{"id":46,"date":"2019-10-07T07:41:25","date_gmt":"2019-10-07T07:41:25","guid":{"rendered":"http:\/\/digisec360.com\/blog111\/?p=46"},"modified":"2023-02-09T15:56:27","modified_gmt":"2023-02-09T10:26:27","slug":"cyber-safety-for-educational-institutes","status":"publish","type":"post","link":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/","title":{"rendered":"Cyber safety for Educational Institutes"},"content":{"rendered":"\n<p>We often talk about keeping our institutions cyber-safe. The practice starts at home and extends to organizations we are involved with. Yet, some of the institutions fall through the chinks and turn the most vulnerable to an attack from cyber criminals. We are talking about academia, all kinds of educational facilities.&nbsp;<\/p>\n\n\n\n<p>In recent times, statistics point to the fact that educational institutions, all over the world have lost a major amount of data to such attacks. As per the report from Verizon, 53,000 incidents and 2,300 data breaches from 5 countries on educational institutes in year 2018. In this article, we shall discuss the why and how of keeping educational organizations safe from such attacks.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Why?<\/strong><\/p>\n\n\n\n<p>Educational institutes have a very weak cover of cyber protection. This stems from various facts including poor cyber security measures, easy access to networks, massive number of people at one place, abundant personal gadgets at use and very limited availability of trained resources to keep these attacks at bay.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>How?<\/strong><\/p>\n\n\n\n<p>There are various ways in which hackers can pave their way into the Institute\u2019s systems. Some of them being-<\/p>\n\n\n\n<p>\u00b7 DDoS (Distributed Denial of Service), this is a process to bombard the institute\u2019s bandwidth with so many requests that it crashes and no administrator can access the system anymore.<\/p>\n\n\n\n<p>\u00b7 Ransomware involves the usage of a malware which ends up encrypting files until a demand of ransom in the form of digital currency or other formats is fulfilled.<\/p>\n\n\n\n<p>\u00b7 Phishing like in all other cases of cyber-attacks prompts individuals within the organization or related to compromise with their financial information, posing as genuine advisors or authorities.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Reasons<\/strong><\/p>\n\n\n\n<p>The major reasons for an educational institution to be so open to attacks are:<\/p>\n\n\n\n<p>\u00b7 Lack of a strong IT team, which is usually due to the lack of funds. Many a times during sanctioning of annual budgets, cyber security is not something that finds its way into the top of the list.<\/p>\n\n\n\n<p>\u00b7 Massive amount of information that the institutes store which includes tonne loads of student and parental information, credit card data and research data, aid records. This makes them a favoured target.<\/p>\n\n\n\n<p>\u00b7 Open access, which includes open Wi-Fi hotspots and networks and all and sundry carrying their instruments into the campus.<\/p>\n\n\n\n<p>\u00b7 Weak email gateway can also compromise data, it makes it easier for hackers to make use of ransomware and other such devices.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Prevention<\/strong><\/p>\n\n\n\n<p>There are a few immediate steps that can be taken to rule out breach of data.<\/p>\n\n\n\n<p>&nbsp;&#8211; It\u2019s an academic institute, do what they do best, teach. Making the organization, cyber aware. All students, teaching and non-teaching staff need to have the basic knowledge to keep their own and the institutions\u2019 data safe. This includes inculcating a culture of knowledge, against phishing and other malicious cyber invasions. While technology is absolutely necessary given the sheer quantity of data, it\u2019s the people aspect of security that makes the difference.<\/p>\n\n\n\n<p>&nbsp;&#8211; Invest in cyber security by employing a dedicated taskforce and good practices.<\/p>\n\n\n\n<p>&nbsp;&#8211; Have exercises in place to review the security measures, periodically. E.g. Security Vulnerability Assessment and penetration testing of digital assets.<\/p>\n\n\n\n<p>&nbsp;&#8211; Keep evolving as the threats do. Make all networks secure and closed to access to anyone not involved with the organization.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Educational institutes give so much importance to safety and security of students. Wouldn\u2019t it be a disgrace to have lost the data associated with the very students you want kept safe? Just like we employ strict security professionals and methods to keep the gates of a institute safe, in the same manner cyber security too needs a task force to keep invisible attacks away.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>At DigiSec360 we provide customized cybersecurity solutions for educational institutes. We have already conducted cybersecurity awareness workshops for students and staff of prominent institutes. We help implement cybersecurity programs which helps educational institutes mitigate cyber-threats.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>If interested, please get in touch with us:&nbsp;<a href=\"mailto:contact@digisec360.in\">contact@digisec360.in<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We often talk about keeping our institutions cyber-safe. The practice starts at home and extends [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":47,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[4],"tags":[7,20,21],"class_list":["post-46","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity","tag-databreach","tag-securedata"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber safety for Educational Institutes - Blog | DigiSec360<\/title>\n<meta name=\"description\" content=\"Cyber safety for Educational Institutes - Blog | DigiSec360\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber safety for Educational Institutes - Blog | DigiSec360\" \/>\n<meta property=\"og:description\" content=\"Cyber safety for Educational Institutes - Blog | DigiSec360\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | DigiSec360\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/digisec360\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-07T07:41:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-09T10:26:27+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/31784500_1570435016.