{"id":53479,"date":"2022-04-20T10:45:16","date_gmt":"2022-04-20T14:45:16","guid":{"rendered":"https:\/\/www.sogolytics.com\/blog\/?p=53479"},"modified":"2022-04-20T22:46:42","modified_gmt":"2022-04-21T02:46:42","slug":"cybsersecurity-responsibility","status":"publish","type":"post","link":"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/","title":{"rendered":"Ensuring Cybersecurity: Whose Job is it Anyway?"},"content":{"rendered":"<p>When you&#8217;re looking at cybersecurity from a company perspective, responsibility usually falls under the purview of the Chief Information Officer (CIO).\u00a0However, millions of SMBs throughout the USA depend on their general staff to handle multiple tasks, cybersecurity challenges included.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>The idea that enterprise-scale specialists can solve everyone&#8217;s hacker problems is unrealistic. For one thing, not every business has a CIO, and for another, even in businesses where the CIO plays a pivotal role, is it fair to shift 100% of the responsibility onto their shoulders?<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Let&#8217;s explore why there&#8217;s so much more to cybersecurity (and its challenges) today than ever before.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>Remote Working<\/h2>\n<p>Corporations have latched on to the remote work revelation that changed the lifestyles of millions. Office workers in every industry have shifted seamlessly into being just as effective from home offices. From the employee viewpoint, this means freedom and flexibility.\u00a0<a href=\"https:\/\/www.cepro.com\/news\/study-finds-link-between-cybersecurity-attacks-and-remote-work-technology\/#:~:text=According%20to%20the%20research%2C%20over,67%25)%20targeting%20remote%20employees.\" target=\"_blank\" rel=\"noopener\">However, it&#8217;s a hot mess from a cybersecurity viewpoint<\/a>, having turned everything upside down.<\/p>\n<div class=\"div-spacer\"><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-53482\" src=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-marcus-aurelius-4064698-1024x682.jpg\" alt=\"cybersecurity issues in remote work\" width=\"1024\" height=\"682\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-marcus-aurelius-4064698-1024x682.jpg 1024w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-marcus-aurelius-4064698-300x200.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-marcus-aurelius-4064698-768x512.jpg 768w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-marcus-aurelius-4064698-600x400.jpg 600w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-marcus-aurelius-4064698-50x33.jpg 50w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-marcus-aurelius-4064698.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<div class=\"div-spacer\"><\/div>\n<p>Security barriers installed by IT departments in the company office may have effectively deflected hacker attacks. But how does that matter now that cyber-criminals know all they have to do is breach home internet\/Wi-Fi protections? The latter, by comparison, are amateurish at best!<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>In fact, the study above adds plenty of points to a growing list of reasons why remote working has become a significant cybersecurity challenge:<\/p>\n<div class=\"div-minispacer\"><\/div>\n<ul>\n<li>Devices that were previously contained within secure company premises (like laptops and desktop computers) are now in employees&#8217; homes.<\/li>\n<li>More than 50% of home office devices deployed for company business are staff-owned.<\/li>\n<li>Internet communications, online access to documents, team interactions &#8211; previously centrally controlled &#8211; are now spread far and wide.<\/li>\n<li>71% of security leaders have no insight into the home office networks or adherence to security protocols.<\/li>\n<li>Many employees using mobile devices for company tasks tend to work from Starbucks and other similar locations that have no Wi-Fi firewalls.<\/li>\n<\/ul>\n<p>The challenges above only touch the surface. Home cybersecurity protections, in general, can never pass a professional CIO&#8217;s standards. For example &#8211; the following are three of numerous items that let bad actors into a company&#8217;s data banks:<\/p>\n<div class=\"div-minispacer\"><\/div>\n<ul>\n<li>Fractured password protocols<\/li>\n<li>Failure to track document flow and access<\/li>\n<li>Opening malware impregnated emails (even inadvertently)<\/li>\n<\/ul>\n<p>Indeed, the CIO&#8217;s job description has expanded dramatically on the remote working front.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Nonetheless, without cooperation from the relocated staff, the hacker defense programs will be a disappointing failure. Even though relatively unsophisticated (versus dedicated IT experts), employees must be willing and ready to uplift digital and internet protections around the house. It probably means embarking on a new experience curve that will add responsibilities to existing job descriptions. In short, there&#8217;s no escaping the need for cohesive teamwork involving everyone.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>Cybersecurity, aside from the remote work challenges<\/h2>\n<p>Early in 2020, around the first appearance of the pandemic, another viral event hit the country &#8211; cyberattacks. It created panic as ransomware mongers brought mega-corporations to their knees.