{"id":1240,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail71-suw15-mcsv-net\/"},"modified":"2021-12-30T11:39:01","modified_gmt":"2021-12-30T11:39:01","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail71-suw15-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail71-suw15-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail71.suw15.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* Think tanks mull Geneva Convention for cybercrime<br \/>\n* IT Governance urges law firms to adopt information security practices to avoid surge in ransomware attacks<br \/>\n* Rising cybercrime costing companies millions<br \/>\n* Hackers would like to join your LinkedIn network &#8211; and you&#8217;d probably accept them<br \/>\n* Five Security Threats to Watch Out for This Summer<br \/>\n* No-Brainer Ransomware Defenses<br \/>\n* The number of corporate users hit by crypto ransomware is skyrocketing<br \/>\n* Five Reasons Why Classification Is the First Step to Successful Data-Loss Prevention<br \/>\n* Cybersecurity: Why do we spend more but get less?<br \/>\n* Metadata as a Divining Rod for Security<br \/>\n* The SEC Makes Clear There is No Room For Error in Cybersecurity<br \/>\n* Vulnerability Spotlight: Pidgin Vulnerabilities<br \/>\n* Where does your cloud data live? 3 questions to ask<br \/>\n* Supporting the IT edge is expensive, full of potential security risks<br \/>\n* VoIP Vulnerabilities: Protecting Against Evolving Threats<\/p>\n<p>Think tanks mull Geneva Convention for cybercrime<br \/>\nA Geneva Convention on cyberwar: That&#8217;s how a panel of experts proposes to deal with the growing threat to critical infrastructure posed by the possibility of cyberattack.<br \/>\nWhile a gentleman&#8217;s agreement might not seem like much protection, for a nation to break such a taboo would be to risk an all-out attack in retaliation, the commission suggested in &#8220;One Internet,&#8221; a new report on the future of the Internet.<br \/>\nAn agreement won&#8217;t eliminate all risks of cyberattack for civilian infrastructure, of course: Just as with the protection afforded hospitals and the like under the existing Geneva Conventions, there will always be those willing to ignore the rules.<br \/>\nThe report is not just about cyberwar.<br \/>\nIts whistle-stop tour of Internet ethics also takes in surveillance, privacy, anonymity, censorship and child protection, with additional chapters on reducing online crime and the threat that blockchain technologies pose to the established order.<br \/>\nThe Global Commission on Internet Governance is chaired by former Swedish Prime Minister Carl Bildt and was set up by two think tanks: Chatham House in the U.K. and the Centre for International Governance Innovation in Canada.<br \/>\nCIGI was founded by former BlackBerry co-CEO Jim Balsillie.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=297c878906&#038;e=20056c7556<\/p>\n<p>IT Governance urges law firms to adopt information security practices to avoid surge in ransomware attacks<br \/>\nELY, CAMBRIDGESHIRE, UNITED KINGDOM, June 22, 2016 \/EINPresswire.com\/ &#8212; IT Governance, the global provider of cyber security, IT governance, risk management and compliance expertise, is urging organisations within the legal sector to adopt information security best practice to avoid falling victim to a ransomware attack.<br \/>\nAlan Calder, the founder and executive chairman of IT Governance, says: \u201cLaw firms have notoriously been targets for cyber criminals because of the sensitive information they possess such as financial data, mergers and acquisition intelligence, and other sensitive information.<br \/>\nLike any other business, law firms often do not discover a data breach or ransomware attack until long after they\u2019ve started.<br \/>\nThe scale and devastation of ransomware and cyber breaches means that law firms urgently need to adopt stronger cyber security safeguards.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1363cee07e&#038;e=20056c7556<\/p>\n<p>Rising cybercrime costing companies millions<br \/>\nKUALA LUMPUR: An independent Global Economic Crime Survey revealed that more and more local companies are falling prey to hackers and cybercrime costing them millions in losses annually.<br \/>\nPwC Consulting Services Associates (M) Sdn Bhd\u2019s senior executive director and forensic lead Alex Tan said the results were based on a survey of 17 industries from from the private sector, government and state enterprises.<br \/>\n\u201cThe survey showed that cybercrime had dropped from 31% in 2014 to 30% this year.