{"id":1256,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail55-atl31-mcdlv-net\/"},"modified":"2021-12-30T11:39:03","modified_gmt":"2021-12-30T11:39:03","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail55-atl31-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail55-atl31-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail55.atl31.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.]<br \/>\nAnd so, now the news<\/p>\n<p>* Latest Data Breach Settlement Illustrates Need for Companies to Prioritize Cybersecurity<br \/>\n* Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says<br \/>\n* Got big data? The Cloud Security Alliance offers up 100 best practices<br \/>\n* Privacy Shield data-transfer agreement now covers 200 companies<br \/>\n* Security must be top of the manufacturing agenda<br \/>\n* Security Conferences Abound: Which Should You Attend?<br \/>\n* Fueling secure technology adoption in banks through a robust cyber security framework[India]<br \/>\n* The Hidden Dangers Of &#8216;Bring Your Own Body&#8217;<br \/>\n* Vulnerability Spotlight: Multiple DOS Vulnerabilities Within Kaspersky Internet Security Suite<br \/>\n* Cyberthreats Targeting the Factory Floor<br \/>\n* Don\u2019t Get Stranded without a Data Security Action Plan<\/p>\n<p>Latest Data Breach Settlement Illustrates Need for Companies to Prioritize Cybersecurity<br \/>\nOn Aug. 5, 2016, the New York attorney general, Eric Schneiderman, announced a $100,000 settlement with an e-retailer following an investigation of a data breach that resulted in the potential exposure of more than 25,000 credit card numbers and other personal information.<br \/>\nAccording to the investigation, on Aug. 7, 2014, in an all-too-common scenario, an attacker infiltrated the e-retailer\u2019s website.<br \/>\nNearly one year later, the e-retailer\u2019s merchant bank notified it that fraudulent charges were appearing on customers\u2019 credit card accounts.<br \/>\nThe e-retailer then hired a cybersecurity firm to conduct a forensic investigation, and the malware was discovered and removed from the e-retailer\u2019s website.<br \/>\nBesides the obvious lesson of complying with state data breach notification laws where applicable, the other important lesson is that companies must carefully evaluate how they market the privacy and security of their e-commerce platforms.<br \/>\nFederal and state agencies, like the Federal Trade Commission (FTC) and state attorneys general, have increased their scrutiny of companies\u2019 privacy and cybersecurity representations.<br \/>\nRegulators will also scrutinize companies\u2019 actual cybersecurity practices.<br \/>\nThe FTC has offered some practical advice to guide companies in this regard, some of which we have previously discussed here and here.<br \/>\nBottom line: Companies should prioritize cybersecurity and treat it as an investment rather than a cost.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=eaa5d53c74&#038;e=20056c7556<\/p>\n<p>Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says<br \/>\nA report out by Cybersecurity Ventures predicts global annual cybercrime costs will grow to $6 trillion by 2021.<br \/>\nWhile a $6 trillion estimate might be a little high, \u201ca trillion dollars plus is a real possibility,\u201d says Larry Ponemon, chairman and founder of the Ponemon Institute.<br \/>\nThough this isn\u2019t a number he saw coming down the pipeline. \u201cIf you asked me five or six years ago, I\u2019d fall over,\u201d he says.<br \/>\nThe predicted cybercrime cost takes into account all damages associated with cybercrime including: damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm.<br \/>\nIt does not include the cost incurred for unreported crimes.<br \/>\nThe Cybersecurty Ventures report, which is a compilation of cybercrime statistics from the last year, also predicts that the world\u2019s cyberattack surface will grow an order of magnitude larger between now and 2021.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8135e719b1&#038;e=20056c7556<\/p>\n<p>Got big data? The Cloud Security Alliance offers up 100 best practices<br \/>\nFor companies working with distributed programming frameworks such as Apache Hadoop, for example, the CSA recommends using Kerberos authentication or an equivalent to help establish trust.<br \/>\nCompanies that use nonrelational data stores such as NoSQL databases, meanwhile, are hampered by the fact that such products typically include few robust embedded security features, the report&#8217;s authors say.<br \/>\nFor that reason, they suggest using strong encryption methods such as the Advanced Encryption Standard (AES), RSA, or Secure Hash Algorithm 2 (SHA-256) for data at rest.<br \/>\nAlso included in the report are suggestions for real-time security and compliance monitoring, privacy-preserving analytics, data provenance, cryptographic techniques, and more.<br \/>\nThe handbook is now available as a free download.<br \/>\nMarket researcher Gartner, meanwhile, predicts that the improper use of big data analytics will cause half of all business to experience ethics violations by 2018.