{"id":37388,"date":"2025-09-17T10:43:37","date_gmt":"2025-09-17T14:43:37","guid":{"rendered":"https:\/\/www.lightspeedsystems.com\/?post_type=ebook&#038;p=37388"},"modified":"2026-04-01T11:36:15","modified_gmt":"2026-04-01T15:36:15","slug":"ensuring-zero-trust-in-k-12-education","status":"publish","type":"ebook","link":"https:\/\/www.lightspeedsystems.com\/nb\/ebook\/ensuring-zero-trust-in-k-12-education\/","title":{"rendered":"Sikre nulltillitsbasert cybersikkerhet i grunnskolen og videreg\u00e5ende oppl\u00e6ring"},"content":{"rendered":"<p>Skoledistrikter kan ikke lenger stole utelukkende p\u00e5 perimeterbasert sikkerhet. N\u00e5r brukere kobler seg til fra campus, hjemmefra og skyplattformer, hjelper Zero Trust-distriktene med \u00e5 beskytte elevdata, redusere eksponering fra uadministrert eller distribuert tilgang og bygge en mer robust nettsikkerhetsposisjon. Denne veiledningen forklarer hvordan Zero Trust fungerer i K\u201312, hvordan NIST-modellen gjelder, hvilke kontroller som er viktigst, og hvilke verkt\u00f8y distriktene b\u00f8r evaluere f\u00f8rst.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"h-what-is-zero-trust-in-education\">Hva er nulltillit i utdanning?<\/h2>\n\n\n\n<p>Nulltillit er en nettsikkerhetsmodell som antar at ingen bruker eller enhet skal v\u00e6re automatisk klarert, verken innenfor eller utenfor nettverket. I K\u201312 er dette viktig fordi skoledistriktene st\u00f8tter desentralisert tilgang, et bredt utvalg av skoleadministrerte og personlige enheter, og regulatoriske forpliktelser knyttet til elevenes personvern og internettsikkerhet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"h-how-nist-sp-800-207-applies-to-k-12-zero-trust\">Hvordan NIST SP 800-207 gjelder for nulltillit i K\u201312<\/h2>\n\n\n\n<p>E-bokposisjonene <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/207\/final\" target=\"_blank\" rel=\"noreferrer noopener\">NIST SP 800-207<\/a> som det grunnleggende rammeverket for nulltillitsarkitektur i skolene. For K\u201312-distrikter er de praktiske konklusjonene kontinuerlig verifisering av identitet og enhetsstatus, kontekstbasert policyh\u00e5ndhevelse ved tilgangspunktet, logging og synlighet p\u00e5 tvers av brukere og ressurser, og beskyttelse som strekker seg til ekstern og skybasert tilgang \u2013 ikke bare lokale milj\u00f8er.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"h-the-6-core-pillars-of-zero-trust-in-k-12\">De 6 kjernepilarene for null tillit i K\u201312<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Identitet<\/strong><\/td><td>Autentiser brukere f\u00f8r tilgang gis; integrer med SSO, MFA og identitetsleverand\u00f8rer.<\/td><\/tr><tr><td><strong>Enheter<\/strong><\/td><td>Overv\u00e5k enhetens tilstand og administrer samsvar med regler ved hjelp av MDM eller endepunktbeskyttelse.<\/td><\/tr><tr><td><strong>Nettverk<\/strong><\/td><td>Segmenter nettverk og bruk mikroperimetre for \u00e5 redusere sideveis bevegelse.<\/td><\/tr><tr><td><strong>Bruksomr\u00e5der<\/strong><\/td><td>Begrens tilgangen til godkjente apper med kontekstuelle retningslinjer.<\/td><\/tr><tr><td><strong>Data<\/strong><\/td><td>Krypter data under overf\u00f8ring og i ro; overv\u00e5k tilgang og forhindre uautorisert deling.<\/td><\/tr><tr><td><strong>Synlighet og analyse<\/strong><\/td><td>Samle telemetry p\u00e5 tvers av brukere, enheter og apper for \u00e5 oppdage avvik tidlig.