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Indeed, company <a href=\"https:\/\/www.gartner.com\/en\/articles\/6-key-takeaways-from-the-gartner-board-of-directors-survey\" target=\"_blank\" rel=\"noopener\">boards of directors<\/a> (i.e., 88%) raised cyber breaches as a high priority concern and acknowledged that the CIO alone could not counteract them. Moreover, this high concern level was up by over 50% versus five years ago &#8211; a flashing alert if ever there was one.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Even so, things are not moving fast enough &#8211; not by a long shot. Rebalancing\u00a0cybersecurity responsibilities and bringing employees across the board into the arena isn&#8217;t evident in most businesses. Indeed, stakeholders and business leaders involved in strategy development haven&#8217;t taken the time to understand cyber threats fully.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<ul>\n<li>For example, our most valuable asset &#8211; proprietary data &#8211; is under the constant shadow of cloud insecurity.<\/li>\n<li>Cyber-criminals understand that and are relentless in their attacks to steal our records and files, especially when it involves millions of consumers&#8217; ID information.<\/li>\n<li>Yet, C-suite decisions stream through to the lower levels, mostly without considering how these impact the protection of company assets. The agreement to remote working as a mainstream option (noted above) is a case in point.<\/li>\n<\/ul>\n<p>As a first step, <a href=\"https:\/\/www.gartner.com\/en\/articles\/whose-job-is-it-to-manage-cybersecurity-hint-stop-pointing-at-the-cio\" target=\"_blank\" rel=\"noopener\">it&#8217;s vital to appreciate that cybersecurity is bigger than one executive<\/a>\u00a0and more extensive than an entire IT department.<\/p>\n<div class=\"div-spacer\"><\/div>\n<p>Instead, it&#8217;s a shared responsibility that every staff member working around sensitive information and communications should accept. In doing so, here are some things businesses need to keep in mind:<\/p>\n<div class=\"div-minispacer\"><\/div>\n<ul>\n<li>Every business, massive or only employing a few people, must establish a cybersecurity policy that everyone involved can wrap their minds around.<\/li>\n<li>Incorporate an accelerated pace to control zoom conferencing, data storage, and accessing cloud archives.<\/li>\n<li>Ensure the strict implementation of password protocols without exception, and\u00a0encourage employees to learn more about digital safeguards &#8211; a protocol that needs to extend to employees across the board, no matter their location.<\/li>\n<li>Divide things down by short-term and long-term priorities to inject perspective into our thinking.<\/li>\n<\/ul>\n<div class=\"div-spacer\"><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-53483\" src=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-kevin-ku-577585-1024x768.jpg\" alt=\"cybersecurity in business\" width=\"1024\" height=\"768\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-kevin-ku-577585-1024x768.jpg 1024w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-kevin-ku-577585-300x225.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-kevin-ku-577585-768x576.jpg 768w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-kevin-ku-577585-50x38.jpg 50w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-kevin-ku-577585.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<div class=\"div-spacer\"><\/div>\n<h3>Here are some of the pivotal questions driving cybersecurity solutions forward<\/h3>\n<p>Companies must answer the following questions honestly, with forethought, and move heaven and earth to come up with answers that put them to bed:<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p><strong>Question #1: Are businesses making risk-informed decisions taking security implications into account?<\/strong><\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>I daresay that the honest response is a resounding &#8220;no&#8221; for many decision categories. So, do we hold off on the new moves or take the risk if the safeguards are imperfect? Knowing the entrepreneurial spirit, I&#8217;d guess that initiatives go ahead irrespective of the cyber consequences. And this is a significant factor playing into why we are where we are.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>So, a constructive approach would be to:<\/p>\n<div class=\"div-minispacer\"><\/div>\n<ol>\n<li>Begin with personnel professionally employed in the cybersecurity arena.<\/li>\n<li>Then integrate other staff members relevant to the situation.<\/li>\n<li>And use the combined contribution to derive a cyber-protection solution that makes sense.<\/li>\n<\/ol>\n<p><strong>Question #2: Have we done an audit of our security preparedness and evaluated every item in the plan to protect our digital assets?<\/strong><\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Again, the starting point here is the CIO and their teams. They need to provide a transparent picture of the entire security landscape, pinpointing the gaps and highlighting the strengths.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Moreover, a report signifying where employees should integrate into the process &#8211; when, why, and how &#8211; will get the ball rolling quicker. However, a move like this requires earmarking cybersecurity as a fundamental and crucial project so that everyone takes it seriously.