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b776006a33&#038;e=20056c7556<\/p>\n<p>Privacy Shield data-transfer agreement now covers 200 companies<br \/>\nCompanies must register with the International Trade Administration of the U.S.<br \/>\nDepartment of Commerce to be covered.<br \/>\nIt&#8217;s a self-certification process, so the ITA is only checking that the forms are filled in correctly, not that companies are necessarily complying with all 13,894 words of the rules.<br \/>\nThe Privacy Shield rules are needed to ensure that EU citizens&#8217; personal information is afforded the same legal protection in the U.S. as required under EU law.<br \/>\nThere are now 200 companies standing behind Privacy Shield, the framework agreement allowing businesses to process the personal information of European Union citizens on servers in the U.S.<br \/>\nSome 5,534 organizations signed up to Safe Harbor before the court ruling came, with the certification status still listed as &#8220;current&#8221; for 3,375 of them.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a336598627&#038;e=20056c7556<\/p>\n<p>Security must be top of the manufacturing agenda<br \/>\nIn order for manufacturers to be fully prepared, embedding security within manufacturing technology at the point of origin and ensuring end-user environments are as secure as possible would be the most effective methods to ensure such vulnerabilities are significantly mitigated.<br \/>\nAs these systems have been traditionally isolated from office network environments and the internet through air-gapping, it is evident that industrial hardware and software was not designed with security in mind, rather, it was intended to function within a closed environment.<br \/>\nWithin modern industries, however, we see an increased demand for real time data and remote access services.<br \/>\nPreviously separate systems are now interconnected with other company networks, exposing the hardware, services and protocols to attackers.<br \/>\nThe popularity of WirelessHART products show a significant shift among manufacturers to integrate and utilise networked technology to increase efficiencies within their businesses.<br \/>\nThe benefits of this technology are undeniable, allowing manufacturers with legacy systems to swiftly and cheaply upgrade their existing systems to a level of productivity arguably comparable to fully digital environments.<br \/>\nFor a business to fully secure its industrial environment, the education of staff on security best practices must become an essential element of day-to-day activities.<br \/>\nA focussed approach to training and awareness enables staff to better understand the threats that affect their work environments \u2013 it is therefore essential for all personnel to fully understand the security risks relevant to their duties, thus minimising the risks associated with a successful cyber-attack.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0c63e3e517&#038;e=20056c7556<\/p>\n<p>Security Conferences Abound: Which Should You Attend?<br \/>\nThere is normally a hiatus in security conferences between September and February that allows those of us who have been drinking from the fire hose to stop and take a breath.<br \/>\nThis breathing space permits us to implement, adjust, engage and otherwise ensure we are where we need to be with respect to securing our data, our clients\u2019 data and our customers\u2019 data.<br \/>\nThe hiatus also gives us the opportunity to decide which security conferences will give us the biggest bang for our buck in terms of education and industry awareness in the coming year.<br \/>\nShmooCon 2017 is a three-day security conference taking place in Washington, D.C. in January 2017.<br \/>\nThe format lends itself to those engaged in maintaining and breaking cybersecurity devices, network and appliances.<br \/>\nThe Cyber Threat Intelligence Summit is a two-day security conference hosted by the SANS Institute in Arlington, Virginia.<br \/>\nFour days of training seminars and classes will precede the conference in late January 2017.<br \/>\nThe RSA Conference is the largest of all the security conferences, to be held in San Francisco in mid-February 2017.<br \/>\nIn the run up to the conference, we will see major vendors release a plethora of new studies and product announcements.<br \/>\nThen there\u2019s a multitude of agnostic and vendor-driven training forums. Many will find the enormous expo areas an excellent means by which to learn about solutions from vendors and receive some introductory training on these tools.<br \/>\nThe International Association of Privacy Professionals (IAPP) hosts a variety of global conferences focused on educating attendees on the broad topic of privacy.<br \/>\nInterConnect is IBM\u2019s premier annual conference for security, cloud and mobile.<br \/>\nThe 2017 event is scheduled for mid-March in Las Vegas and will once again feature more than 2,000 sessions, ranging from deep-dive technical demonstrations to business content to hands-on labs and workshops.