<br \/>\n\u201cHowever, what we have to realise is that, if we go back to 2012, it was only 5% and this is a huge jump,\u201d he told reporters at a press conference when announcing the findings carried out by PricewaterhouseCoopers (PwC) here on Thursday.<br \/>\nBased on the survey, Tan said males between 31 and 40 years old with university or college education and have worked with the company for between three and five years are likely to commit fraud or cybercrime against their own company.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9c837b289f&#038;e=20056c7556<\/p>\n<p>Hackers would like to join your LinkedIn network &#8211; and you&#8217;d probably accept them<br \/>\nIn fact, according to a survey of 2,000 people by cybersecurity researchers at Intel Security, nearly one quarter (24 percent) say they&#8217;ve connected to someone they don&#8217;t know on LinkedIn, thus potentially allowing hackers to access to a wealth of information which could be used for spear-phishing, malware drops, and other nefarious means.<br \/>\nIn fact, according to a survey of 2,000 people by cybersecurity researchers at Intel Security, nearly one quarter (24 percent) say they&#8217;ve connected to someone they don&#8217;t know on LinkedIn, thus potentially allowing hackers to access to a wealth of information which could be used for spear-phishing, malware drops, and other nefarious means.<br \/>\nHe also suggests that the corporate employer has to take some responsibility, especially now that personal and professional online personas are becoming ever more intermixed.<br \/>\n&#8220;Explain to people about the types of attacks and what criminals do, how they may go after you personally,&#8221; he explained.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2140eb4bb8&#038;e=20056c7556<\/p>\n<p>Five Security Threats to Watch Out for This Summer<br \/>\nSensationalized political posts for 2016 elections<br \/>\nPhishing emails focused on travel and vacation<br \/>\nZika virus and other health concerns<br \/>\nMajor sporting events<br \/>\nKids on summer vacation<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=22dd88bf08&#038;e=20056c7556<\/p>\n<p>No-Brainer Ransomware Defenses<br \/>\n&#8220;The only effective solution for ransomware is backup &#8230; and disaster recovery,&#8221; says Mark James, an IT security specialist at security firm ESET.<br \/>\nEven with verified, offline backups to hand, and the ability to rapidly restore systems, organizations may still need to take affected PCs or servers offline for some period of time.<br \/>\nBut the alternative, James says, involves the ethically dubious &#8211; at best &#8211; prospect of paying ransom money to criminals and trusting that they will indeed then share decryption keys for crypto-locked systems (see Please Don&#8217;t Pay Ransoms, FBI Urges).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bc02be28f5&#038;e=20056c7556<\/p>\n<p>The number of corporate users hit by crypto ransomware is skyrocketing<br \/>\nBased on an analysis by security vendor Kaspersky Lab, more than 2.3 million users encountered ransomware between April 2015 and March, a jump of almost 18 percent over the previous 12 months.<br \/>\nThis includes programs that only lock the computer&#8217;s screen to prevent its use as well as those that hold the data itself hostage by encrypting it &#8212; the so-called cryptors.<br \/>\nThe rise of cryptors in particular has been significant, accounting for 32 percent of all ransomware attacks last year compared to only 7 percent the year before, according to Kaspersky Lab.<br \/>\nThe number of users hit by crypto ransomware during the period studied grew 5.5 times to reach more than 700,000, while the number of corporate users in particular who encountered such threats rose from 27,000 to 159,000 &#8212; an almost six-fold increase.<br \/>\nThe number of users hit by crypto ransomware during the period studied grew 5.5 times to reach more than 700,000, while the number of corporate users in particular who encountered such threats rose from 27,000 to 159,000 &#8212; an almost six-fold increase.<br \/>\nIn some countries, like Italy and Germany, crypto-ransomware accounted for around 90 percent of all ransomware attacks last year, whereas the year before it was under 10 percent.<br \/>\nBacking up critical data regularly to offline or offsite locations that are not permanently accessible from endpoint computers is the best way to prevent being extorted by ransomware creators.