{"id":817,"date":"2025-06-16T14:13:04","date_gmt":"2025-06-16T14:13:04","guid":{"rendered":"https:\/\/inomis.lt\/?page_id=817"},"modified":"2025-06-24T12:21:04","modified_gmt":"2025-06-24T12:21:04","slug":"lean-cybersecurity","status":"publish","type":"page","link":"https:\/\/inomis.lt\/en\/lean-cybersecurity\/","title":{"rendered":"Lean Cybersecurity"},"content":{"rendered":"\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-b19e7c9 stk-block-background stk--has-background-overlay\" data-block-id=\"b19e7c9\"><style>.stk-b19e7c9 {background-color:#1d2233 !important;background-image:url(http:\/\/inomis.lt\/wp-content\/uploads\/2022\/05\/lines-background-2.svg) !important;padding-top:120px !important;padding-bottom:0px !important;margin-bottom:0px !important;overflow:visible !important;}.stk-b19e7c9:before{background-color:#1d2233 !important;opacity:0.8 !important;}.stk-b19e7c9 .stk-container{overflow:visible !important;}@media screen and (max-width:999px){.stk-b19e7c9 {padding-top:80px !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-b19e7c9-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-da68494\" data-v=\"4\" data-block-id=\"da68494\"><style>.stk-da68494-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-da68494-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-da68494-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-e10f9ca\" id=\"lean-cybersecurity\" data-block-id=\"e10f9ca\"><style>.stk-e10f9ca {margin-bottom:0px !important;}.stk-e10f9ca .stk-block-heading__text{font-size:75px !important;color:var(u002du002dtheme-palette-color-8, #ffffff) !important;line-height:1.3em !important;}@media screen and (max-width:999px){.stk-e10f9ca .stk-block-heading__text{font-size:50px !important;}}<\/style><h2 class=\"stk-block-heading__text has-text-color has-palette-color-8-color has-text-align-center\">Lean Cybersecurity<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-241a537\" data-block-id=\"241a537\"><style>.stk-241a537 {height:50px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-0faee6d\" data-block-id=\"0faee6d\"><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-0ae063a\" data-block-id=\"0ae063a\"><style>.stk-0ae063a {height:69px !important;}@media screen and (max-width:999px){.stk-0ae063a {height:100px !important;}}<\/style><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">You know it and we know it &#8211; most cybersecurity implementations feel like wearing a <strong>suit of armor to a business meeting<\/strong> \u2013 protective but <strong>unnecessarily cumbersome<\/strong>. Traditional ISO 27001 implementations burden organizations with excessive documentation, redundant processes, and controls that add complexity without adding value. <strong>We believe cybersecurity should enhance your business, not hold it back.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our Lean ISO 27001 methodology changes how any organization approaches information security management. Through <strong>careful analysis of your actual business processes<\/strong>, regulations and best practices we identify precisely<strong> what protection you need<\/strong> and eliminate everything you don&#8217;t. The result? A streamlined, elegant security framework that delivers comprehensive protection at a fraction of the typical cost and complexity and optimum level of compliance to existing regulations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Problem with Traditional Cybersecurity<\/h3>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-8a6f39c\" data-block-id=\"8a6f39c\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-8a6f39c-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-df0e711\" data-v=\"4\" data-block-id=\"df0e711\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-df0e711-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-df0e711-inner-blocks\">\n<ul class=\"wp-block-list\">\n<li><strong>Over-Documentation: <\/strong> hundreds of pages of policies sit unused in digital folders. We&#8217;ve seen organizations with 300-page security manuals that nobody reads or follows.<\/li>\n\n\n\n<li><strong>One-Size-Fits-None:<\/strong> forcing your business to adapt to rigid security templates rather than designing security that fits your operations naturally.<\/li>\n\n\n\n<li><strong>Compliance Theater:<\/strong> focusing on impressive documentation for auditors rather than practical security that protects your business daily.<\/li>\n\n\n\n<li><strong>Resource Drain:<\/strong> consuming excessive time, money, and human resources while delivering minimal operational value.