{"id":85179,"date":"2026-03-31T14:32:36","date_gmt":"2026-03-31T12:32:36","guid":{"rendered":"https:\/\/biznes.t-mobile.pl\/?p=85179"},"modified":"2026-03-31T14:32:38","modified_gmt":"2026-03-31T12:32:38","slug":"business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem","status":"publish","type":"post","link":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem","title":{"rendered":"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?"},"content":{"rendered":"\n\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n    <div class=\"wp-block-embed__wrapper\">\n        <iframe loading=\"lazy\" title=\"Business Backup - Twoja polisa na przetrwanie firmy po cyberataku\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/RgH9sPBWtFA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n    <\/div>\n<\/figure>\n\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"VideoObject\",\n  \"name\": \"Business Backup \u2013 Twoja polisa na przetrwanie firmy po cyberataku\",\n  \"description\": \"Backup danych to podstawa, ale sama kopia zapasowa nie wystarczy. Kluczowe jest po\u0142\u0105czenie backupu, disaster recovery i przemy\u015blanej strategii (np. zasady 3-2-1), by skutecznie ochroni\u0107 firm\u0119 przed cyberatakiem lub awari\u0105.\",\n  \"thumbnailUrl\": \"https:\/\/img.youtube.com\/vi\/RgH9sPBWtFA\/maxresdefault.jpg\",\n  \"uploadDate\": \"2024-05-20\",\n  \"duration\": \"PT1M4S\",\n  \"contentUrl\": \"https:\/\/www.youtube.com\/watch?v=RgH9sPBWtFA\",\n  \"embedUrl\": \"https:\/\/www.youtube.com\/embed\/RgH9sPBWtFA\"\n}\n<\/script>\n\n<br>\n<p><strong>Backup danych to dzi\u015b podstawa cyberbezpiecze\u0144stwa, ale sama kopia zapasowa nie wystarczy, by skutecznie ochroni\u0107 firm\u0119 przed cyberatakiem czy awari\u0105. Kluczowe jest po\u0142\u0105czenie backupu, disaster recovery i przemy\u015blanej strategii zarz\u0105dzania danymi.<\/strong><\/p>\n\n<p>Jednym z fundament\u00f3w bezpiecze\u0144stwa jest zasada 3-2-1, czyli przechowywanie danych w kilku lokalizacjach \u2013 np. w chmurze, on-premise i zewn\u0119trznym data center. Takie podej\u015bcie zwi\u0119ksza odporno\u015b\u0107 na utrat\u0119 danych i przestoje.<\/p>\n\n<p>Warto pami\u0119ta\u0107, \u017ce backup to nie to samo co disaster recovery. Backup pozwala odzyska\u0107 dane, a disaster recovery umo\u017cliwia szybkie przywr\u00f3cenie dzia\u0142ania ca\u0142ej infrastruktury IT. R\u00f3wnie wa\u017cne jest regularne testowanie odtworze\u0144, aby unikn\u0105\u0107 chaosu w sytuacji kryzysowej.<\/p>\n\n<p>Coraz wi\u0119cej firm traktuje dzi\u015b Business Backup jak polis\u0119 ubezpieczeniow\u0105 \u2013 inwestycj\u0119 w ci\u0105g\u0142o\u015b\u0107 dzia\u0142ania, bezpiecze\u0144stwo i stabilno\u015b\u0107 biznesu.<\/p>\n\n<p>\n    <strong>Obejrzyj wideo:<\/strong><br>\n    \ud83d\udd39 <strong>YouTube:<\/strong> <a href=\"https:\/\/www.youtube.com\/watch?v=RgH9sPBWtFA\">Business Backup \u2013 Twoja polisa na przetrwanie firmy po cyberataku<\/a><br>\n<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Backup danych to dzi\u015b podstawa cyberbezpiecze\u0144stwa, ale sama kopia zapasowa nie wystarczy, by skutecznie ochroni\u0107 firm\u0119 przed cyberatakiem czy awari\u0105. Kluczowe jest po\u0142\u0105czenie backupu, disaster recovery i przemy\u015blanej strategii zarz\u0105dzania danymi. Jednym z fundament\u00f3w bezpiecze\u0144stwa jest zasada 3-2-1, czyli przechowywanie danych w kilku lokalizacjach \u2013 np. w chmurze, on-premise i zewn\u0119trznym data center. Takie podej\u015bcie [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":85183,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[571],"tags":[],"class_list":["post-85179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wideo-i-webinaria"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?<\/title>\n<meta name=\"description\" content=\"Czy backup wystarczy, by ochroni\u0107 firm\u0119 przed cyberatakiem? Sprawd\u017a, czym jest disaster recovery, zasada 3-2-1 i jak zadba\u0107 o cyberodporno\u015b\u0107.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?\" \/>\n<meta property=\"og:description\" content=\"Czy backup wystarczy, by ochroni\u0107 firm\u0119 przed cyberatakiem? Sprawd\u017a, czym jest disaster recovery, zasada 3-2-1 i jak zadba\u0107 o cyberodporno\u015b\u0107.