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Expect CIOs to point to the critical metrics behind their observations and recommendations when taking this program in hand. Without data supporting changes, it will only lead to heated debate and probably disagreement at the board level!<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p><strong>Question #3: How do we assess and implement security program alterations?<\/strong><\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>You will need input from every department, marketing, sales, production, legal, accounting &#8211; you name it! These divisions, through specialization, see the world differently and have a broad range of interpretations as a result. Still, their feedback is invaluable for strategic directives that cover all critical options, thus impacting the course of events for years to come.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>Conclusion<\/h2>\n<p>It makes sense to initiate a policy that requires shared responsibility for cybersecurity moves. It underlines that there&#8217;s no avoiding an all-embracing theme of combating cyber-criminality together. The emerging vision is as clear as day when one adds in remote working as a viable employment option. The best way of tackling this sometimes overwhelming challenge (shoved at us every time there&#8217;s a cyberattack) is as follows:<\/p>\n<div class=\"div-minispacer\"><\/div>\n<ul>\n<li>Allow the staff to contribute to policy, with the proviso that it affects all parties once implemented.<\/li>\n<li>Outline the drawbacks and benefits, and never forget to attach the costs. The more awareness is created, the better it is for accepting responsibility.<\/li>\n<li>Don&#8217;t underestimate the value of an engaging employee experience (EX). Our staff appreciates the invitation to contribute. It motivates them even more if they see their suggestions coming to fruition. If you openly recognize genuinely innovative concepts, it will undoubtedly boost your company&#8217;s employee loyalty rating.<\/li>\n<\/ul>\n<p>The bottom line is that spreading the cybersecurity responsibility across the business divisions can pay massive dividends. There&#8217;s a double-whammy benefit in that it resolves an urgent strategic obstacle facing every business in 2022 and simultaneously builds staff motivation.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>In other words, management should appreciate that these initiatives offset employee churn. It requires a team effort to integrate new norms into the corporate culture. Sogolytics can help you better understand the voice of your employees, hear their feedback and perspective, and help you follow to ensure that every employee feels heard. This is especially critical when it comes to understanding how remote working impacts cybersecurity, empowering your business to prioritize and address key concerns!<\/p>\n<div class=\"div-spacer\"><\/div>\n<div class=\"div-minispacer\"><\/div>\n<p><a href=\"https:\/\/www.sogolytics.com\/contact-us\/\" target=\"_blank\" rel=\"noopener\"><strong>Contact us<\/strong><\/a> to learn how Sogolytics can add value to your business, empowering a more cohesive work culture to implement measures that keep both your employees and customers secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you&#8217;re looking at cybersecurity from a company perspective, responsibility usually falls under the purview of the Chief Information Officer (CIO).\u00a0However, millions of SMBs throughout the USA depend on their general staff to handle multiple tasks, cybersecurity challenges included. The idea that enterprise-scale specialists can solve everyone&#8217;s hacker problems is unrealistic. For one thing, not every business has a CIO, and for another, even in businesses where the CIO plays a pivotal role, is it fair to shift 100% of the responsibility onto their shoulders? Let&#8217;s explore why there&#8217;s so much more to cybersecurity (and its challenges) today than ever before. Remote Working Corporations have latched on to the remote work revelation that changed the lifestyles of millions. Office workers in every industry have shifted seamlessly into being just as effective from home offices. From the employee viewpoint, this means freedom and flexibility.\u00a0However, it&#8217;s a hot mess from a cybersecurity viewpoint, having turned everything upside down. Security barriers installed by IT departments in the company office may have effectively deflected hacker attacks. But how does that matter now that cyber-criminals know all they have to do is breach home internet\/Wi-Fi protections? The latter, by comparison, are amateurish at best! In fact, the study above adds plenty of points to a growing list of reasons why remote working has become a significant cybersecurity challenge: Devices that were previously contained within secure company premises (like laptops and desktop computers) are now in employees&#8217; homes. More than 50% of home office devices deployed [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":5042,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,156,75],"tags":[702,703,282,417,545,416],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.7.