{"id":1176,"date":"2024-06-26T03:00:32","date_gmt":"2024-06-26T03:00:32","guid":{"rendered":"https:\/\/demo.sitespirit.co\/technical-test-5\/2024\/06\/26\/jaminan-keamanan-data-dalam-layanan-bpaas\/"},"modified":"2026-02-11T09:47:04","modified_gmt":"2026-02-11T02:47:04","slug":"data-security-guarantees-in-bpaas-services","status":"publish","type":"post","link":"https:\/\/kpsg.com\/en\/insight\/data-security-guarantees-in-bpaas-services\/","title":{"rendered":"Data Security Assurance in BPaaS Services"},"content":{"rendered":"<p>With more and more businesses taking advantage of Business Process as a Service (BPaaS) services, data security is one of the main considerations. As a platform that manages various critical business processes, BPaaS must be able to guarantee the confidentiality, integrity and availability of customer data.&nbsp;<\/p>\n\n\n\n<p>The issue of data security is becoming very crucial, especially in the midst of increasingly complex cyber threats. Under discussion <a href=\"https:\/\/kpsg.com\/en\/\">KPSG<\/a> this time, we will review more about how BPaaS services can ensure data security and meet the compliance standards required by the company.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Data security challenges in BPaaS<\/strong><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>Jaminan keamanan data menjadi salah satu isu krusial dalam adopsi layanan Business Process as a Service (BPaaS). As a platform that manages various critical business processes, BPaaS must be able to guarantee the confidentiality, integrity and availability of customer data. However, as cyber threats become more complex, the challenge of maintaining data security in the BPaaS environment is even greater. To that end, let us discuss further about what are the main challenges that must be faced in ensuring data security on BPaaS services.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Risks faced<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2024\/03\/04\/data-security-how-businesses-can-deal-with-the-greatest-risk\/\">Data security is a major risk identified by business leaders, with threats such as ransomware causing significant financial and reputational harm.<\/a> Businesses are advised to improve data resilience by avoiding overconfidence in their security measures and preparing themselves for the various threats they face.<\/p>\n\n\n\n<p>Gartner discusses the emergence of cloud business service offerings, including BPaaS. It is important to formulate resource strategies that address data security challenges in the BPaaS model.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Potential Risks:<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ransomware attack: an attack that encrypts data and asks for a ransom.<\/li>\n\n\n\n<li>Data leakage: unauthorized access resulting in exposure of sensitive data.<\/li>\n\n\n\n<li>Regulatory compliance: failure to comply with applicable industry standards and regulations.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Data Security Strategy in BPaaS<\/strong><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>To ensure data security in BPaaS services, <a href=\"https:\/\/www.gartner.com\/en\/documents\/1972115\">companies should consider the following strategies:<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Risk Assessment<\/strong><\/h3>\n\n\n\n<p>Regularly evaluate potential data security risks associated with BPaaS offerings. Risk assessment helps identify security gaps and areas that require improvement.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Steps:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security audits: perform regular audits to identify vulnerabilities.<\/li>\n\n\n\n<li>Risk analysis: assess the potential impact of various threats.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Compliance<\/strong><\/h3>\n\n\n\n<p>Ensure that BPaaS providers comply with industry standards and regulations for data protection. Compliance with regulations such as GDPR, HIPAA and others is essential to avoid sanctions and maintain reputation.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Steps:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Compliance Assessment: ensure service providers meet applicable standards.<\/li>\n\n\n\n<li>Compliance documentation: keep a complete record of compliance measures taken.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Encryption<\/strong><\/h3>\n\n\n\n<p>Use strong encryption methods for data that is stored (at rest) and data that is being transmitted (in transit). Encryption ensures that data cannot be read by unauthorized parties.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Steps:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data encryption: use strong encryption algorithms to protect data.<\/li>\n\n\n\n<li>Key management: manage encryption keys securely.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Access Control<\/strong><\/h3>\n\n\n\n<p>Implement strict access control and authentication measures to limit data exposure. Only authorized individuals can access sensitive data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Steps:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Multi-factor authentication( MFA): use MFA to improve access security.<\/li>\n\n\n\n<li>Role-Based Access Control (RBAC): assign access rights based on user roles.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Monitoring<\/strong><\/h3>\n\n\n\n<p>Continuously monitor the BPaaS environment to detect unusual activity that could indicate a security breach. Proactive monitoring helps in detecting and responding to security incidents quickly.