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem\" \/>\n<meta property=\"og:site_name\" content=\"T-Mobile Biznes Polska\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-31T12:32:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T12:32:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png\" \/>\n\t<meta property=\"og:image:width\" content=\"352\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marcin Beck\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marcin Beck\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#article\",\"isPartOf\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem\"},\"author\":{\"name\":\"Marcin Beck\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/person\/91af4dc1efdc158b377dd64e26acf216\"},\"headline\":\"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?\",\"datePublished\":\"2026-03-31T12:32:36+00:00\",\"dateModified\":\"2026-03-31T12:32:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem\"},\"wordCount\":164,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#organization\"},\"image\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#primaryimage\"},\"thumbnailUrl\":\"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png\",\"articleSection\":[\"Wideo, Webinaria i Podcasty\"],\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem\",\"url\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem\",\"name\":\"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?\",\"isPartOf\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#primaryimage\"},\"image\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#primaryimage\"},\"thumbnailUrl\":\"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png\",\"datePublished\":\"2026-03-31T12:32:36+00:00\",\"dateModified\":\"2026-03-31T12:32:38+00:00\",\"description\":\"Czy backup wystarczy, by ochroni\u0107 firm\u0119 przed cyberatakiem? Sprawd\u017a, czym jest disaster recovery, zasada 3-2-1 i jak zadba\u0107 o cyberodporno\u015b\u0107.\",\"breadcrumb\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#primaryimage\",\"url\":\"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png\",\"contentUrl\":\"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png\",\"width\":352,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/biznes.t-mobile.pl\/pl\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#website\",\"url\":\"https:\/\/biznes.t-mobile.pl\/pl\/\",\"name\":\"T-Mobile Biznes Polska\",\"description\":\"Kompletna oferta T-Mobile dla firm. Sprawd\u017a us\u0142ugi mobilne, stacjonarne, sieci transmisji danych, internetu, centrum danych, cyberbezpiecze\u0144stwa i smart city ju\u017c teraz!\",\"publisher\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/biznes.t-mobile.pl\/pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#organization\",\"name\":\"T-Mobile Biznes Polska\",\"url\":\"https:\/\/biznes.t-mobile.pl\/pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2024\/05\/logo-tmobile-white-new.svg\",\"contentUrl\":\"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2024\/05\/logo-tmobile-white-new.svg\",\"caption\":\"T-Mobile Biznes Polska\"},\"image\":{\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/person\/91af4dc1efdc158b377dd64e26acf216\",\"name\":\"Marcin Beck\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5b431570d7436b411eeb0d487f5a9e0667e61311e652a244145bce90125638ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5b431570d7436b411eeb0d487f5a9e0667e61311e652a244145bce90125638ff?s=96&d=mm&r=g\",\"caption\":\"Marcin Beck\"},\"url\":\"https:\/\/biznes.t-mobile.pl\/pl\/author\/marcinb\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?","description":"Czy backup wystarczy, by ochroni\u0107 firm\u0119 przed cyberatakiem? Sprawd\u017a, czym jest disaster recovery, zasada 3-2-1 i jak zadba\u0107 o cyberodporno\u015b\u0107.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem","og_locale":"pl_PL","og_type":"article","og_title":"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?","og_description":"Czy backup wystarczy, by ochroni\u0107 firm\u0119 przed cyberatakiem? Sprawd\u017a, czym jest disaster recovery, zasada 3-2-1 i jak zadba\u0107 o cyberodporno\u015b\u0107.","og_url":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem","og_site_name":"T-Mobile Biznes Polska","article_published_time":"2026-03-31T12:32:36+00:00","article_modified_time":"2026-03-31T12:32:38+00:00","og_image":[{"width":352,"height":214,"url":"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png","type":"image\/png"}],"author":"Marcin Beck","twitter_card":"summary_large_image","twitter_misc":{"Napisane przez":"Marcin