{"id":9794,"date":"2025-12-08T19:05:34","date_gmt":"2025-12-08T17:05:34","guid":{"rendered":"https:\/\/www.microbase.gr\/?p=9794"},"modified":"2025-12-08T19:07:40","modified_gmt":"2025-12-08T17:07:40","slug":"cyber-security-investment-vs-cyber-attack-cost","status":"publish","type":"post","link":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/","title":{"rendered":"Cybersecurity investment vs cyberattack cost"},"content":{"rendered":"<p>Digital transformation in a business covers all areas of its operation, radically changing them, with benefits in productivity, competitiveness, balance sheet, etc. Its utmost importance is also evident from its comparison with the Industrial Revolution, which it surpasses in terms of scope, speed, and impact.<\/p>\n<p>The adoption of digital transformation requires the allocation of resources, continuous adaptation, culture, education, and, most importantly of all, dedication to Security due to vulnerability to cyberattacks.<\/p>\n<p>Below we highlight the importance of this prerequisite, cybersecurity.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/security-vs-attack_-psaras_dec2025_en-2\/\" rel=\"attachment wp-att-9799\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-9799 \" src=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png\" alt=\"\" width=\"480\" height=\"402\" srcset=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png 940w, https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d-768x644.png 768w, https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d-859x720.png 859w, https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d-300x250.png 300w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a>When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment. To understand why businesses decide to put prevention first, one should analyze the expenses of cybersecurity against the possible costs of a cyberattack.<\/p>\n<p><strong><span style=\"color: #ff6600;\">Cybersecurity Expenses |<\/span><\/strong> Strong cybersecurity implementation entails several components, and the expenses differ depending on the organization&#8217;s size, complexity, and sector. Typical shielding-related expenses include:<\/p>\n<ul>\n<li><strong>Software and Tools<\/strong>: Essential elements include intrusion detection systems, firewalls, vulnerability scanners, encryption tools, and antivirus software. For big organizations, these technologies can cost anywhere from a few thousand to a million euros a year.<\/li>\n<li><strong>Cybersecurity Personnel<\/strong>: It&#8217;s critical to hire cybersecurity experts like security analysts, engineers, and incident response teams. Because of the strong need for specialized abilities, experienced individuals in the cybersecurity area may require substantial salaries.<\/li>\n<li><strong>Awareness and Training<\/strong>: It is essential to provide personnel with regular training programs to help avoid human mistakes, such as phishing assaults. The cost of compliance, internal audits, and training initiatives can be expensive.<\/li>\n<li><strong>Compliance Costs<\/strong>: Investing data protection, audits, and legal advice is frequently necessary to comply with regulations (such as the GDPR, CCPA, etc.).<\/li>\n<li><strong>Maintenance and Monitoring<\/strong>: Cybersecurity is a continuous process that necessitates regular system patching, updating, and monitoring. Cooperation with Security Companies for 24\/7 Security Operations (SOC) may be necessary.<\/li>\n<\/ul>\n<p>Despite their size, these expenses are predictable and under your control. They are dispersed throughout time and can be modified in accordance with the needs and risk tolerance of the organization. Nonetheless, strategic cooperation with an outsourced cybersecurity organization can offer all the above at a given cost.<\/p>\n<blockquote>\n<h2 style=\"text-align: center;\"><span style=\"color: #ff6600;\"><strong>Cybersecurity costs are predictable and under your control<\/strong><\/span><\/h2>\n<\/blockquote>\n<p><span style=\"color: #ff6600;\"><strong>Cyberattack Costs |<\/strong> <\/span>The costs of a cyberattack, on the other hand, are frequently higher than those of preventive measures and can be much more erratic, abrupt, and destructive. Important cost considerations are:<\/p>\n<ul>\n<li><strong>Direct Financial Damage<\/strong>: Theft of funds, intellectual property, and ransom payments in the event of ransomware attacks are all examples of how cyberattacks can directly cause financial damage.<\/li>\n<li><strong>Business Disruption<\/strong>: A lot of cyberattacks, such as ransomware and Distributed Denial of Service (DDoS), result in a lot of downtime. Reduced productivity, interrupted operations, and lost revenue are the results of downtime.