<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-62f0263\" data-v=\"4\" data-block-id=\"62f0263\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-62f0263-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-62f0263-inner-blocks\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image.png\" alt=\"\" class=\"wp-image-825\" style=\"width:269px;height:auto\" srcset=\"https:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image.png 1024w, https:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image-300x300.png 300w, https:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image-150x150.png 150w, https:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Our Lean Methodology<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Business-First Analysis<\/strong>: We start by understanding how your organization actually operates, not how consultants think it should operate. Every security control must earn its place by providing real protection or enabling business objectives.<\/li>\n\n\n\n<li><strong>Precision<\/strong>: We craft security frameworks that fit your organization perfectly \u2013 no excess material, no gaps in coverage.<\/li>\n\n\n\n<li><strong>Practical Integration<\/strong>: Security processes integrate seamlessly into existing workflows rather than creating parallel bureaucratic systems that employees circumvent.<\/li>\n\n\n\n<li><strong>Continuous Refinement<\/strong>: We regularly review and optimize your security framework, removing controls that prove unnecessary and strengthening areas where risks evolve.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-3fb1ffe\" data-block-id=\"3fb1ffe\"><style>.stk-3fb1ffe {height:70px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-5b0d21f\" data-block-id=\"5b0d21f\"><style>.stk-5b0d21f .stk--block-align-5b0d21f{align-items:center !important;}.stk-5b0d21f {margin-bottom:0px !important;}.stk-5b0d21f-column{--stk-column-gap:200px !important;row-gap:50px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk--block-align-5b0d21f stk-block-content stk-content-align stk-5b0d21f-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-7e96063\" data-v=\"4\" data-block-id=\"7e96063\"><style>.stk-7e96063-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}@media screen and (min-width:690px) and (max-width:999px){.stk-7e96063 {flex:var(--stk-flex-grow, 1) 1 calc(100% - var(--stk-column-gap, 0px) * 0 \/ 1 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-7e96063-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-7e96063-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-11cfca1\" id=\"live-in-action\" data-block-id=\"11cfca1\"><style>.stk-11cfca1 {margin-bottom:15px !important;}<\/style><h5 class=\"stk-block-heading__text has-text-align-center-tablet stk-block-heading--use-theme-margins\">Live in action<\/h5><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-f19ffa8\" data-block-id=\"f19ffa8\"><p class=\"stk-block-text__text has-text-align-center-tablet\">One of our clients have successfully <strong>reduced their security documentation by 70%<\/strong> while <strong>achieving stronger actual protection and 100% audit compliance<\/strong>. Their security team went from spending 80% of their time on paperwork to focusing on real threat prevention and business enablement.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-2b62231\" data-v=\"4\" data-block-id=\"2b62231\"><style>.stk-2b62231-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}@media screen and (min-width:690px) and (max-width:999px){.stk-2b62231 {flex:var(--stk-flex-grow, 1) 1 calc(100% - var(--stk-column-gap, 0px) * 0 \/ 1 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-2b62231-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-2b62231-inner-blocks\">\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-19141a7 stk-block-background stk--has-background-overlay\" data-block-id=\"19141a7\"><style>.stk-19141a7 {background-color:#1d2233 !important;background-image:url(http:\/\/inomis.lt\/wp-content\/uploads\/2022\/05\/lines-background-2.svg) !important;padding-top:120px !important;padding-bottom:120px !important;margin-bottom:0px !important;}.stk-19141a7:before{background-color:#1d2233 !important;opacity:0.8 !important;}@media screen and (max-width:999px){.stk-19141a7 {padding-top:80px !important;padding-bottom:80px !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-19141a7-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-a2fa1d3\" data-v=\"4\" data-block-id=\"a2fa1d3\"><style>.stk-a2fa1d3-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-a2fa1d3-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-a2fa1d3-inner-blocks\">\n<p class=\"wp-block-paragraph\"><strong>Our lean cybersecurity approach typically brings your organization to ISO 27001 certification in 4-6 months versus the industry standard of 12-18 months.