{"id":15073,"date":"2025-06-05T16:29:58","date_gmt":"2025-06-05T14:29:58","guid":{"rendered":"https:\/\/nexis-secure.com\/en\/?p=15073"},"modified":"2026-01-15T11:40:30","modified_gmt":"2026-01-15T10:40:30","slug":"enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter","status":"publish","type":"post","link":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","title":{"rendered":"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter"},"content":{"rendered":"<p>Orphaned accounts, outdated access rights, and neglected authorization concepts continue to pose serious challenges. Yet addressing them doesn\u2019t require an IAM transformation. With focused effort and the right tools, these risks can be handled swiftly \u2013 and with lasting results.<\/p>\n<h2>Still Running on Ghost Accounts?<\/h2>\n<p id=\"ember53\">Many organizations carry orphaned accounts \u2013 identities that remain active even after employees have departed. These accounts might exist in Active Directory, Microsoft Entra ID or SaaS applications and are rarely monitored, especially when they don\u2019t incur license costs. But they do create risk.<\/p>\n<p id=\"ember54\">These orphaned accounts can lead to unauthorized access, potential data breaches, and unnecessary expenses. Even in mature environments, they can represent a significant percentage of active identities.<\/p>\n<p id=\"ember55\">Taking action doesn\u2019t require months of planning. Modern IAM tools can scan directories, correlate with HR data, and highlight orphaned accounts in days \u2013 not weeks.<\/p>\n<h2>Authorization Concepts That Actually Work<\/h2>\n<p id=\"ember57\">Many organizations still document permissions and other security relevant information in static Word or Excel files. These get uploaded to SharePoint, quickly become outdated, and are rarely revisited. This method isn\u2019t just inefficient \u2013 it\u2019s risky.<\/p>\n<p id=\"ember58\">An up-to-date authorization concept is not only a best practice, it\u2019s increasingly a regulatory requirement. Frameworks like DORA require clear, consistent documentation of roles, entitlements, and access rules \u2013 and evidence that they\u2019re actively maintained.<\/p>\n<p id=\"ember59\">In contrast to outdated manual documentation, a modern IAM approach ties the authorization concept directly into the system. That means continuous updates, risk scoring, structured onboarding, and clear auditing. Critical systems like ERP or HR platforms can be modeled with detailed governance, while less critical apps are managed with leaner structures.<\/p>\n<p id=\"ember60\">This structured approach boosts compliance readiness and improves operational agility \u2013 and makes DORA audits far less painful.<\/p>\n<h2>AI in IAM: Practical, Not Hype<\/h2>\n<p id=\"ember62\">Artificial Intelligence is proving its value in IAM. By learning from access patterns and comparing role distributions, AI helps clean up permissions and improve governance. More importantly, it does this with transparency.<\/p>\n<p id=\"ember63\">Explainable AI means each recommendation comes with a clear rationale. Whether suggesting role revocations during re-certification or flagging data inconsistencies, AI provides helpful nudges \u2013 not black-box decisions. And when implemented locally, these insights don\u2019t compromise data privacy.<\/p>\n<h2>Three IAM Fixes You Can Prioritize Now<\/h2>\n<p>You don\u2019t need a massive transformation to make real progress:<\/p>\n<ul>\n<li>Identify and remove orphaned accounts to improve hygiene and reduce costs<\/li>\n<li>Replace static documentation with a live, system-connected authorization concept<\/li>\n<li>Use explainable AI to support re-certification and governance reviews<\/li>\n<\/ul>\n<p>Each of these can be delivered in phases, with measurable results.<\/p>\n<h2>Conclusion<\/h2>\n<p id=\"ember69\">IAM isn\u2019t just an IT function anymore \u2013 it\u2019s a shared responsibility across security, compliance, and business operations. The faster it becomes structured, transparent, and intelligent, the more value it delivers.<\/p>\n<p id=\"ember70\">If your IAM feels stuck or reactive, focus on these three areas. With the right guidance, you\u2019ll see improvements in weeks \u2013 not years.<\/p>\n<h2>How NEXIS 4 Can Help<\/h2>\n<p>NEXIS 4 by is designed to address these exact challenges. It provides a zero-code platform for managing entitlements, streamlining authorization concepts, and leveraging AI for intelligent access governance. With features like explainable AI, real-time analytics, and seamless integration capabilities, NEXIS 4 empowers organizations to enhance their IAM strategies effectively.<\/p>\n<h2>Ready to Transform Your IAM Strategy?<\/h2>\n<p id=\"ember74\">Discover how NEXIS 4 can help you identify orphaned accounts, modernize your authorization concept, and leverage AI for smarter access governance.<\/p>\n<p id=\"ember75\">\ud83d\udc49\u00a0<a href=\"https:\/\/nexis-secure.com\/en\/nexis-4-demo\/\">Request a Demo of NEXIS 4<\/a>\u00a0and take the first step towards a more secure and compliant IAM framework.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Orphaned accounts, outdated access rights, and neglected authorization concepts continue to pose serious challenges. Yet addressing them doesn\u2019t require an IAM transformation. With focused effort and the right tools, these risks can be handled swiftly \u2013 and with lasting results. Still Running on Ghost Accounts? Many organizations carry orphaned accounts \u2013 identities that remain active&#8230;<\/p>\n","protected":false},"author":8,"featured_media":18389,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1],"tags":[73],"class_list":["post-15073","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iam","tag-iam","vs-blog blog-single"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter - NEXIS Platform<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter - NEXIS Platform\" \/>\n<meta property=\"og:description\" content=\"Orphaned accounts, outdated access rights, and neglected authorization concepts continue to pose serious challenges. Yet addressing them doesn\u2019t require an IAM transformation. With focused effort and the right tools, these risks can be handled swiftly \u2013 and with lasting results. Still Running on Ghost Accounts? Many organizations carry orphaned accounts \u2013 identities that remain active...