<\/li>\n<li><strong>Data Breach and Recovery<\/strong>: It can be exceedingly expensive to recover from a data breach, requiring investigations, and system restoration. Data will always be at attackers\u2019 control and can be used for further attacks, blackmailing, or even sold to competitors.<\/li>\n<li><strong>Reputation Damage<\/strong>: A cyberattack has the potential to seriously harm an organization\u2019s standing and erode consumer confidence. To \u201crebuild\u201d trust, this long-term harm frequently leads to decreased stock prices, lost sales, and higher customer acquisition expenses.<\/li>\n<li><strong>Litigation Expenses<\/strong>: Organizations that were impacted by data breaches or cyberattacks may be sued by investors, partners, consumers or even have legislative fines (i.e., GDPR, NIS2, etc.).<\/li>\n<li><strong>Cyber Insurance Premiums<\/strong>: Following an attack, companies may see higher premiums even if they have cyber insurance, and insurance benefits may not fully compensate for the damage.<\/li>\n<\/ul>\n<p><strong><span style=\"color: #ff6600;\">The Final Score<br \/>\n<\/span><\/strong>A Cost-Benefit Evaluation | The cost of investing in cybersecurity is usually less than the expense of addressing the fallout from a significant cyberattack, according to cost-benefit analyses. Despite their initial high cost, cybersecurity expenditures provide significant protection against far larger losses, such as:<\/p>\n<ul>\n<li><strong>Preventing breaches<\/strong> or leaks of sensitive data (financial, personal, and proprietary).<\/li>\n<li><strong>Preventing any outages<\/strong> and guaranteeing uninterrupted operations.<\/li>\n<li><strong>Steering clear <\/strong>of legal and regulatory penalties.<\/li>\n<li><strong>Preserving consumer trust<\/strong> and brand reputation, which are difficult to regain following an attack.<\/li>\n<\/ul>\n<blockquote>\n<h2 style=\"text-align: center;\"><strong><span style=\"color: #ff6600;\">Recovering from a cyberattack usually costs much more than protecting<br \/>\nan organization with cybersecurity measures<\/span><\/strong><\/h2>\n<\/blockquote>\n<p>Even if cybersecurity does demand ongoing investment, prevention is ultimately a far more cost-effective strategy due to the unpredictable effects of a breach on finances and reputation. In essence, investing in cybersecurity is an \u201cinsurance policy\u201d that shields a company against threats that may otherwise be fatal to its existence and financial success.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment.<\/p>\n","protected":false},"author":6,"featured_media":9799,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64],"tags":[],"class_list":["post-9794","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity investment vs cyberattack cost - Microbase<\/title>\n<meta name=\"description\" content=\"When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity investment vs cyberattack cost\" \/>\n<meta property=\"og:description\" content=\"When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/\" \/>\n<meta property=\"og:site_name\" content=\"Microbase\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-08T17:05:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-08T17:07:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"margarita\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity investment vs cyberattack cost\" \/>\n<meta name=\"twitter:description\" content=\"When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"margarita\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/\"},\"author\":{\"name\":\"margarita\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a\"},\"headline\":\"Cybersecurity investment vs cyberattack cost\",\"datePublished\":\"2025-12-08T17:05:34+00:00\",\"dateModified\":\"2025-12-08T17:07:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/\"},\"wordCount\":748,\"publisher\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/\",\"url\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/\",\"name\":\"Cybersecurity investment vs cyberattack cost - Microbase\",\"isPartOf\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png\",\"datePublished\":\"2025-12-08T17:05:34+00:00\",\"dateModified\":\"2025-12-08T17:07:40+00:00\",\"description\":\"When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#primaryimage\",\"url\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png\",\"contentUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png\",\"width\":940,\"height\":788},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0391\u03c1\u03c7\u03b9\u03ba\u03ae\",\"item\":\"https:\/\/www.microbase.gr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity investment vs cyberattack