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Steps:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Real-Time monitoring: use monitoring tools to detect anomalies.<\/li>\n\n\n\n<li>Automatic alerts: set up automatic alerts for suspicious activity.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Incident Response Plan<\/strong><\/h3>\n\n\n\n<p>Have a robust Incident Response Plan in place to quickly address emerging data security issues. This plan should include measures to mitigate impacts and recover data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Steps:<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Incident Response Team: form a team responsible for handling incidents.<\/li>\n\n\n\n<li>Recovery procedure: define a procedure to recover the affected data.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading translation-block\">Conclusion<\/h2>\n\n\n\n<p>Focusing on these strategies, <a href=\"https:\/\/www.infosysbpm.com\/offerings\/business-transformation-services\/insights\/documents\/the-shift-towards-next-gen-business-services.pdf\">businesses can better ensure data security when using BPaaS services.<\/a> It is important to partner with providers who not only offer efficient business processes but also prioritize and constantly update their data security measures.If you want to ensure the security of your business data with <a href=\"https:\/\/kpsg.com\/en\/solusi\/\">utilizing BPaaS services, contact KPSG.<\/a> We are ready to help you with a safe and reliable solution. <a href=\"https:\/\/kpsg.com\/en\/contact-us\/\">Visit KPSG for more information!<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Dengan semakin banyaknya bisnis yang memanfaatkan layanan Business Process as a Service (BPaaS), jaminan keamanan data menjadi salah satu pertimbangan utama. Sebagai platform yang mengelola berbagai proses bisnis penting, BPaaS harus dapat menjamin kerahasiaan, integritas, dan ketersediaan data pelanggan.&nbsp; Isu keamanan data menjadi sangat krusial, terutama di tengah ancaman siber yang semakin kompleks. Dalam pembahasan [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4115,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[44],"tags":[],"class_list":["post-1176","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wawasan"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keamanan Data, Aspek Penting dalam Layanan BPaaS<\/title>\n<meta name=\"description\" content=\"Keamanan data dalam Business Process as a Service (BPaaS) adalah aspek krusial yang membutuhkan perhatian khusus. Berikut adalah penjelasan KPSG!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kpsg.com\/en\/insight\/data-security-guarantees-in-bpaas-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keamanan Data, Aspek Penting dalam Layanan BPaaS\" \/>\n<meta property=\"og:description\" content=\"Keamanan data dalam Business Process as a Service (BPaaS) adalah aspek krusial yang membutuhkan perhatian khusus. Berikut adalah penjelasan KPSG!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kpsg.com\/en\/insight\/data-security-guarantees-in-bpaas-services\/\" \/>\n<meta property=\"og:site_name\" content=\"KPSG\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-26T03:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T02:47:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1320\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"KPSG Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"KPSG Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/\"},\"author\":{\"name\":\"KPSG Editor\",\"@id\":\"https:\/\/kpsg.com\/#\/schema\/person\/58935213e4a583d38864bcfb561eb48e\"},\"headline\":\"Jaminan Keamanan Data dalam Layanan BPaaS\",\"datePublished\":\"2024-06-26T03:00:32+00:00\",\"dateModified\":\"2026-02-11T02:47:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/\"},\"wordCount\":635,\"publisher\":{\"@id\":\"https:\/\/kpsg.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp\",\"articleSection\":[\"Wawasan\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/\",\"url\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/\",\"name\":\"Keamanan Data, Aspek Penting dalam Layanan BPaaS\",\"isPartOf\":{\"@id\":\"https:\/\/kpsg.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp\",\"datePublished\":\"2024-06-26T03:00:32+00:00\",\"dateModified\":\"2026-02-11T02:47:04+00:00\",\"description\":\"Keamanan data dalam Business Process as a Service (BPaaS) adalah aspek krusial yang membutuhkan perhatian khusus. Berikut adalah penjelasan KPSG!\",\"breadcrumb\":{\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#primaryimage\",\"url\":\"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp\",\"contentUrl\":\"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp\",\"width\":1320,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Beranda\",\"item\":\"https:\/\/kpsg.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wawasan\",\"item\":\"https:\/\/kpsg.com\/wawasan\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Jaminan Keamanan Data dalam Layanan BPaaS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kpsg.com\/#website\",\"url\":\"https:\/\/kpsg.com\/\",\"name\":\"KPSG\",\"description\":\"in Development\",\"publisher\":{\"@id\":\"https:\/\/kpsg.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kpsg.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kpsg.com\/#organization\",\"name\":\"KPSG\",\"url\":\"https:\/\/kpsg.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kpsg.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kpsg.com\/wp-content\/uploads\/2025\/11\/logo-kpsg-website.webp\",\"contentUrl\":\"https:\/\/kpsg.com\/wp-content\/uploads\/2025\/11\/logo-kpsg-website.webp\",\"width\":1200,\"height\":952,\"caption\":\"KPSG\"},\"image\":{\"@id\":\"https:\/\/kpsg.