<br \/>\nInfoSec World is a security conference and expo scheduled to take place in ChampionsGate, Florida, in April 2017.<br \/>\nThe conference will feature security practitioners who speak from experience on the real-world challenges companies are facing today.<br \/>\nThe international Forum of Incident Response and Security Teams (FIRST) Conference will take place in San Juan, Puerto Rico, in June 2017. Those involved in incident response at the national, local or enterprise level will benefit from attending.<br \/>\nThe Black Hat security conferences are held in Las Vegas each summer and elsewhere in the world (in Asia and Europe) at varying times. According to the organizers, more than two-thirds of attendees are information security professionals with the CISSP distinction. The conference is light on vendor displays and heavy on practical demonstrations of new exploits and discoveries, so it\u2019s definitely a worthwhile event for security professionals and those IT workers on the ground.<br \/>\nDEF CON takes place annually in Las Vegas, and the next conference will occur in late July 2017.<br \/>\nThe organizers bill the conference as \u201cthe hacking conference,\u201d and past attendees will certainly attest to the veracity of this claim.<br \/>\nWhile the aforementioned security conferences are by no means all-inclusive, they are always on this writer\u2019s calendar for consideration.<br \/>\nThey should be on yours as well.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=160547c7a5&#038;e=20056c7556<\/p>\n<p>Fueling secure technology adoption in banks through a robust cyber security framework[India]<br \/>\nThe threat landscape is evolving and in light of increased adoption of technology by banks as a part of the country\u2019s move towards a cashless economy, Reserve Bank of India (RBI) has recently mandated the creation of a Cyber Security Framework to fortify the security postures at banks.<br \/>\nBanks are now mandated to formulate a Cyber Crisis Management Plan (CCMP) which will address the aspects of detection, response, recovery and containment.<br \/>\nSecurity is becoming a part of boardroom agenda across organizations and as rightly recognized by RBI, security should not be an IT-only concern.<br \/>\nReiterating the key role of the CISO in bridging business needs with IT needs, cybersecurity policies should be distinct from an organization\u2019s broader IT policy specifically highlighting the risks from cyber threats and the measures for mitigation.<br \/>\nThe information centric model should include envisioning the information infrastructure, information intelligence, and information governance.<br \/>\nFollowing the advisory by RBI, banks have undergone gap assessments as the initial step and would have submitted the analysis by July 31.<br \/>\nThe roadmap to achieve an all-inclusive cybersecurity infrastructure is going to be perplexing where banks will face challenges pertaining to implementation, costs, investments, organizational arrangements and so on.<br \/>\nHowever, the goal once achieved, will be a huge leap towards a robust, secure banking ecosystem.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c328b15467&#038;e=20056c7556<\/p>\n<p>The Hidden Dangers Of &#8216;Bring Your Own Body&#8217;<br \/>\n1) Who, exactly, has ownership of this data?<br \/>\n2) How should the business manage this data?<br \/>\nThere may not be that much biometric data currently in the average enterprise, but its use is on the rise.<br \/>\nBoth the private and public sectors probably (and legally) have some of your biometric data right now.<br \/>\nIf you\u2019ve ever worked for a government-affiliated organization and achieved any type of security clearance, it has your fingerprint data.<br \/>\nIf you have a US driver\u2019s license &#8212; even if you have no criminal record &#8212; there\u2019s a good chance that the FBI is already analyzing your photo for a facial-recognition database.<br \/>\nThe information that HR departments handle on a regular basis &#8212; Social Security numbers, home addresses, health insurance details, tax information, etc. &#8212; all pose threats to privacy and security that are practically incomparable to traditionally stolen data types such as credit card numbers.<br \/>\nThe key objective for the immediate future is to determine what\u2019s within the realm of control, and how security can be strengthened for the locations where there is most likely to be sensitive items.<br \/>\nThis relatively simple task today will be important for the future, regardless of how common biometric data becomes in business.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d5e397bb4e&#038;e=20056c7556<\/p>\n<p>Vulnerability Spotlight: Multiple DOS Vulnerabilities Within Kaspersky Internet Security Suite<br \/>\nTalos has discovered multiple vulnerabilities in Kaspersky\u2019s Internet Security product which can be used by an attacker to cause a local denial of service attack or to leak memory from any machine running Kaspersky Internet Security software.