<br \/>\nTraining users on how to recognize phishing emails and keeping software on computers up to date, especially browser plug-ins, is also very important.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fa9a237cd2&#038;e=20056c7556<\/p>\n<p>Five Reasons Why Classification Is the First Step to Successful Data-Loss Prevention<br \/>\n1 Data Security Is a Business Problem That Technology Alone Cannot Solve<br \/>\n2 Classification Fosters a Security Culture<br \/>\n3 DLP Systems Must Know the Data to Know How to Manage It<br \/>\n4 DLP Works Best on Known Threats<br \/>\n5 Additional Benefits of Classification<br \/>\nAlthough data-loss prevention systems are extremely powerful and useful in the bid to keep private data private, the technology alone won\u2019t guarantee success.<br \/>\nBy empowering users to classify their data, it\u2019s possible to foster a culture of security awareness.<br \/>\nProviding classification definitions and clear feedback makes it easy for users to correctly apply the right classification, which helps the DLP to enforce the correct handling policy.<br \/>\nThe application of classification markings to the document or email provides an extra reminder to staff, resulting in greater attention to security and fewer errors.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b38bc3e417&#038;e=20056c7556<\/p>\n<p>Cybersecurity: Why do we spend more but get less?<br \/>\nThere are two reasons:<\/p>\n<p>We have an archaic view on security.<br \/>\nWe are spending money on the wrong things<br \/>\nThe problem is that once a threat is past the mouth of the cave, or the castle wall, or our firewall, it is usually free to roam at will without further challenge.<br \/>\nIt is a single point of protection and a single point of failure.<br \/>\nOur view of security, i.e. protecting something behind a stronger, higher, thicker wall is flawed.<br \/>\nIt didn\u2019t work in the Middle Ages.<br \/>\nIt didn\u2019t work in Berlin.<br \/>\nIt isn\u2019t working in Israel.<br \/>\nIt isn\u2019t working on the American-Mexican border, and it doesn\u2019t work for our networks.<br \/>\nThe idea is just archaic and it doesn\u2019t work.<br \/>\nWhich brings us to the second point.<br \/>\nWe are spending money on stronger, thicker, higher walls in the form of better firewalls.<br \/>\nBut an analysis of breaches shows us that very few breaches are the fault of a weak firewall.<br \/>\nIn fact, the Ponemon Institure 2016 Cost of Data Breach: Global Analysis reveals that 25% of breaches are due to human error.<br \/>\nSomeone clicked on a phishing attempt.<br \/>\nSomeone left a web session open with admin rights.<br \/>\nSomeone inadvertently exposed a record set while doing testing.<br \/>\nThe salient point is that each of the preceding examples started with the word \u201csomeone\u201d.<br \/>\nThe problem is people.<br \/>\nSecurity is not a technology problem; it is a people problem.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=10e44aa0f6&#038;e=20056c7556<\/p>\n<p>Metadata as a Divining Rod for Security<br \/>\nMetadata is data about data.<br \/>\nUsing the telephone network as an analogy, metadata more closely resembles a phone bill than a recording.<br \/>\nIt doesn\u2019t allow for continual analysis but can still provide rich detail, as well as summarizing hours of conversation (or data) in just a few lines.<br \/>\nA phone bill can show who\u2019s been talking to whom, at what time, for how long, from where, to where, everything but the content of the phone call itself.<br \/>\nLooking at a phone bill, it\u2019s easy to check for interesting patterns.<br \/>\nFor instance, frequent calls to the same number, calls at odd hours or to and from unusual locations, calls that are very long.<br \/>\nEach of these can serve as clues that help to narrow investigations to only the most relevant conversations.<br \/>\nThe same principle can be applied to security.<br \/>\nProviding security tools with summary takes of the packet data traversing networks, metadata can become a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy.<br \/>\nIn the future, it simply won\u2019t be possible for security appliances to conduct all of the security functions required to find bad actors moving in high-bandwidth links.<br \/>\nHowever, the job of the security appliance becomes more manageable if it can focus on analyzing the relevant data and this is where metadata comes in.