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kpsg.com\/#\/schema\/person\/58935213e4a583d38864bcfb561eb48e\",\"name\":\"KPSG Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kpsg.com\/wp-content\/litespeed\/avatar\/72838b67a03d45cf544b931ee2c5d262.jpg?ver=1776188764\",\"url\":\"https:\/\/kpsg.com\/wp-content\/litespeed\/avatar\/72838b67a03d45cf544b931ee2c5d262.jpg?ver=1776188764\",\"contentUrl\":\"https:\/\/kpsg.com\/wp-content\/litespeed\/avatar\/72838b67a03d45cf544b931ee2c5d262.jpg?ver=1776188764\",\"caption\":\"KPSG Editor\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Security, a Critical Aspect of BPaaS Services","description":"Data security in Business Process as a Service (BPaaS) is a crucial aspect that requires special attention. Here is an explanation of KPSG!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kpsg.com\/en\/insight\/data-security-guarantees-in-bpaas-services\/","og_locale":"en_US","og_type":"article","og_title":"Keamanan Data, Aspek Penting dalam Layanan BPaaS","og_description":"Keamanan data dalam Business Process as a Service (BPaaS) adalah aspek krusial yang membutuhkan perhatian khusus. Berikut adalah penjelasan KPSG!","og_url":"https:\/\/kpsg.com\/en\/insight\/data-security-guarantees-in-bpaas-services\/","og_site_name":"KPSG","article_published_time":"2024-06-26T03:00:32+00:00","article_modified_time":"2026-02-11T02:47:04+00:00","og_image":[{"width":1320,"height":330,"url":"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp","type":"image\/webp"}],"author":"KPSG Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"KPSG Editor","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#article","isPartOf":{"@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/"},"author":{"name":"KPSG Editor","@id":"https:\/\/kpsg.com\/#\/schema\/person\/58935213e4a583d38864bcfb561eb48e"},"headline":"Jaminan Keamanan Data dalam Layanan BPaaS","datePublished":"2024-06-26T03:00:32+00:00","dateModified":"2026-02-11T02:47:04+00:00","mainEntityOfPage":{"@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/"},"wordCount":635,"publisher":{"@id":"https:\/\/kpsg.com\/#organization"},"image":{"@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#primaryimage"},"thumbnailUrl":"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp","articleSection":["Wawasan"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/","url":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/","name":"Data Security, a Critical Aspect of BPaaS Services","isPartOf":{"@id":"https:\/\/kpsg.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#primaryimage"},"image":{"@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#primaryimage"},"thumbnailUrl":"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp","datePublished":"2024-06-26T03:00:32+00:00","dateModified":"2026-02-11T02:47:04+00:00","description":"Data security in Business Process as a Service (BPaaS) is a crucial aspect that requires special attention. Here is an explanation of KPSG!","breadcrumb":{"@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#primaryimage","url":"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp","contentUrl":"https:\/\/kpsg.com\/wp-content\/uploads\/2024\/06\/Juni-Artikel-5-Jaminan-Keamanan-Data-dalam-Layanan-BPaaS.webp","width":1320,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/kpsg.com\/wawasan\/jaminan-keamanan-data-dalam-layanan-bpaas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Beranda","item":"https:\/\/kpsg.com\/"},{"@type":"ListItem","position":2,"name":"Wawasan","item":"https:\/\/kpsg.com\/wawasan\/"},{"@type":"ListItem","position":3,"name":"Jaminan Keamanan Data dalam Layanan BPaaS"}]},{"@type":"WebSite","@id":"https:\/\/kpsg.com\/#website","url":"https:\/\/kpsg.com\/","name":"KPSG","description":"in Development","publisher":{"@id":"https:\/\/kpsg.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kpsg.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kpsg.com\/#organization","name":"KPSG","url":"https:\/\/kpsg.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kpsg.com\/#\/schema\/logo\/image\/","url":"https:\/\/kpsg.com\/wp-content\/uploads\/2025\/11\/logo-kpsg-website.webp","contentUrl":"https:\/\/kpsg.com\/wp-content\/uploads\/2025\/11\/logo-kpsg-website.webp","width":1200,"height":952,"caption":"KPSG"},"image":{"@id":"https:\/\/kpsg.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kpsg.com\/#\/schema\/person\/58935213e4a583d38864bcfb561eb48e","name":"KPSG Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kpsg.com\/wp-content\/litespeed\/avatar\/72838b67a03d45cf544b931ee2c5d262.jpg?ver=1776188764","url":"https:\/\/kpsg.com\/wp-content\/litespeed\/avatar\/72838b67a03d45cf544b931ee2c5d262.jpg?ver=1776188764","contentUrl":"https:\/\/kpsg.com\/wp-content\/litespeed\/avatar\/72838b67a03d45cf544b931ee2c5d262.jpg?ver=1776188764","caption":"KPSG Editor"}}]}},"_links":{"self":[{"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/posts\/1176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/comments?post=1176"}],"version-history":[{"count":2,"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/posts\/1176\/revisions"}],"predecessor-version":[{"id":5458,"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/posts\/1176\/revisions\/5458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/media\/4115"}],"wp:attachment":[{"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/media?parent=1176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/categories?post=1176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kpsg.com\/en\/wp-json\/wp\/v2\/tags?post=1176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}