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1300\" \/>\n\t<meta property=\"og:image:height\" content=\"1191\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DSec360\" \/>\n<meta name=\"twitter:site\" content=\"@DSec360\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#\\\/schema\\\/person\\\/90062614cebf65c6d526c7bde8e40a76\"},\"headline\":\"Cyber safety for Educational Institutes\",\"datePublished\":\"2019-10-07T07:41:25+00:00\",\"dateModified\":\"2023-02-09T10:26:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/\"},\"wordCount\":662,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/31784500_1570435016.jpg\",\"keywords\":[\"cybersecurity\",\"databreach\",\"securedata\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/\",\"name\":\"Cyber safety for Educational Institutes - Blog | DigiSec360\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/31784500_1570435016.jpg\",\"datePublished\":\"2019-10-07T07:41:25+00:00\",\"dateModified\":\"2023-02-09T10:26:27+00:00\",\"description\":\"Cyber safety for Educational Institutes - Blog | DigiSec360\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/31784500_1570435016.jpg\",\"contentUrl\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/31784500_1570435016.jpg\",\"width\":1300,\"height\":1191,\"caption\":\"Cyber safety for Educational Institutes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/cyber-safety-for-educational-institutes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber safety for Educational Institutes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/\",\"name\":\"Blog | DigiSec360\",\"description\":\"The Human Element of Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#organization\",\"name\":\"DigiSec360\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/cropped-digisec360.png\",\"contentUrl\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/cropped-digisec360.png\",\"width\":1484,\"height\":441,\"caption\":\"DigiSec360\"},\"image\":{\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/digisec360\\\/\",\"https:\\\/\\\/x.com\\\/DSec360\",\"https:\\\/\\\/www.instagram.com\\\/dsec360\\\/\",\"https:\\\/\\\/in.linkedin.com\\\/company\\\/digisec360\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/#\\\/schema\\\/person\\\/90062614cebf65c6d526c7bde8e40a76\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\\\/\\\/digisec360.com\\\/blog111\"],\"url\":\"https:\\\/\\\/digisec360.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber safety for Educational Institutes - Blog | DigiSec360","description":"Cyber safety for Educational Institutes - Blog | DigiSec360","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/","og_locale":"en_US","og_type":"article","og_title":"Cyber safety for Educational Institutes - Blog | DigiSec360","og_description":"Cyber safety for Educational Institutes - Blog | DigiSec360","og_url":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/","og_site_name":"Blog | DigiSec360","article_publisher":"https:\/\/www.facebook.com\/digisec360\/","article_published_time":"2019-10-07T07:41:25+00:00","article_modified_time":"2023-02-09T10:26:27+00:00","og_image":[{"width":1300,"height":1191,"url":"http:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/31784500_1570435016.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@DSec360","twitter_site":"@DSec360","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/#article","isPartOf":{"@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/"},"author":{"name":"admin","@id":"https:\/\/digisec360.com\/blog\/#\/schema\/person\/90062614cebf65c6d526c7bde8e40a76"},"headline":"Cyber safety for Educational Institutes","datePublished":"2019-10-07T07:41:25+00:00","dateModified":"2023-02-09T10:26:27+00:00","mainEntityOfPage":{"@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/"},"wordCount":662,"commentCount":0,"publisher":{"@id":"https:\/\/digisec360.com\/blog\/#organization"},"image":{"@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/#primaryimage"},"thumbnailUrl":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/31784500_1570435016.jpg","keywords":["cybersecurity","databreach","securedata"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/","url":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/","name":"Cyber safety for Educational Institutes - Blog | DigiSec360","isPartOf":{"@id":"https:\/\/digisec360.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/#primaryimage"},"image":{"@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/#primaryimage"},"thumbnailUrl":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/31784500_1570435016.jpg","datePublished":"2019-10-07T07:41:25+00:00","dateModified":"2023-02-09T10:26:27+00:00","description":"Cyber safety for Educational Institutes - Blog | DigiSec360","breadcrumb":{"@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/#primaryimage","url":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/31784500_1570435016.jpg","contentUrl":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/31784500_1570435016.jpg","width":1300,"height":1191,"caption":"Cyber safety for Educational Institutes"},{"@type":"BreadcrumbList","@id":"https:\/\/digisec360.com\/blog\/cyber-safety-for-educational-institutes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digisec360.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber safety for Educational Institutes"}]},{"@type":"WebSite","@id":"https:\/\/digisec360.com\/blog\/#website","url":"https:\/\/digisec360.com\/blog\/","name":"Blog | DigiSec360","description":"The Human Element of Cybersecurity","publisher":{"@id":"https:\/\/digisec360.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digisec360.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digisec360.com\/blog\/#organization","name":"DigiSec360","url":"https:\/\/digisec360.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digisec360.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/cropped-digisec360.png","contentUrl":"https:\/\/digisec360.com\/blog\/wp-content\/uploads\/2023\/02\/cropped-digisec360.png","width":1484,"height":441,"caption":"DigiSec360"},"image":{"@id":"https:\/\/digisec360.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/digisec360\/","https:\/\/x.com\/DSec360","https:\/\/www.instagram.com\/dsec360\/","https:\/\/in.linkedin.com\/company\/digisec360"]},{"@type":"Person","@id":"https:\/\/digisec360.com\/blog\/#\/schema\/person\/90062614cebf65c6d526c7bde8e40a76","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d978db6a99de6f62acb7f58d8e218f3a708d0b955d9cb126243f1dc6e21c6627?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/digisec360.com\/blog111"],"url":"https:\/\/digisec360.com\/blog\/author\/admin\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/posts\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":2,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/posts\/46\/revisions"}],"predecessor-version":[{"id":102,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/posts\/46\/revisions\/102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/media\/47"}],"wp:attachment":[{"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/media?parent=46"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/categories?post=46"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digisec360.com\/blog\/wp-json\/wp\/v2\/tags?post=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}