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"h-best-practices-for-implementing-zero-trust-in-k-12\">Beste praksis for implementering av nulltillit i K\u201312<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Start med identitet<\/li>\n\n\n\n<li>Karttilgang etter rolle<\/li>\n\n\n\n<li>Sikre enheter overalt<\/li>\n\n\n\n<li>Filtrer og overv\u00e5k internettbruk<\/li>\n\n\n\n<li>Logg alt og oppdag tidlig<\/li>\n\n\n\n<li>Kontinuerlig oppl\u00e6ring av ansatte og studenter<\/li>\n\n\n\n<li>Etabler en hendelsesresponsplan<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-common-pitfalls-to-avoid\">Vanlige fallgruver \u00e5 unng\u00e5<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Overdreven avhengighet av eldre brannmurer<\/li>\n\n\n\n<li>Ignorerer studentdataenes personvern<\/li>\n\n\n\n<li>Mangel p\u00e5 synlighet<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"h-where-lightspeed-filter-fits-in-a-k-12-zero-trust-strategy\">Hvor Lightspeed Filter\u2122 passer inn i en nulltillitsstrategi for K\u201312<\/h2>\n\n\n\n<p>E-bokposisjonene <a href=\"https:\/\/www.lightspeedsystems.com\/nb\/products\/lightspeed-filter\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lightspeed Filter\u2122<\/a> som en K\u201312-spesifikk kontroll som st\u00f8tter nulltillitsprinsipper ved \u00e5 utvide beskyttelsen p\u00e5 tvers av bruk p\u00e5 og utenfor campus, st\u00f8tte katalogbaserte retningslinjer og forbedre synligheten av nettaktivitet og innholdstilgang. Veiledningen fremhever st\u00f8tte for BYOD og milj\u00f8er med delte enheter, filtrering p\u00e5 enheten, integrasjon med Google Workspace og Microsoft Entra, K\u201312-spesifikk kategorisering, trusselbeskyttelse i sanntid og foreldresynlighet gjennom <a href=\"https:\/\/www.lightspeedsystems.com\/nb\/solutions\/security-compliance\/lightspeed-parent-portal\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lightspeed Parent Portal\u2122<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\" id=\"h-download-the-full-zero-trust-in-k-12-guide\">Last ned hele veiledningen for null tillit i K\u201312<\/h2>\n\n\n\n<p>F\u00e5 den komplette PDF-filen pluss en sjekkliste for implementering og et planleggingsark klargjort for distriktet.<\/p>","protected":false},"excerpt":{"rendered":"<p>Med trusler som l\u00f8sepengevirus og phishing i \u00f8kning, og med ansatte og elever som kobler seg til hvor som helst, m\u00e5 K\u201312-skoler ta i bruk null tillit for \u00e5 sikre at ingen brukere eller enheter automatisk er klarert. Ved \u00e5 f\u00f8lge NIST-retningslinjene og bruke de riktige verkt\u00f8yene, kan skoledistriktene oppn\u00e5 sterkere samsvar, synlighet og beskyttelse.<\/p>","protected":false},"featured_media":37389,"parent":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Zero Trust","_yoast_wpseo_title":"Ensuring Zero Trust in K-12 Education | K-12 Cybersecurity","_yoast_wpseo_metadesc":"With cyber threats like ransomware and phishing on the rise, K\u201312 schools must adopt Zero Trust to ensure that nothing is automatically trusted."},"tags":[11],"ebook_category":[],"class_list":["post-37388","ebook","type-ebook","status-publish","has-post-thumbnail","hentry","tag-cybersecurity"],"acf":{"download_link":"https:\/\/pwp.lightspeedsystems.com\/ensuring-zero-trust-in-k12-education","lss_gated_override":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ensuring Zero Trust in K-12 Education | K-12 Cybersecurity<\/title>\n<meta name=\"description\" content=\"With cyber threats like ransomware and phishing on the rise, K\u201312 schools must adopt Zero Trust to ensure that nothing is automatically trusted.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lightspeedsystems.com\/nb\/ebook\/ensuring-zero-trust-in-k-12-education\/\" \/>\n<meta property=\"og:locale\" content=\"nb_NO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ensuring Zero Trust Cybersecurity in K-12 Education\" \/>\n<meta property=\"og:description\" content=\"With cyber threats like ransomware and phishing on the rise, K\u201312 schools must adopt Zero Trust to ensure that nothing is automatically trusted.