cost\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#website\",\"url\":\"https:\/\/www.microbase.gr\/en\/\",\"name\":\"Microbase\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microbase.gr\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#organization\",\"name\":\"Microbase\",\"url\":\"https:\/\/www.microbase.gr\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png\",\"contentUrl\":\"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png\",\"width\":1602,\"height\":350,\"caption\":\"Microbase\"},\"image\":{\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a\",\"name\":\"margarita\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g\",\"caption\":\"margarita\"},\"url\":\"https:\/\/www.microbase.gr\/en\/author\/margarita\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity investment vs cyberattack cost - Microbase","description":"When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity investment vs cyberattack cost","og_description":"When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment.","og_url":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/","og_site_name":"Microbase","article_published_time":"2025-12-08T17:05:34+00:00","article_modified_time":"2025-12-08T17:07:40+00:00","og_image":[{"width":940,"height":788,"url":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png","type":"image\/png"}],"author":"margarita","twitter_card":"summary_large_image","twitter_title":"Cybersecurity investment vs cyberattack cost","twitter_description":"When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment.","twitter_image":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png","twitter_misc":{"Written by":"margarita","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#article","isPartOf":{"@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/"},"author":{"name":"margarita","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a"},"headline":"Cybersecurity investment vs cyberattack cost","datePublished":"2025-12-08T17:05:34+00:00","dateModified":"2025-12-08T17:07:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/"},"wordCount":748,"publisher":{"@id":"https:\/\/www.microbase.gr\/en\/#organization"},"image":{"@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/","url":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/","name":"Cybersecurity investment vs cyberattack cost - Microbase","isPartOf":{"@id":"https:\/\/www.microbase.gr\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#primaryimage"},"image":{"@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png","datePublished":"2025-12-08T17:05:34+00:00","dateModified":"2025-12-08T17:07:40+00:00","description":"When comparing the cost of protecting an organization in cyberspace against the potentially catastrophic damage a cyberattack could cause, the former appears to be a necessary investment.","breadcrumb":{"@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#primaryimage","url":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png","contentUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2025\/11\/SECURITY-vs-ATTACK_-Psaras_Dec2025_\u0395\u039d.png","width":940,"height":788},{"@type":"BreadcrumbList","@id":"https:\/\/www.microbase.gr\/en\/cyber-security-investment-vs-cyber-attack-cost\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0391\u03c1\u03c7\u03b9\u03ba\u03ae","item":"https:\/\/www.microbase.gr\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity investment vs cyberattack cost"}]},{"@type":"WebSite","@id":"https:\/\/www.microbase.gr\/en\/#website","url":"https:\/\/www.microbase.gr\/en\/","name":"Microbase","description":"","publisher":{"@id":"https:\/\/www.microbase.gr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microbase.gr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microbase.gr\/en\/#organization","name":"Microbase","url":"https:\/\/www.microbase.gr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png","contentUrl":"https:\/\/www.microbase.gr\/wp-content\/uploads\/2020\/07\/Logo_Microbase.png","width":1602,"height":350,"caption":"Microbase"},"image":{"@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/15914b99e5e613e659bf9368b49e760a","name":"margarita","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microbase.gr\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea36d332cf2dbf84e6681fd54bc39599e804d7f4143fa38e735ac9bd582e95d6?s=96&d=mm&r=g","caption":"margarita"},"url":"https:\/\/www.microbase.gr\/en\/author\/margarita\/"}]}},"_links":{"self":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts\/9794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/comments?post=9794"}],"version-history":[{"count":7,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts\/9794\/revisions"}],"predecessor-version":[{"id":9877,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/posts\/9794\/revisions\/9877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/media\/9799"}],"wp:attachment":[{"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/media?parent=9794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/categories?post=9794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microbase.gr\/en\/wp-json\/wp\/v2\/tags?post=9794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}