<br \/>\nThis small but mighty as yet unleveraged security super power can help accelerate time to detection and expedite response to breaches by enabling SIEMs, forensic solutions, and other big data security analytics technologies to approximate where in the network data breaches may have occurred.<br \/>\nSummary information or metadata can provide valuable clues to lingering threats inside networks.<br \/>\nBehavioral and security analytics using metadata gives organizations an approximation of the location of hot spots or areas of suspected threat activity \u2013 much like a divining rod points its user in the direction of water.<br \/>\nRather than searching the entire network, security analysts can focus on the identified trouble spots and conduct a more thorough investigation by using traffic or packet analysis.<br \/>\nConsider the example of a DNS request made by a laptop to a suspicious server.<br \/>\nMetadata flags the anomalous request.<br \/>\nThen using tools capable of deep inspection security pros can examine all connectivity to and from that device to ascertain if the endpoint is indeed infected, whether it has forwarded malicious data and what other devices might be implicated.<br \/>\nSo in the not too distant future, ensuring that security models and analytic processes are informed by not only lots of data, but the right data, will be key to making threat detection pragmatic and effective in high-bandwidth networks.<br \/>\nMetadata is key to that future of effective security and breach detection because it can expedite behavior base-lining as well as anomaly detection making effective big data security analytics a reality for the masses.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=12b0630b6c&#038;e=20056c7556<\/p>\n<p>The SEC Makes Clear There is No Room For Error in Cybersecurity<br \/>\nThe SEC recently agreed to a $1,000,000 settlement of an enforcement action against Morgan Stanley for its failure to have sufficient data security policies and procedures to protect customer data.<br \/>\nThe settlement was significant for its amount.<br \/>\nThe true noteworthiness here, however, lies not in the end result but the implications of how it was reached: (1) the \u201creasonableness\u201d of a company\u2019s data security safeguards shall be judged in hindsight, and (2) almost any data breach could give rise to liability.<br \/>\nThe SEC has left no room for error in making sure that your cybersecurity procedures and controls actually and always work.<br \/>\nThere are some important practical takeaways for companies from this settlement: (1) perform a risk assessment to determine how your organization could suffer from a similar risk (employee transferring corporate information to a personal device); (2) implement an authorization module and other policies and procedures to limit access (and identify unauthorized access) to sensitive information to those who have a legitimate business need; and (3) make sure you audit and test these controls so ensure that they actually work.<br \/>\nAdditionally, CISOs, compliance officers, and in house counsel would be well served to ensure that the story of this enforcement action becomes part of their organization\u2019s data security training as part of the onboarding and annual training process.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=65aedeced0&#038;e=20056c7556<\/p>\n<p>Vulnerability Spotlight: Pidgin Vulnerabilities<br \/>\nThese vulnerabilities were discovered by Yves Younan.<br \/>\nTalos has identified multiple vulnerabilities in the way Pidgin handles the MXit protocol.<br \/>\nThese vulnerabilities fall into the following four categories.<br \/>\n&#8211; Information Leakage<br \/>\n&#8211; Denial Of Service<br \/>\n&#8211; Directory Traversal<br \/>\n&#8211; Buffer Overflow<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=63189c2ae1&#038;e=20056c7556<\/p>\n<p>Where does your cloud data live? 3 questions to ask<br \/>\ncloud data liveThere\u2019s a common thread behind every security pro\u2019s cloud-related fears: control.<br \/>\nWhether your company\u2019s infrastructure revolves around a cloud-centric strategy or regulates cloud projects to a minor scale, the same security concerns dominate every interaction an organization could have with cloud services.<br \/>\nOnce your data is sent to a cloud provider, or an SaaS vendor using a cloud-hosted application, that company owns your information \u2013 on your end, good faith is all that can ensure its security.<br \/>\nRecently, a report from Blue Coat Systems\u2019 Elastica Cloud Threat Labs examined data from 63 million documents stored in major cloud applications, such as Microsoft Office 365, Google Drive, Salesforce and Box.