Beck","Szacowany czas czytania":"1 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#article","isPartOf":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem"},"author":{"name":"Marcin Beck","@id":"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/person\/91af4dc1efdc158b377dd64e26acf216"},"headline":"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?","datePublished":"2026-03-31T12:32:36+00:00","dateModified":"2026-03-31T12:32:38+00:00","mainEntityOfPage":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem"},"wordCount":164,"commentCount":0,"publisher":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/#organization"},"image":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#primaryimage"},"thumbnailUrl":"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png","articleSection":["Wideo, Webinaria i Podcasty"],"inLanguage":"pl-PL","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#respond"]}]},{"@type":"WebPage","@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem","url":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem","name":"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?","isPartOf":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#primaryimage"},"image":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#primaryimage"},"thumbnailUrl":"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png","datePublished":"2026-03-31T12:32:36+00:00","dateModified":"2026-03-31T12:32:38+00:00","description":"Czy backup wystarczy, by ochroni\u0107 firm\u0119 przed cyberatakiem? Sprawd\u017a, czym jest disaster recovery, zasada 3-2-1 i jak zadba\u0107 o cyberodporno\u015b\u0107.","breadcrumb":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#primaryimage","url":"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png","contentUrl":"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2026\/03\/BusinessBackup.png","width":352,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/biznes.t-mobile.pl\/pl\/business-backup-jak-zabezpieczyc-firme-przed-cyberatakiem#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/biznes.t-mobile.pl\/pl"},{"@type":"ListItem","position":2,"name":"Business Backup \u2013 jak zabezpieczy\u0107 firm\u0119 przed cyberatakiem?"}]},{"@type":"WebSite","@id":"https:\/\/biznes.t-mobile.pl\/pl\/#website","url":"https:\/\/biznes.t-mobile.pl\/pl\/","name":"T-Mobile Biznes Polska","description":"Kompletna oferta T-Mobile dla firm. Sprawd\u017a us\u0142ugi mobilne, stacjonarne, sieci transmisji danych, internetu, centrum danych, cyberbezpiecze\u0144stwa i smart city ju\u017c teraz!","publisher":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/biznes.t-mobile.pl\/pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/biznes.t-mobile.pl\/pl\/#organization","name":"T-Mobile Biznes Polska","url":"https:\/\/biznes.t-mobile.pl\/pl\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/logo\/image\/","url":"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2024\/05\/logo-tmobile-white-new.svg","contentUrl":"https:\/\/biznes.t-mobile.pl\/wp-content\/uploads\/2024\/05\/logo-tmobile-white-new.svg","caption":"T-Mobile Biznes Polska"},"image":{"@id":"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/person\/91af4dc1efdc158b377dd64e26acf216","name":"Marcin Beck","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/biznes.t-mobile.pl\/pl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5b431570d7436b411eeb0d487f5a9e0667e61311e652a244145bce90125638ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b431570d7436b411eeb0d487f5a9e0667e61311e652a244145bce90125638ff?s=96&d=mm&r=g","caption":"Marcin Beck"},"url":"https:\/\/biznes.t-mobile.pl\/pl\/author\/marcinb"}]}},"_links":{"self":[{"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/posts\/85179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/comments?post=85179"}],"version-history":[{"count":1,"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/posts\/85179\/revisions"}],"predecessor-version":[{"id":85181,"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/posts\/85179\/revisions\/85181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/media\/85183"}],"wp:attachment":[{"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/media?parent=85179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/categories?post=85179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/biznes.t-mobile.pl\/pl\/wp-json\/wp\/v2\/tags?post=85179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}