{"id":1035,"date":"2023-07-16T11:05:19","date_gmt":"2023-07-16T11:05:19","guid":{"rendered":"https:\/\/cerberussecurityandinvestigation.co.uk\/?page_id=1035"},"modified":"2023-08-01T21:54:17","modified_gmt":"2023-08-01T21:54:17","slug":"security-consultancy","status":"publish","type":"page","link":"https:\/\/cerberussecurityandinvestigation.co.uk\/index.php\/security-consultancy\/","title":{"rendered":"Security Consultancy"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221;][vc_column][vc_row_inner disable_custom_paddings_tablet=&#8221;true&#8221; disable_custom_paddings_mobile=&#8221;true&#8221; css=&#8221;.vc_custom_1689506550942{margin-bottom: 0px !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221; el_class=&#8221;bg-left-bottom&#8221;][vc_column_inner disable_custom_paddings_tablet=&#8221;true&#8221; disable_custom_paddings_mobile=&#8221;true&#8221; css=&#8221;.vc_custom_1689322347347{padding-top: 0px !important;}&#8221; offset=&#8221;vc_col-md-6&#8243;][vc_column_text]<\/p>\n<h6 class=\"title-h5\" style=\"outline: 0px; text-transform: uppercase; margin: 1.2em 0px; letter-spacing: 0.05em; font-family: Montserrat; font-weight: bold; font-size: 27px; line-height: 35px; color: #3c3950; font-style: normal; font-variant-caps: normal; orphans: auto; text-align: start; text-indent: 0px; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;\">Don&#8217;t compromise on the safety and integrity of your organization. <br \/>Choose Cerberus<br \/>as your trusted security consultancy partner.<\/h6>\n<h6 class=\"title-h5\" style=\"outline: 0px; text-transform: uppercase; margin: 1.2em 0px; letter-spacing: 0.05em; font-family: Montserrat; font-weight: bold; font-size: 27px; line-height: 35px; color: #3c3950; font-style: normal; font-variant-caps: normal; orphans: auto; text-align: start; text-indent: 0px; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;\">Our tailored strategies,<br \/>expert guidance, and unwavering commitment<br \/>to your security will<br \/>empower your<br \/>organization to thrive<br \/>in an increasingly complex threat landscape.<\/h6>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2b958 {margin-top: 25px !important;}#thegem-divider-6a08f96c2b958 {margin-bottom: 30px !important;}<\/style><div id=\"thegem-divider-6a08f96c2b958\" class=\"gem-divider  custom-blue-divider\" style=\"border-color: #00bcd4;\" ><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;blue-solid-border&#8221; css=&#8221;.vc_custom_1563353289251{padding-top: 115px !important;padding-right: 70px !important;padding-bottom: 30px !important;padding-left: 70px !important;background-color: #ffffff !important;}&#8221; offset=&#8221;vc_col-md-6&#8243;]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2b977 {margin-top: 45px !important;}<\/style><div id=\"thegem-divider-6a08f96c2b977\" class=\"gem-divider  \" style=\"\" ><\/div>[vc_column_text]<\/p>\n<div class=\"title-h6 styled-subtitle title-h3\" style=\"outline: 0px; margin: 1.4em 0px; text-transform: uppercase; letter-spacing: 0.05em; font-family: Montserrat; font-weight: bold; font-size: 30px; line-height: 70px; caret-color: #5f727f; color: #5f727f; font-style: normal; font-variant-caps: normal; orphans: auto; text-align: start; text-indent: 0px; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;\">Expert Guidance<br \/>\nTailored Solutions Protection Assurance<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2b98d {margin-top: 65px !important;}<\/style><div id=\"thegem-divider-6a08f96c2b98d\" class=\"gem-divider  \" style=\"\" ><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1563361894441{margin-bottom: 0px !important;background-color: #333545 !important;}&#8221;][vc_column]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2b99c {margin-top: 90px !important;}<\/style><div id=\"thegem-divider-6a08f96c2b99c\" class=\"gem-divider  \" style=\"\" ><\/div>[vc_row_inner css=&#8221;.vc_custom_1563359692780{margin-bottom: 0px !important;}&#8221;][vc_column_inner disable_custom_paddings_tablet=&#8221;true&#8221; disable_custom_paddings_mobile=&#8221;true&#8221; css=&#8221;.vc_custom_1563361091869{padding-top: 0px !important;}&#8221; offset=&#8221;vc_col-md-3&#8243;][vc_column_text]<\/p>\n<div class=\"title-h2\" style=\"outline: 0px; text-transform: uppercase; margin: 1.2em 0px; letter-spacing: 0.05em; font-family: Montserrat; font-weight: bold; font-size: 33px; line-height: 53px; color: #3c3950; font-style: normal; font-variant-caps: normal; orphans: auto; text-align: start; text-indent: 0px; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;\"><span style=\"color: #ffffff;\"><span class=\"light\" style=\"text-transform: uppercase; font-size: inherit; line-height: inherit; font-family: 'Montserrat UltraLight'; font-weight: normal;\">How does our<\/span> Security Consultancy work<\/span><\/div>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2b9ad {margin-top: 25px !important;}#thegem-divider-6a08f96c2b9ad {margin-bottom: 30px !important;}<\/style><div id=\"thegem-divider-6a08f96c2b9ad\" class=\"gem-divider  custom-blue-divider\" style=\"border-color: #00bcd4;\" ><\/div>[\/vc_column_inner][vc_column_inner offset=&#8221;vc_col-md-9&#8243;][vc_column_text css=&#8221;.vc_custom_1690926717013{padding-top: 3px !important;}&#8221;]<\/p>\n<div class=\"styled-subtitle\" style=\"outline: 0px; font-family: 'Source Sans Pro'; font-weight: 300; font-size: 24px; line-height: 37px; caret-color: #5f727f; color: #5f727f; font-style: normal; font-variant-caps: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none;\"><span style=\"color: #ffffff;\">At Cerberus, we combine our expertise, industry knowledge, and a client-centric approach to deliver comprehensive security consultancy services. Our goal is to empower your organization with robust security solutions that mitigate risks, protect your assets, and provide peace of mind.<\/span><\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner]<div class=\"quickfinder quickfinder-style-classic quickfinder-binded row inline-row quickfinder-icon-position-top quickfinder-alignment-left quickfinder-title-bold\" data-hover-title-color=\"#00bcd4\" data-hover-description-color=\"#ffffff\"><div id=\"post-403\" data-ll-finish-delay=\"200\" class=\"quickfinder-item inline-column col-md-4 col-sm-6 col-xs-12 quickfinder-item-effect-background-reverse icon-size-medium quickfinder-box-style-solid lazy-loading post-403 thegem_qf_item type-thegem_qf_item status-publish\" data-ll-item-delay=\"0\"> <div class=\"quickfinder-item-box\" style=\"\"> <div class=\"quickfinder-item-inner\"> <div class=\"quickfinder-item-image\"> <div class=\"quickfinder-item-image-content lazy-loading-item\" data-ll-item-delay=\"0\" data-ll-effect=\"clip\"> <div class=\"quickfinder-item-image-wrapper\"> <div class=\"gem-icon gem-icon-pack-material gem-icon-size-medium gem-icon-shape-circle\" style=\"border-color: #fff;opacity: 1;\"><div class=\"gem-icon-inner\" style=\"background-color: #fff;\"><span class=\"gem-icon-half-1\" style=\"color: #222434;\"><span class=\"back-angle\">&#xf1f4;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #222434;\"><span class=\"back-angle\">&#xf1f4;<\/span><\/span><\/div><\/div> <\/div> <\/div> <\/div> <div class=\"quickfinder-item-info-wrapper\"> <div class=\"quickfinder-item-info lazy-loading-item\" data-ll-item-delay=\"200\" data-ll-effect=\"fading\"> <div class=\"quickfinder-item-title\" style=\"color: #fff;\">EXPERT SOLUTIONS<\/div> <div class=\"quickfinder-item-text\" style=\"color: #99a9b5;\">At Cerberus, we provide expert security solutions tailored to your specific needs. Whether it's close protection, surveillance, or risk assessments, our team of professionals is equipped with the skills and expertise to deliver the highest level of security and protection.<\/div> <\/div> <\/div> <\/div> <\/div> <\/div> <div id=\"post-410\" data-ll-finish-delay=\"200\" class=\"quickfinder-item inline-column col-md-4 col-sm-6 col-xs-12 quickfinder-item-effect-background-reverse icon-size-medium quickfinder-box-style-solid lazy-loading post-410 thegem_qf_item type-thegem_qf_item status-publish\" data-ll-item-delay=\"0\"> <div class=\"quickfinder-item-box\" style=\"\"> <div class=\"quickfinder-item-inner\"> <div class=\"quickfinder-item-image\"> <div class=\"quickfinder-item-image-content lazy-loading-item\" data-ll-item-delay=\"0\" data-ll-effect=\"clip\"> <div class=\"quickfinder-item-image-wrapper\"> <div class=\"gem-icon gem-icon-pack-material gem-icon-size-medium gem-icon-shape-circle\" style=\"border-color: #fff;opacity: 1;\"><div class=\"gem-icon-inner\" style=\"background-color: #fff;\"><span class=\"gem-icon-half-1\" style=\"color: #222434;\"><span class=\"back-angle\">&#xf1a0;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #222434;\"><span class=\"back-angle\">&#xf1a0;<\/span><\/span><\/div><\/div> <\/div> <\/div> <\/div> <div class=\"quickfinder-item-info-wrapper\"> <div class=\"quickfinder-item-info lazy-loading-item\" data-ll-item-delay=\"200\" data-ll-effect=\"fading\"> <div class=\"quickfinder-item-title\" style=\"color: #fff;\">ADVANCED TECH. INTEGRATION<\/div> <div class=\"quickfinder-item-text\" style=\"color: #99a9b5;\">We stay at the forefront of technology to enhance our security services. Our use of cutting-edge surveillance systems, access control solutions, and advanced analytics ensures that you have the latest tools to mitigate risks and safeguard your assets effectively.