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS Platform\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-05T14:29:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T10:40:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Yannick Glatzel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yannick Glatzel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\"},\"author\":{\"name\":\"Yannick Glatzel\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/9ce8e452cabf70a532918d6b5a25bf33\"},\"headline\":\"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter\",\"datePublished\":\"2025-06-05T14:29:58+00:00\",\"dateModified\":\"2026-01-15T10:40:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\"},\"wordCount\":586,\"publisher\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png\",\"keywords\":[\"IAM\"],\"articleSection\":[\"IAM\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\",\"url\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\",\"name\":\"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter - NEXIS Platform\",\"isPartOf\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png\",\"datePublished\":\"2025-06-05T14:29:58+00:00\",\"dateModified\":\"2026-01-15T10:40:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage\",\"url\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png\",\"contentUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/nexis-secure.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#website\",\"url\":\"https:\/\/nexis-secure.com\/en\/\",\"name\":\"NEXIS Platform\",\"description\":\"The modular identity governance platform for regulated enterprise\",\"publisher\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#organization\"},\"alternateName\":\"Nexis\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nexis-secure.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#organization\",\"name\":\"Nexis Group\",\"alternateName\":\"Nexis\",\"url\":\"https:\/\/nexis-secure.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png\",\"contentUrl\":\"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png\",\"width\":2560,\"height\":635,\"caption\":\"Nexis Group\"},\"image\":{\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/9ce8e452cabf70a532918d6b5a25bf33\",\"name\":\"Yannick Glatzel\",\"url\":\"https:\/\/nexis-secure.com\/en\/author\/yglatzel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter - NEXIS Platform","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","og_locale":"en_US","og_type":"article","og_title":"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter - NEXIS Platform","og_description":"Orphaned accounts, outdated access rights, and neglected authorization concepts continue to pose serious challenges. Yet addressing them doesn\u2019t require an IAM transformation. With focused effort and the right tools, these risks can be handled swiftly \u2013 and with lasting results. Still Running on Ghost Accounts? Many organizations carry orphaned accounts \u2013 identities that remain active...","og_url":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","og_site_name":"NEXIS Platform","article_published_time":"2025-06-05T14:29:58+00:00","article_modified_time":"2026-01-15T10:40:30+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png","type":"image\/png"}],"author":"Yannick Glatzel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Yannick Glatzel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#article","isPartOf":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/"},"author":{"name":"Yannick Glatzel","@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/9ce8e452cabf70a532918d6b5a25bf33"},"headline":"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter","datePublished":"2025-06-05T14:29:58+00:00","dateModified":"2026-01-15T10:40:30+00:00","mainEntityOfPage":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/"},"wordCount":586,"publisher":{"@id":"https:\/\/nexis-secure.com\/en\/#organization"},"image":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage"},"thumbnailUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png","keywords":["IAM"],"articleSection":["IAM"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","url":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/","name":"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter - NEXIS Platform","isPartOf":{"@id":"https:\/\/nexis-secure.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage"},"image":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage"},"thumbnailUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png","datePublished":"2025-06-05T14:29:58+00:00","dateModified":"2026-01-15T10:40:30+00:00","breadcrumb":{"@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#primaryimage","url":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png","contentUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS_Blog_IAM_Hygiene.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/nexis-secure.com\/en\/insights\/blog\/enhancing-iam-hygiene-the-hidden-iam-risks-you-can-fix-this-quarter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/nexis-secure.com\/en\/"},{"@type":"ListItem","position":2,"name":"Enhancing IAM Hygiene \u2013 The Hidden IAM Risks You Can Fix This Quarter"}]},{"@type":"WebSite","@id":"https:\/\/nexis-secure.com\/en\/#website","url":"https:\/\/nexis-secure.com\/en\/","name":"NEXIS Platform","description":"The modular identity governance platform for regulated enterprise","publisher":{"@id":"https:\/\/nexis-secure.com\/en\/#organization"},"alternateName":"Nexis","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nexis-secure.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nexis-secure.com\/en\/#organization","name":"Nexis Group","alternateName":"Nexis","url":"https:\/\/nexis-secure.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png","contentUrl":"https:\/\/nexis-secure.com\/en\/wp-content\/uploads\/2026\/01\/NEXIS-Logo-scaled.png","width":2560,"height":635,"caption":"Nexis Group"},"image":{"@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nexis-secure.com\/en\/#\/schema\/person\/9ce8e452cabf70a532918d6b5a25bf33","name":"Yannick Glatzel","url":"https:\/\/nexis-secure.com\/en\/author\/yglatzel\/"}]}},"_links":{"self":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts\/15073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/comments?post=15073"}],"version-history":[{"count":5,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts\/15073\/revisions"}],"predecessor-version":[{"id":15170,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/posts\/15073\/revisions\/15170"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/media\/18389"}],"wp:attachment":[{"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/media?parent=15073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/categories?post=15073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nexis-secure.com\/en\/wp-json\/wp\/v2\/tags?post=15073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}