{"id":25870,"date":"2025-07-08T10:24:40","date_gmt":"2025-07-08T10:24:40","guid":{"rendered":"https:\/\/onca-solutions.com\/?page_id=25870"},"modified":"2025-08-06T14:17:10","modified_gmt":"2025-08-06T14:17:10","slug":"risk-management","status":"publish","type":"page","link":"https:\/\/onca-solutions.com\/?page_id=25870","title":{"rendered":"Risk Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"25870\" class=\"elementor elementor-25870\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-acb4865 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"acb4865\" data-element_type=\"section\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-263fe011\" data-id=\"263fe011\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60360044 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-image\" data-id=\"60360044\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" width=\"1024\" height=\"749\" src=\"https:\/\/onca-solutions.com\/wp-content\/uploads\/2025\/07\/Untitled-design-16-1024x749.png\" class=\"attachment-large size-large wp-image-25873\" alt=\"\" srcset=\"https:\/\/onca-solutions.com\/wp-content\/uploads\/2025\/07\/Untitled-design-16-1024x749.png 1024w, https:\/\/onca-solutions.com\/wp-content\/uploads\/2025\/07\/Untitled-design-16-300x219.png 300w, https:\/\/onca-solutions.com\/wp-content\/uploads\/2025\/07\/Untitled-design-16-768x561.png 768w, https:\/\/onca-solutions.com\/wp-content\/uploads\/2025\/07\/Untitled-design-16.png 1320w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-551f4ebd flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"551f4ebd\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"title-h2 elementor-heading-title elementor-size-default\">Strategic Risk Management for Operational and Data Security\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ff351c3 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3ff351c3\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<div id=\"page\" class=\"layout-fullwidth header-style-3\"><div id=\"main\" class=\"site-main page__top-shadow visible\"><div class=\"elementor elementor-25742\" data-elementor-type=\"wp-page\" data-elementor-id=\"25742\"><div class=\"elementor-element elementor-element-5f17b984 e-con-full thegem-e-con-layout-thegem e-flex e-con e-parent e-lazyloaded\" data-id=\"5f17b984\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\"><div class=\"elementor-element elementor-element-517e26f8 e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"517e26f8\" data-element_type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\"><div class=\"elementor-element elementor-element-64032acc flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"64032acc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-text-editor elementor-clearfix\">Onca Solutions follows a comprehensive approach to risk management, ensuring the safety of its operations and the protection of its clients\u2019 information. We leverage modern technology and innovative practices to achieve this through multiple strategies, including<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f6f52a3 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-thegem-quoted-text\" data-id=\"4f6f52a3\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;thegem_elementor_preset&quot;:&quot;style-1&quot;}\" data-widget_type=\"thegem-quoted-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"gem-quote gem-quote-style-1 default-background\">\n\t<blockquote class=\"gem-text-output\"><p>\u2026Implementing intelligent, technology-driven risk management solutions to safeguard your operations and data integrity.<span style=\"background-color: transparent\"><\/span><\/p><\/blockquote>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-161c850b flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"161c850b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>We offer robust risk management solutions designed to protect your business from potential threats. Through proactive monitoring, advanced security protocols, and strategic planning, we ensure your operations remain secure, resilient, and compliant with industry standards.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t<div class=\"elementor-element elementor-element-891ca5e thegem-e-con-layout-thegem e-flex e-con-boxed e-con e-parent\" data-id=\"891ca5e\" data-element_type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t\t<div class=\"e-con-inner\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-0a516f0 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0a516f0\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"title-h2 elementor-heading-title elementor-size-default\">Protecting Your Business Through Proactive Risk Strategies<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5f5623 thegem-e-con-layout-thegem e-flex e-con-boxed e-con e-parent\" data-id=\"c5f5623\" data-element_type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t\t<div class=\"e-con-inner\">\r\n\t\t<div class=\"elementor-element elementor-element-56440e3 e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"56440e3\" data-element_type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-c015ddf flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-projectinfo\" data-id=\"c015ddf\" data-element_type=\"widget\" data-settings=\"{&quot;thegem_project_skin&quot;:&quot;project-1&quot;}\" data-widget_type=\"thegem-projectinfo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"gem-project-info  gem-project-info-style-1\">\n\n\t\n\t\t<div class=\"elementor-repeater-item-c0114c6 gem-project-info-item \">\n\n\t\t\t<div class=\"icon \">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>\t\t\t<\/div>\n\n\t\t\t<div class=\"gem-wrapper-project-info\">\n\t\t\t\n\t\t\t\t<h6 class=\"title title-h6 bold\">\n\t\t\t\t\tRisk Assessment\t\t\t\t<\/h6>\n\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"description\">\n\t\t\t\t\t<p>We conduct regular assessments of potential risks that may face the company or our clients. This is done through a thorough analysis of internal processes and the external environment, helping us identify vulnerabilities and potential threats.