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lightspeedsystems.com\/nb\/ebook\/ensuring-zero-trust-in-k-12-education\/\" \/>\n<meta property=\"og:site_name\" content=\"Lightspeed Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lightspeedsystems\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T15:36:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1780\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@lightspeedsys\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/ebook\\\/ensuring-zero-trust-in-k-12-education\\\/\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/ebook\\\/ensuring-zero-trust-in-k-12-education\\\/\",\"name\":\"Ensuring Zero Trust in K-12 Education | K-12 Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/ebook\\\/ensuring-zero-trust-in-k-12-education\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/ebook\\\/ensuring-zero-trust-in-k-12-education\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png\",\"datePublished\":\"2025-09-17T14:43:37+00:00\",\"dateModified\":\"2026-04-01T15:36:15+00:00\",\"description\":\"With cyber threats like ransomware and phishing on the rise, K\u201312 schools must adopt Zero Trust to ensure that nothing is automatically trusted.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/ebook\\\/ensuring-zero-trust-in-k-12-education\\\/#breadcrumb\"},\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lightspeedsystems.com\\\/ebook\\\/ensuring-zero-trust-in-k-12-education\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/ebook\\\/ensuring-zero-trust-in-k-12-education\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png\",\"contentUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png\",\"width\":2560,\"height\":1780,\"caption\":\"Ensuring Zero Trust in K-12 Education Whitepaper\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/ebook\\\/ensuring-zero-trust-in-k-12-education\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"E-Books\",\"item\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/resources\\\/ebooks\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ensuring Zero Trust Cybersecurity in K-12 Education\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/\",\"name\":\"Lightspeed Systems\",\"description\":\"Helping K-12 communities provide safe, secure, and equitable education\u2014effortlessly.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nb-NO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#organization\",\"name\":\"Lightspeed Systems\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/lightspeed_systems_logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/lightspeed_systems_logo.svg\",\"caption\":\"Lightspeed Systems\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lightspeedsystems.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/lightspeedsystems\\\/\",\"https:\\\/\\\/x.com\\\/lightspeedsys\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/lightspeed-systems\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sikre null tillit i grunnskole- og videreg\u00e5ende oppl\u00e6ring | Nettsikkerhet for barnehage og videreg\u00e5ende","description":"Med \u00f8kende cybertrusler som l\u00f8sepengevirus og phishing, m\u00e5 barnehage- og videreg\u00e5ende skoler ta i bruk null tillit for \u00e5 sikre at ingenting automatisk er klarert.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lightspeedsystems.com\/nb\/ebook\/ensuring-zero-trust-in-k-12-education\/","og_locale":"nb_NO","og_type":"article","og_title":"Ensuring Zero Trust Cybersecurity in K-12 Education","og_description":"With cyber threats like ransomware and phishing on the rise, K\u201312 schools must adopt Zero Trust to ensure that nothing is automatically trusted.","og_url":"https:\/\/www.lightspeedsystems.com\/nb\/ebook\/ensuring-zero-trust-in-k-12-education\/","og_site_name":"Lightspeed Systems","article_publisher":"https:\/\/www.facebook.com\/lightspeedsystems\/","article_modified_time":"2026-04-01T15:36:15+00:00","og_image":[{"width":2560,"height":1780,"url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@lightspeedsys","twitter_misc":{"Est. reading