US","og_type":"article","og_title":"Company in the cloud \u2013 how to move the company to the digital world safely | Soflab Technology","og_description":"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!","og_url":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/","og_site_name":"Soflab","article_publisher":"https:\/\/www.facebook.com\/SoflabTechnology","article_published_time":"2019-05-13T08:09:57+00:00","article_modified_time":"2026-03-04T16:23:46+00:00","og_image":[{"width":920,"height":602,"url":"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1.png","type":"image\/png"}],"author":"Katarzyna Wojtiuk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Katarzyna Wojtiuk","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/#article","isPartOf":{"@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/"},"author":{"name":"Katarzyna Wojtiuk","@id":"https:\/\/soflab.pl\/en\/#\/schema\/person\/91a6eb77e23b7c82e0e5435e731ca7c1"},"headline":"Company in the cloud \u2013 how to move the company to the digital world safely","datePublished":"2019-05-13T08:09:57+00:00","dateModified":"2026-03-04T16:23:46+00:00","mainEntityOfPage":{"@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/"},"wordCount":1850,"commentCount":0,"publisher":{"@id":"https:\/\/soflab.pl\/en\/#organization"},"image":{"@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/#primaryimage"},"thumbnailUrl":"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1.png","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/","url":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/","name":"Company in the cloud \u2013 how to move the company to the digital world safely | Soflab Technology","isPartOf":{"@id":"https:\/\/soflab.pl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/#primaryimage"},"image":{"@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/#primaryimage"},"thumbnailUrl":"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1.png","datePublished":"2019-05-13T08:09:57+00:00","dateModified":"2026-03-04T16:23:46+00:00","description":"Soflab to firma zajmuj\u0105ca si\u0119 przeprowadzaniem profesjonalnych test\u00f3w oprogramowania i zapewnieniem jako\u015bci system\u00f3w. Wybierz us\u0142ugi najlepszej jako\u015bci!","breadcrumb":{"@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/#primaryimage","url":"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1.png","contentUrl":"https:\/\/soflab.pl\/wp-content\/uploads\/2019\/05\/cloud_01-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/soflab.pl\/en\/news-en\/company-in-the-cloud-how-to-move-the-company-to-the-digital-world-safely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/soflab.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Company in the cloud \u2013 how to move the company to the digital world safely"}]},{"@type":"WebSite","@id":"https:\/\/soflab.pl\/en\/#website","url":"https:\/\/soflab.pl\/en\/","name":"Soflab","description":"Soflab QA &amp; Testing","publisher":{"@id":"https:\/\/soflab.pl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/soflab.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/soflab.pl\/en\/#organization","name":"Soflab","url":"https:\/\/soflab.pl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/soflab.pl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/soflab.pl\/wp-content\/uploads\/2021\/08\/logo-soflab.png","contentUrl":"https:\/\/soflab.pl\/wp-content\/uploads\/2021\/08\/logo-soflab.png","width":171,"height":35,"caption":"Soflab"},"image":{"@id":"https:\/\/soflab.pl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SoflabTechnology","https:\/\/www.linkedin.com\/company\/soflab-technology-sp--z-o-o-"]},{"@type":"Person","@id":"https:\/\/soflab.pl\/en\/#\/schema\/person\/91a6eb77e23b7c82e0e5435e731ca7c1","name":"Katarzyna Wojtiuk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb60d5b6ea62f3b278da1e7a3120405d74e8059d81c4ecd2d6177e4f864ccfe8?s=96&d=mm&r=g","caption":"Katarzyna Wojtiuk"}}]}},"_links":{"self":[{"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/posts\/5204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/comments?post=5204"}],"version-history":[{"count":4,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/posts\/5204\/revisions"}],"predecessor-version":[{"id":250404,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/posts\/5204\/revisions\/250404"}],"wp:attachment":[{"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/media?parent=5204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/categories?post=5204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/soflab.pl\/en\/wp-json\/wp\/v2\/tags?post=5204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}