<\/strong><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-df0502b\" data-block-id=\"df0502b\"><style>.stk-df0502b {height:70px !important;}<\/style><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Transform Your Approach<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Cybersecurity doesn&#8217;t have to be an unwanted guest that drains resources and frustrates teams. With our lean methodology, security becomes an elegant competitive advantage that protects your business while enabling growth.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ready to discover how elegant cybersecurity can transform your organization? Let&#8217;s design a security framework as sophisticated and efficient as your business deserves.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-233c743\" data-block-id=\"233c743\"><style>.stk-233c743 {height:70px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-c0be13e stk-block-background stk--has-background-overlay\" data-block-id=\"c0be13e\"><style>.stk-c0be13e {background-color:#1d2233 !important;background-image:url(http:\/\/inomis.lt\/wp-content\/uploads\/2022\/05\/lines-background-2.svg) !important;padding-top:120px !important;padding-bottom:120px !important;margin-bottom:0px !important;}.stk-c0be13e:before{background-color:#1d2233 !important;opacity:0.8 !important;}@media screen and (max-width:999px){.stk-c0be13e {padding-top:80px !important;padding-bottom:80px !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-c0be13e-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-2addae5\" data-v=\"4\" data-block-id=\"2addae5\"><style>.stk-2addae5-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-2addae5-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-2addae5-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-c2ec6f9\" id=\"why-it-works\" data-block-id=\"c2ec6f9\"><style>.stk-c2ec6f9 {margin-bottom:30px !important;}.stk-c2ec6f9 .stk-block-heading__text{font-size:40px !important;color:var(u002du002dtheme-palette-color-8, #ffffff) !important;}@media screen and (max-width:999px){.stk-c2ec6f9 .stk-block-heading__text{font-size:40px !important;}}<\/style><h2 class=\"stk-block-heading__text has-text-color has-palette-color-8-color has-text-align-center\">Why It Works<\/h2><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Through 10+ successful implementations<\/strong> for SMEs and public sector organizations, we&#8217;ve proven that lean cybersecurity delivers superior results:<\/li>\n\n\n\n<li><strong>60% Faster Implementation<\/strong>: Our lean cybersecurity approach is typically ISO 27001 certification ready in 4-6 months versus the industry standard of 12-18 months.<\/li>\n\n\n\n<li><strong>40% Lower Total Cost<\/strong>: By eliminating unnecessary processes and documentation, you save significantly on both implementation and ongoing maintenance.<\/li>\n\n\n\n<li><strong>Higher Employee Adoption<\/strong>: When security makes sense, employees actually follow the procedures instead of finding workarounds.<\/li>\n\n\n\n<li><strong>Stronger Actual Security<\/strong>: Focused, practical controls that employees understand and use provide better protection than comprehensive frameworks they&#8217;d otherwise ignore.<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-6a5417b\" data-block-id=\"6a5417b\"><style>.stk-6a5417b {height:70px !important;}<\/style><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">What You Get<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Strategic Clarity<\/strong>: Clean, focused security strategies that executive teams can understand and support with confidence.<\/li>\n\n\n\n<li><strong>Operational Efficiency<\/strong>: Security processes that accelerate business operations rather than slowing them down.<\/li>\n\n\n\n<li><strong>Competitive Edge<\/strong>: Faster compliance, lower costs, and more agile security responses give you advantages over competitors struggling with bloated frameworks.<\/li>\n\n\n\n<li><strong>Future-Ready Foundation<\/strong>: Lean frameworks adapt quickly to new regulations, business changes, and emerging threats.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-7df5ad5\" data-block-id=\"7df5ad5\"><style>.stk-7df5ad5 {height:100px !important;}<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Lean Cybersecurity You know it and we know it &#8211; most cybersecurity implementations feel like wearing a suit of armor to a business meeting \u2013 protective but unnecessarily cumbersome. Traditional ISO 27001 implementations burden organizations with excessive documentation, redundant processes, and controls that add complexity without adding value. We believe cybersecurity should enhance your business, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-817","page","type-page","status-publish","hentry"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6},"page_title_panel":"","has_hero_section":"disabled","cdffe435dcab9bc0ccfb8b8286615cd0":"","hero_section":"type-1","hero_elements":[{"id":"custom_title","enabled":true,"heading_tag":"h1","title":"Home"},{"id":"custom_description","enabled":true,"description_visibility":{"desktop":true,"tablet":true,"mobile":false}},{"id":"custom_meta","enabled":false,"meta_elements":[{"id":"author","enabled":true,"label":"By","has_author_avatar":"yes","avatar_size":25},{"id":"post_date","enabled":true,"label":"On","date_format_source":"default","date_format":"M j, Y"},{"id":"updated_date","enabled":false,"label":"On","date_format_source":"default","date_format":"M j, Y"},{"id":"categories","enabled":false,"label":"In","style":"simple"},{"id":"comments","enabled":true}],"page_meta_elements":{"joined":true,"articles_count":true,"comments":true}},{"id":"breadcrumbs","enabled":false}],"aa3e71982d0f17b8fe2bfbbbb3812215":"","hero_alignment1":"CT_CSS_SKIP_RULE","hero_margin":40,"hero_alignment2":"center","hero_vertical_alignment":"center","e60ee0ea9b28fd15f57bf213bf429eae":"","hero_structure":"narrow","91f1b2d6092ab8cac63a7d09191e2915":"","page_title_bg_type":"featured_image","custom_hero_background":{"attachment_id":null},"page_title_image_size":"full","parallax":{"desktop":false,"tablet":false,"mobile":false},"3b731d17b6531211b1472abeefaae46a":"","hero_height":"250px","pageTitleFont":{"family":"Default","variation":"Default","size":"30px","line-height":"CT_CSS_SKIP_RULE","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"CT_CSS_SKIP_RULE","text-decoration":"CT_CSS_SKIP_RULE"},"pageTitleFontColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"pageMetaFont":{"family":"Default","variation":"n6","size":"12px","line-height":"1.3","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"uppercase","text-decoration":"CT_CSS_SKIP_RULE"},"pageMetaFontColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"page_meta_button_type_font_colors":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"page_meta_button_type_background_colors":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"pageExcerptFont":{"family":"Default","variation":"Default","size":"CT_CSS_SKIP_RULE","line-height":"CT_CSS_SKIP_RULE","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"CT_CSS_SKIP_RULE","text-decoration":"CT_CSS_SKIP_RULE"},"pageExcerptColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"breadcrumbsFont":{"family":"Default","variation":"Default","size":"CT_CSS_SKIP_RULE","line-height":"CT_CSS_SKIP_RULE","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"CT_CSS_SKIP_RULE","text-decoration":"CT_CSS_SKIP_RULE"},"breadcrumbsFontColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"initial":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"pageTitleOverlay":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"CT_CSS_SKIP_RULE"}}},"pageTitleBackground":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"var(--theme-palette-color-6)"}}},"pageTitlePadding":{"top":"50px","bottom":"50px","left":"auto","right":"auto","linked":true},"dc538ce9b4da84cfb0fa32d6a20988f8":"","page_structure_type":"default","24b6769498b19f76af1dd253e1cc607f":"","content_style_source":"inherit","content_style":"wide","vertical_spacing_source":"custom","content_area_spacing":"none","background":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"CT_CSS_SKIP_RULE"}}},"content_background":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"var(--theme-palette-color-8)"}}},"content_boxed_shadow":{"inherit":false,"blur":18,"spread":-6,"v_offset":12,"h_offset":0,"inset":false,"enable":true,"color":{"color":"rgba(34, 56, 101, 0.04)"}},"content_boxed_border":{"width":1,"style":"none","color":{"color":"rgba(44,62,80,0.2)"}},"content_boxed_radius":{"top":"3px","bottom":"3px","left":"3px","right":"3px","linked":true},"boxed_content_spacing":{"desktop":{"top":"40px","bottom":"40px","left":"40px","right":"40px","linked":true},"tablet":{"top":"35px","bottom":"35px","left":"35px","right":"35px","linked":true},"mobile":{"top":"20px","bottom":"20px","left":"20px","right":"20px","linked":true}},"ac93a16d09c08770d93e1a1ae1cdc52e":"","disable_featured_image":"no","disable_share_box":"no","disable_header":"no","disable_footer":"no"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/inomis.lt\/en\/wp-json\/wp\/v2\/pages\/817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inomis.lt\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inomis.lt\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inomis.lt\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inomis.lt\/en\/wp-json\/wp\/v2\/comments?post=817"}],"version-history":[{"count":30,"href":"https:\/\/inomis.lt\/en\/wp-json\/wp\/v2\/pages\/817\/revisions"}],"predecessor-version":[{"id":922,"href":"https:\/\/inomis.lt\/en\/wp-json\/wp\/v2\/pages\/817\/revisions\/922"}],"wp:attachment":[{"href":"https:\/\/inomis.lt\/en\/wp-json\/wp\/v2\/media?parent=817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}