<\/div> <\/div> <\/div> <\/div> <\/div> <\/div> <div id=\"post-411\" data-ll-finish-delay=\"200\" class=\"quickfinder-item inline-column col-md-4 col-sm-6 col-xs-12 quickfinder-item-effect-background-reverse icon-size-medium quickfinder-box-style-solid lazy-loading post-411 thegem_qf_item type-thegem_qf_item status-publish\" data-ll-item-delay=\"0\"> <div class=\"quickfinder-item-box\" style=\"\"> <div class=\"quickfinder-item-inner\"> <div class=\"quickfinder-item-image\"> <div class=\"quickfinder-item-image-content lazy-loading-item\" data-ll-item-delay=\"0\" data-ll-effect=\"clip\"> <div class=\"quickfinder-item-image-wrapper\"> <div class=\"gem-icon gem-icon-pack-material gem-icon-size-medium gem-icon-shape-circle\" style=\"border-color: #fff;opacity: 1;\"><div class=\"gem-icon-inner\" style=\"background-color: #fff;\"><span class=\"gem-icon-half-1\" style=\"color: #222434;\"><span class=\"back-angle\">&#xf519;<\/span><\/span><span class=\"gem-icon-half-2\" style=\"color: #222434;\"><span class=\"back-angle\">&#xf519;<\/span><\/span><\/div><\/div> <\/div> <\/div> <\/div> <div class=\"quickfinder-item-info-wrapper\"> <div class=\"quickfinder-item-info lazy-loading-item\" data-ll-item-delay=\"200\" data-ll-effect=\"fading\"> <div class=\"quickfinder-item-title\" style=\"color: #fff;\">UNPARALLELED PROFESSIONALISM<\/div> <div class=\"quickfinder-item-text\" style=\"color: #99a9b5;\">With over three decades of experience in the security and investigation industry, we bring unmatched expertise to every project. Our team consists of highly trained professionals who exhibit the utmost professionalism, discretion, and dedication to delivering exceptional services that meet and exceed your expectations.<\/div> <\/div> <\/div> <\/div> <\/div> <\/div> <\/div>[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css=&#8221;.vc_custom_1563361964772{margin-bottom: 0px !important;background-color: #222434 !important;}&#8221;][vc_column]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2cc15 {margin-top: 85px !important;}<\/style><div id=\"thegem-divider-6a08f96c2cc15\" class=\"gem-divider  \" style=\"\" ><\/div>[vc_column_text]<\/p>\n<div class=\"title-h1\" style=\"text-align: center;\"><span style=\"color: #ffffff;\"><span class=\"light\" style=\"text-transform: uppercase; font-size: inherit; line-height: inherit; font-family: 'Montserrat UltraLight'; font-weight: normal;\">Security Consultancy<br \/>\nMEASURES <\/span>to consider<\/span><\/div>\n<p>[\/vc_column_text]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2cc2e {margin-top: 25px !important;}#thegem-divider-6a08f96c2cc2e {margin-bottom: 30px !important;}<\/style><div id=\"thegem-divider-6a08f96c2cc2e\" class=\"gem-divider  custom-blue-divider align-center\" style=\"border-color: #00bcd4;\" ><\/div>[vc_row_inner css=&#8221;.vc_custom_1563359692780{margin-bottom: 0px !important;}&#8221;][vc_column_inner disable_custom_paddings_tablet=&#8221;true&#8221; disable_custom_paddings_mobile=&#8221;true&#8221; css=&#8221;.vc_custom_1563362212243{padding-top: 0px !important;}&#8221; offset=&#8221;vc_col-lg-offset-2 vc_col-lg-8&#8243;][vc_column_text]<span style=\"color: #ffffff;\">When considering security consultancy services, there are several important matters to take into account:<\/span><\/p>\n<ol>\n<li><span style=\"color: #ffffff;\">Expertise and Experience: <\/span><br \/>\n<span style=\"color: #ffffff;\">Look for a security consultancy firm with a proven track record and a team of experienced professionals. Assess their expertise in your specific industry and ensure they have the necessary knowledge and skills to address your unique security challenges.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Comprehensive Approach: <\/span><br \/>\n<span style=\"color: #ffffff;\">Ensure that the security consultancy firm offers a comprehensive approach to security, covering various aspects such as physical security, information security, cybersecurity, risk assessment, and crisis management. A holistic approach will provide a well-rounded and integrated security solution.