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ensuring Cybersecurity: Whose Job is it Anyway? - Sogolytics Blog<\/title>\n<meta name=\"description\" content=\"Cybersecurity isn&#039;t limited to a single job role -- it&#039;s the responsibility of every employee. Here&#039;s how companies can tackle this new business challenge!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ensuring Cybersecurity: Whose Job is it Anyway? - Sogolytics Blog\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity isn&#039;t limited to a single job role -- it&#039;s the responsibility of every employee. Here&#039;s how companies can tackle this new business challenge!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/\" \/>\n<meta property=\"og:site_name\" content=\"Sogolytics Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-20T14:45:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-21T02:46:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2018\/12\/emp-5.png\" \/>\n\t<meta property=\"og:image:width\" content=\"487\" \/>\n\t<meta property=\"og:image:height\" content=\"714\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gordon Polovin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/\",\"name\":\"Ensuring Cybersecurity: Whose Job is it Anyway? - Sogolytics Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\"},\"datePublished\":\"2022-04-20T14:45:16+00:00\",\"dateModified\":\"2022-04-21T02:46:42+00:00\",\"author\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285\"},\"description\":\"Cybersecurity isn't limited to a single job role -- it's the responsibility of every employee. Here's how companies can tackle this new business challenge!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ensuring Cybersecurity: Whose Job is it Anyway?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/\",\"name\":\"Sogolytics Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285\",\"name\":\"Gordon Polovin\",\"description\":\"With an MBA from the University of the Witwatersrand in South Africa and work with clients and industries in the UK, Europe, Canada, and the US, Gordon's range of experiences make him well suited for the diverse topics and compelling conversations that Sogolytics clients value. Learn more about Gordon on his website.\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/author\/gpolovin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ensuring Cybersecurity: Whose Job is it Anyway? - Sogolytics Blog","description":"Cybersecurity isn't limited to a single job role -- it's the responsibility of every employee. Here's how companies can tackle this new business challenge!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/","og_locale":"en_US","og_type":"article","og_title":"Ensuring Cybersecurity: Whose Job is it Anyway? - Sogolytics Blog","og_description":"Cybersecurity isn't limited to a single job role -- it's the responsibility of every employee. Here's how companies can tackle this new business challenge!","og_url":"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/","og_site_name":"Sogolytics Blog","article_published_time":"2022-04-20T14:45:16+00:00","article_modified_time":"2022-04-21T02:46:42+00:00","og_image":[{"width":487,"height":714,"url":"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2018\/12\/emp-5.png","type":"image\/png"}],"author":"Gordon Polovin","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/","url":"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/","name":"Ensuring Cybersecurity: Whose Job is it Anyway? - Sogolytics Blog","isPartOf":{"@id":"https:\/\/www.sogolytics.com\/blog\/#website"},"datePublished":"2022-04-20T14:45:16+00:00","dateModified":"2022-04-21T02:46:42+00:00","author":{"@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285"},"description":"Cybersecurity isn't limited to a single job role -- it's the responsibility of every employee. Here's how companies can tackle this new business challenge!","breadcrumb":{"@id":"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sogolytics.com\/blog\/cybsersecurity-responsibility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ensuring Cybersecurity: Whose Job is it Anyway?"}]},{"@type":"WebSite","@id":"https:\/\/www.sogolytics.com\/blog\/#website","url":"https:\/\/www.sogolytics.com\/blog\/","name":"Sogolytics Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285","name":"Gordon Polovin","description":"With an MBA from the University of the Witwatersrand in South Africa and work with clients and industries in the UK, Europe, Canada, and the US, Gordon's range of experiences make him well suited for the diverse topics and compelling conversations that Sogolytics clients value. Learn more about Gordon on his website.","url":"https:\/\/www.sogolytics.com\/blog\/author\/gpolovin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/53479"}],"collection":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/comments?post=53479"}],"version-history":[{"count":7,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/53479\/revisions"}],"predecessor-version":[{"id":53490,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/53479\/revisions\/53490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/media\/5042"}],"wp:attachment":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/media?parent=53479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/categories?post=53479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/tags?post=53479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}