<br \/>\nThe team found that one in 10 of the documents contained sensitive data \u2013 such as personally identifiable information, source code, health and financial information, and more.<br \/>\nThe report also highlighted the top three security threats facing organizations that use cloud apps: data theft, data destruction and account takeovers.<br \/>\nOrganizations using the cloud in any capacity can use the above findings as a guide for protecting data.<br \/>\nTo begin, ask the below questions at the start of any new cloud project.<br \/>\n1- Can my SaaS provider destroy sensitive data?<br \/>\n2- Are we overlooking sensitive information in our data?<br \/>\n3- Will my cloud provider\u2019s security measures negate the intended cost savings of the cloud?<br \/>\nThere\u2019s no reason to fear the cloud \u2013 but there\u2019s also no reason to dive into a cloud project with the intention of cutting IT costs, only to sacrifice the security or privacy of your data.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9f369627d8&#038;e=20056c7556<\/p>\n<p>Supporting the IT edge is expensive, full of potential security risks<br \/>\nOrganizations are facing multiple challenges when managing the IT edge \u2013 at remote and branch offices.<br \/>\nA Riverbed survey asked IT professionals about the various challenges they face in provisioning and managing remote and branch offices (ROBOs) and found supporting the IT edge was expensive, resource-intensive and full of potential data security risks.<br \/>\nThe top three challenges of managing ROBOs in order of importance are:<br \/>\n1- Handling ROBO disaster recovery (54%)<br \/>\n2- High costs of providing ROBO IT (46%)<br \/>\n3- Providing adequate IT staff to support ROBOs (46%)<br \/>\nThe survey also found that respondents would like alternative options to storing data generated at remote office locations locally in the ROBO.<br \/>\nWhen data is stored locally on physical servers in remote facilities or branch offices, it is especially susceptible to security risks, such as theft, human error or natural disasters.<br \/>\nNot surprisingly, three quarters (75%) of respondents said that it would be \u201csomewhat to extremely desirable\u201d to store their remote data in the data center or in the cloud.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=82361afb59&#038;e=20056c7556<\/p>\n<p>VoIP Vulnerabilities: Protecting Against Evolving Threats<br \/>\nSecurity is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.<br \/>\nIn addition, the use of cloud-based communications is growing rapidly, but according to the a 2015 PwC global information security survey, only 50% of businesses have a security strategy in place for cloud computing.<br \/>\nThis same research showed that information security incidents increased 45% over the previous year.<br \/>\nAs cyberattacks evolve, organizations must fully understand the different types of threats in order to combat them effectively.<br \/>\nModern threats fall into four main categories.<br \/>\nData predators are crafty, but not completely original, and they utilize one or more of these methods of attack.<br \/>\n&#8211; Call Fraud<br \/>\n&#8211; Malware &#038; Viruses<br \/>\n&#8211; Denial of Service (DoS)<br \/>\n&#8211; Call Hijacking &#038; VoIP Tampering<br \/>\nNetwork security threats are constantly evolving and protection measures must advance similarly.<br \/>\nSafeguarding proprietary business information and sensitive customer data should always remain paramount.<br \/>\nCustomer, employee, and internal records data remain top targets of cyberattacks, and the damage to brand reputation climbed 81%, as PwC reported.<br \/>\nBusinesses must be vigilant in order to avoid costly and inconvenient security breaches.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=de1e2b1c10&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=4161783f11)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * Think tanks mull Geneva Convention for cybercrime * IT Governance urges law firms to adopt information security practices to avoid surge in ransomware attacks * Rising cybercrime costing companies millions *&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1240","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1240"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1240\/revisions"}],"predecessor-version":[{"id":3727,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1240\/revisions\/3727"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}