<br \/>\nThe vulnerabilities affect Kaspersky Internet Security 16.0.0, KLIF driver version 10.0.0.1532, but may affect other versions of the software too.<br \/>\nSince anti-virus software runs with low level privileges on any system, vulnerabilities in these software are potentially very interesting for attackers.<br \/>\nAlthough these vulnerabilities are not particularly severe, administrators should be aware that security systems can be used by threat actors as part of an attack, and keep such systems fully patched.<br \/>\nVulnerabilities discovered by Piotr Bania and Marcin \u2018Icewall\u2019 Noga of Cisco Talos.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b74e7d4d83&#038;e=20056c7556<\/p>\n<p>Cyberthreats Targeting the Factory Floor<br \/>\nCyberattacks targeting manufacturing companies are on the rise, according to a recent report from IBM X-Force Research\u2019s 2016 Cyber Security Intelligence Index.<br \/>\nThe report noted that the sector is the second most-attacked industry behind healthcare.<br \/>\nAutomotive manufacturers were the top targets for criminals, accounting for almost 30% of all cyberattacks in 2015, while chemical companies were attackers\u2019 second-favorite targets.<br \/>\nMost manufacturing companies are behind the curve on security.<br \/>\nThe Sikich report noted that only 33% of the manufacturers it surveyed were performing annual penetration testing within their IT groups.<br \/>\nWhen it comes to ICS networks even less is being done to secure them.<br \/>\nBecause of lax security standards, manufacturers are leaving themselves exposed at every point of their networks.<br \/>\nOne of the biggest security challenges manufacturers face is dealing with the variety of different communication protocols used in ICS networks.<br \/>\nStandard data plane protocols like Modbus and DNP3 are used by HMI\/SCADA\/DCS applications to communicate physical measurements and process parameters such as current temperature, current pressure, valve status, etc.<br \/>\nMeanwhile, the control plane protocols \u2014 which are used to configure automation controllers, update their logic, make code changes, download firmware, etc. \u2014 are proprietary and vendor-specific.<br \/>\nEach vendor uses its own implementation of the IEC-61131 Standard for Programmable Controllers.<br \/>\nThese implementations are rarely documented, making it very difficult to monitor critical activities.<br \/>\nContrary to popular belief, this is not extremely difficult.<br \/>\nOnce inside the network, an attacker can easily download control logic to an industrial controller or change its configuration.<br \/>\nSince these actions are executed using proprietary vendor-specific protocols, there is no standard way to monitor these control plane activities.<br \/>\nAs a result, changes made by an attacker can go unnoticed until damage starts to occur.<br \/>\nGaining visibility into ICS networks is the first step in being able to protect them from cyberthreats.<br \/>\nDiscovering all assets, especially industrial controllers, is critical.<br \/>\nThis includes maintaining a reliable inventory of configurations, logic, code and firmware versions for each controller.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=65611db562&#038;e=20056c7556<\/p>\n<p>Don\u2019t Get Stranded without a Data Security Action Plan<br \/>\nNavigating this increasingly complex maze of requirements from different states while simultaneously combatting data breaches is not an easy task.<br \/>\nThat\u2019s why it\u2019s critical for healthcare providers to prepare a comprehensive data security action plan by following these five steps:<br \/>\n1) Benchmark to identify vulnerabilities<br \/>\n2) Adopt a consistent security posture<br \/>\n3) Evaluate and manage third-party relationships<br \/>\n4) Gain a full understanding of all state and federal regulations<br \/>\n5) Implement a communications strategy to protect your reputation<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b9ce4b3006&#038;e=20056c7556<br \/>\nFeedback, questions? Our mailing address is: dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage2.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=ea42da8dc8)<br \/>\nUpdate subscription preferences (http:\/\/paulgdavis.us3.list-manage1.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<br \/>\n============================================================<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n<p> ()<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul G Davis &#8211; his opinion and no-one else&#8217;s, apart from those of the authors of the articles.] And so, now the news * Latest Data Breach Settlement Illustrates Need for Companies to Prioritize Cybersecurity * Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1256","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1256"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1256\/revisions"}],"predecessor-version":[{"id":3743,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1256\/revisions\/3743"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}