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Customization and Flexibility: <\/span><br \/>\n<span style=\"color: #ffffff;\">Every organization has different security needs and priorities. Choose a security consultancy firm that can tailor their services to fit your specific requirements. They should be able to adapt their strategies and recommendations to align with your organization&#8217;s goals, budget, and risk tolerance.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Compliance and Regulations: <\/span><br \/>\n<span style=\"color: #ffffff;\">Verify that the security consultancy firm is knowledgeable about relevant regulations, standards, and compliance requirements in your industry. They should be able to help you navigate legal obligations and ensure that your security measures align with industry best practices.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Technology and Innovation: Assess the consultancy firm&#8217;s approach to leveraging technology and innovation in security solutions. Look for a firm that stays up to date with the latest advancements in security technologies, such as access control systems, video surveillance, threat detection, and data analytics.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Collaboration and Communication: <\/span><br \/>\n<span style=\"color: #ffffff;\">Effective security consultancy requires open communication and collaboration between the consultancy firm and your organization. Ensure that the firm emphasizes clear and transparent communication, actively involves your key stakeholders, and fosters a collaborative working relationship.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Long-Term Support: <\/span><br \/>\n<span style=\"color: #ffffff;\">Security threats evolve over time, so it&#8217;s essential to choose a consultancy firm that offers ongoing support and monitoring. They should be committed to assisting you in maintaining a proactive security posture, conducting regular assessments, and providing recommendations for continuous improvement.<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Reputation and References: <\/span><br \/>\n<span style=\"color: #ffffff;\">Research the reputation of the security consultancy firm by reviewing client testimonials, case studies, and references. This will give you insights into their past performance, client satisfaction, and the results they have achieved.<\/span><\/li>\n<\/ol>\n<p><span style=\"color: #ffffff;\">By considering these key matters, you can select a security consultancy firm that is well-equipped to understand your security needs, develop tailored solutions, and provide ongoing support to ensure the safety and protection of your organization.<\/span>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2cc3e {margin-top: 180px !important;}<\/style><div id=\"thegem-divider-6a08f96c2cc3e\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2cc4b {margin-top: 180px !important;}<\/style><div id=\"thegem-divider-6a08f96c2cc4b\" class=\"gem-divider  \" style=\"\" ><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1574406439061{margin-bottom: 0px !important;}&#8221; el_id=&#8221;wrapbox&#8221;][vc_column]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2cc57 {margin-top: -70px !important;}<\/style><div id=\"thegem-divider-6a08f96c2cc57\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2cc62 {margin-top: 150px !important;}<\/style><div id=\"thegem-divider-6a08f96c2cc62\" class=\"gem-divider  \" style=\"\" ><\/div>[vc_custom_heading text=&#8221;Win the battle with Cerberus at you side&#8221; font_container=&#8221;tag:h2|text_align:center&#8221;]<div class=\"clearboth\"><\/div><style>#thegem-divider-6a08f96c2cc6e {margin-top: 40px !important;}<\/style><div id=\"thegem-divider-6a08f96c2cc6e\" class=\"gem-divider  \" style=\"\" ><\/div>[vc_column_text]<\/p>\n<div class=\"styled-subtitle\"><span class=\"light\">Once upon a time in the bustling city of Prospera, there was a prestigious corporation called Stellar Enterprises that aspired to conquer the market with its groundbreaking innovations. However, their rise to the top was hindered by a series of devastating security breaches that threatened to shatter their dreams.