time":"3 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lightspeedsystems.com\/ebook\/ensuring-zero-trust-in-k-12-education\/","url":"https:\/\/www.lightspeedsystems.com\/ebook\/ensuring-zero-trust-in-k-12-education\/","name":"Sikre null tillit i grunnskole- og videreg\u00e5ende oppl\u00e6ring | Nettsikkerhet for barnehage og videreg\u00e5ende","isPartOf":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lightspeedsystems.com\/ebook\/ensuring-zero-trust-in-k-12-education\/#primaryimage"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/ebook\/ensuring-zero-trust-in-k-12-education\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png","datePublished":"2025-09-17T14:43:37+00:00","dateModified":"2026-04-01T15:36:15+00:00","description":"Med \u00f8kende cybertrusler som l\u00f8sepengevirus og phishing, m\u00e5 barnehage- og videreg\u00e5ende skoler ta i bruk null tillit for \u00e5 sikre at ingenting automatisk er klarert.","breadcrumb":{"@id":"https:\/\/www.lightspeedsystems.com\/ebook\/ensuring-zero-trust-in-k-12-education\/#breadcrumb"},"inLanguage":"nb-NO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lightspeedsystems.com\/ebook\/ensuring-zero-trust-in-k-12-education\/"]}]},{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/www.lightspeedsystems.com\/ebook\/ensuring-zero-trust-in-k-12-education\/#primaryimage","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2025\/09\/Cover-Spread-Ensuring-Zero-Trust-in-K-12-White-Paper-scaled.png","width":2560,"height":1780,"caption":"Ensuring Zero Trust in K-12 Education Whitepaper"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lightspeedsystems.com\/ebook\/ensuring-zero-trust-in-k-12-education\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lightspeedsystems.com\/"},{"@type":"ListItem","position":2,"name":"E-Books","item":"https:\/\/www.lightspeedsystems.com\/resources\/ebooks\/"},{"@type":"ListItem","position":3,"name":"Ensuring Zero Trust Cybersecurity in K-12 Education"}]},{"@type":"WebSite","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#website","url":"https:\/\/www.lightspeedsystems.com\/zh\/","name":"Lyshastighetssystemer","description":"Hjelper K-12-samfunn med trygg, sikker og rettferdig utdanning \u2013 uten problemer.","publisher":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lightspeedsystems.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nb-NO"},{"@type":"Organization","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#organization","name":"Lyshastighetssystemer","url":"https:\/\/www.lightspeedsystems.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","contentUrl":"https:\/\/www.lightspeedsystems.com\/wp-content\/uploads\/2024\/12\/lightspeed_systems_logo.svg","caption":"Lightspeed Systems"},"image":{"@id":"https:\/\/www.lightspeedsystems.com\/zh\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lightspeedsystems\/","https:\/\/x.com\/lightspeedsys","https:\/\/www.linkedin.com\/company\/lightspeed-systems\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.lightspeedsystems.com\/nb\/wp-json\/wp\/v2\/ebook\/37388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lightspeedsystems.com\/nb\/wp-json\/wp\/v2\/ebook"}],"about":[{"href":"https:\/\/www.lightspeedsystems.com\/nb\/wp-json\/wp\/v2\/types\/ebook"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/nb\/wp-json\/wp\/v2\/media\/37389"}],"wp:attachment":[{"href":"https:\/\/www.lightspeedsystems.com\/nb\/wp-json\/wp\/v2\/media?parent=37388"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/nb\/wp-json\/wp\/v2\/tags?post=37388"},{"taxonomy":"ebook_category","embeddable":true,"href":"https:\/\/www.lightspeedsystems.com\/nb\/wp-json\/wp\/v2\/ebook_category?post=37388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}