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t<\/div>\n\n\t\n\t\t<div class=\"elementor-repeater-item-1698f02 gem-project-info-item \">\n\n\t\t\t<div class=\"icon \">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>\t\t\t<\/div>\n\n\t\t\t<div class=\"gem-wrapper-project-info\">\n\t\t\t\n\t\t\t\t<h6 class=\"title title-h6 bold\">\n\t\t\t\t\tImplementation of Advanced Security Solutions\t\t\t\t<\/h6>\n\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"description\">\n\t\t\t\t\t<p>We utilize advanced security technologies such as firewalls, intrusion detection systems, and data encryption. These solutions ensure the protection of sensitive data and information from any threats or breaches.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t<\/div>\n\n\t\n\t\t<div class=\"elementor-repeater-item-46a65b2 gem-project-info-item \">\n\n\t\t\t<div class=\"icon \">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>\t\t\t<\/div>\n\n\t\t\t<div class=\"gem-wrapper-project-info\">\n\t\t\t\n\t\t\t\t<h6 class=\"title title-h6 bold\">\n\t\t\t\t\tTraining and Awareness\t\t\t\t<\/h6>\n\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"description\">\n\t\t\t\t\t<p>We recognize that the human element is one of the most critical aspects of risk management. Therefore, we provide regular training programs for our employees to enhance awareness of cybersecurity risks and best practices for protection<\/p>\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb486b0 e-con-full thegem-e-con-layout-thegem e-flex e-con e-child\" data-id=\"eb486b0\" data-element_type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-0410f35 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-projectinfo\" data-id=\"0410f35\" data-element_type=\"widget\" data-settings=\"{&quot;thegem_project_skin&quot;:&quot;project-1&quot;}\" data-widget_type=\"thegem-projectinfo.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"gem-project-info  gem-project-info-style-1\">\n\n\t\n\t\t<div class=\"elementor-repeater-item-fafb1b7 gem-project-info-item \">\n\n\t\t\t<div class=\"icon \">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>\t\t\t<\/div>\n\n\t\t\t<div class=\"gem-wrapper-project-info\">\n\t\t\t\n\t\t\t\t<h6 class=\"title title-h6 bold\">\n\t\t\t\t\tEmergency Planning and Recovery\t\t\t\t<\/h6>\n\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"description\">\n\t\t\t\t\t<p>We have well-thought-out emergency plans to address<br \/>crises, including data recovery strategies and business continuity plans. These plans ensure minimizing the negative impact of any unexpected events.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t<\/div>\n\n\t\n\t\t<div class=\"elementor-repeater-item-1d4bb13 gem-project-info-item \">\n\n\t\t\t<div class=\"icon \">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>\t\t\t<\/div>\n\n\t\t\t<div class=\"gem-wrapper-project-info\">\n\t\t\t\n\t\t\t\t<h6 class=\"title title-h6 bold\">\n\t\t\t\t\tContinuous Monitoring and Data Analysis\t\t\t\t<\/h6>\n\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"description\">\n\t\t\t\t\t<p>We use data analytics tools to continuously monitor systems and detect any unusual behavior or potential threats. This allows us to respond quickly to any security incidents.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t<\/div>\n\n\t\n\t\t<div class=\"elementor-repeater-item-2de6dd9 gem-project-info-item \">\n\n\t\t\t<div class=\"icon \">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>\t\t\t<\/div>\n\n\t\t\t<div class=\"gem-wrapper-project-info\">\n\t\t\t\n\t\t\t\t<h6 class=\"title title-h6 bold\">\n\t\t\t\t\tCollaboration with Strategic Partners\t\t\t\t<\/h6>\n\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"description\">\n\t\t\t\t\t<p>We collaborate with specialized technology companies to adopt the latest innovations in security and risk management, enhancing our ability to face challenges.<\/p>\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t<\/div>\n\n\t\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a601794 thegem-e-con-layout-thegem e-flex e-con-boxed e-con e-parent\" data-id=\"a601794\" data-element_type=\"container\" data-settings=\"{&quot;thegem_container_layout&quot;:&quot;thegem&quot;}\">\r\n\t\t\t\t\t<div class=\"e-con-inner\">\r\n\t\t\t\t<div class=\"elementor-element elementor-element-2075553 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"2075553\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Through these strategies, Onca Solutions aims to create a safe, stable, and future-ready work environment. We empower our clients with the confidence that their critical data is safeguarded, operational risks are minimized, and their business can thrive with resilience, continuity, and long-term sustainability in an ever-evolving digital landscape.<\/p>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Strategic Risk Management for Operational and Data Security Onca Solutions follows a comprehensive approach to risk management, ensuring the safety&#8230;<\/p>\n","protected":false},"author":1,"featured_media":24168,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25870","page","type-page","status-publish","has-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/onca-solutions.com\/index.php?rest_route=\/wp\/v2\/pages\/25870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onca-solutions.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/onca-solutions.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/onca-solutions.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/onca-solutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25870"}],"version-history":[{"count":5,"href":"https:\/\/onca-solutions.com\/index.php?rest_route=\/wp\/v2\/pages\/25870\/revisions"}],"predecessor-version":[{"id":25907,"href":"https:\/\/onca-solutions.com\/index.php?rest_route=\/wp\/v2\/pages\/25870\/revisions\/25907"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/onca-solutions.com\/index.php?rest_route=\/wp\/v2\/media\/24168"}],"wp:attachment":[{"href":"https:\/\/onca-solutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}