<\/span><\/div>\n<div>\u00a0<\/div>\n<div class=\"styled-subtitle\"><span class=\"light\">Feeling defeated and vulnerable, the leaders of Stellar Enterprises sought a beacon of hope, a partner that could turn the tide in their favor. That&#8217;s when Cerberus, renowned for their expertise and unwavering commitment to excellence, emerged as the knight in shining armor.<\/span><\/div>\n<div>\u00a0<\/div>\n<div class=\"styled-subtitle\"><span class=\"light\">With Cerberus by their side, Stellar Enterprises embarked on a remarkable journey to reclaim their position as industry leaders. Cerberus&#8217;s team of seasoned security professionals conducted a comprehensive assessment of Stellar&#8217;s vulnerabilities, leaving no stone unturned. They uncovered hidden risks, identified weak points in their security infrastructure, and devised a masterful plan to fortify their defenses.<\/span><\/div>\n<div>\u00a0<\/div>\n<div class=\"styled-subtitle\"><span class=\"light\">Implementing cutting-edge technology and innovative solutions, Cerberus transformed Stellar&#8217;s security landscape. They deployed state-of-the-art access control systems, advanced surveillance technologies, and robust cybersecurity measures to create an impenetrable shield around Stellar&#8217;s valuable assets.<\/span><\/div>\n<div class=\"styled-subtitle\"><span class=\"light\">But Cerberus&#8217;s partnership with Stellar went beyond technology. They understood the importance of fostering a security-conscious culture within the organization. Cerberus conducted tailored training programs, instilling a sense of responsibility and vigilance in every employee. Stellar&#8217;s workforce became an army of vigilant defenders, united in their commitment to protecting the company&#8217;s secrets and intellectual property.<\/span><\/div>\n<div>\u00a0<\/div>\n<div class=\"styled-subtitle\"><span class=\"light\">As weeks turned into months, Stellar Enterprises witnessed an incredible transformation. The once-disheartened leaders now radiated confidence and optimism. With Cerberus&#8217;s expertise guiding them, they thwarted multiple attempted attacks, prevented data breaches, and preserved their reputation with unwavering integrity.<\/span><\/div>\n<div>\u00a0<\/div>\n<div class=\"styled-subtitle\"><span class=\"light\">Word of Stellar&#8217;s incredible turnaround spread throughout the industry, and their competitors trembled in awe. The once-beleaguered company had become a shining example of resilience, innovation, and security excellence.<\/span><\/div>\n<div>\u00a0<\/div>\n<div class=\"styled-subtitle\"><span class=\"light\">With Cerberus by their side, Stellar Enterprises emerged as the true winners, conquering the market with their cutting-edge products and unparalleled security measures. Their success became the stuff of legends, and their partnership with Cerberus remained a testament to the transformative power of having the right security partner.<\/span><\/div>\n<div>\u00a0<\/div>\n<div class=\"styled-subtitle\"><span class=\"light\">Don&#8217;t let security breaches hinder your path to success. Choose Cerberus as your trusted ally, and become the undisputed winner in safeguarding what matters most. Together, we can turn your security challenges into triumphs and propel your organization to new heights of prosperity and security. Contact us today and let the journey begin.<\/span><\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text][\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1035","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/cerberussecurityandinvestigation.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/1035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cerberussecurityandinvestigation.co.uk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cerberussecurityandinvestigation.co.uk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cerberussecurityandinvestigation.co.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cerberussecurityandinvestigation.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=1035"}],"version-history":[{"count":10,"href":"https:\/\/cerberussecurityandinvestigation.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/1035\/revisions"}],"predecessor-version":[{"id":1134,"href":"https:\/\/cerberussecurityandinvestigation.co.uk\/index.php\/wp-json\/wp\/v2\/pages\/1035\/revisions\/1134"}],"wp:attachment":[{"href":"https:\/\/cerberussecurityandinvestigation.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=1035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}