{"id":53524,"date":"2022-04-26T10:51:36","date_gmt":"2022-04-26T14:51:36","guid":{"rendered":"https:\/\/www.sogolytics.com\/blog\/?p=53524"},"modified":"2022-04-26T22:51:55","modified_gmt":"2022-04-27T02:51:55","slug":"how-to-guarantee-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/","title":{"rendered":"How to Guarantee 100% Cybersecurity [or at least come close]"},"content":{"rendered":"<p>When a company falls victim to a ransomware attack, it&#8217;s not only the money management has to pay the perpetrators to remove their criminal encryption that hurts. It&#8217;s the crippling downtime, demotivated staff, sales dislocation for days, maybe weeks, and worse that impacts morale. Adding salt to the injury, authorities are usually helpless because the hackers live outside the country!<\/p>\n<div class=\"div-spacer\"><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-53528\" src=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/max-duzij-qAjJk-un3BI-unsplash-1024x683.jpg\" alt=\"cybersecurity tips\" width=\"1024\" height=\"683\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/max-duzij-qAjJk-un3BI-unsplash-1024x683.jpg 1024w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/max-duzij-qAjJk-un3BI-unsplash-300x200.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/max-duzij-qAjJk-un3BI-unsplash-768x512.jpg 768w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/max-duzij-qAjJk-un3BI-unsplash-600x400.jpg 600w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/max-duzij-qAjJk-un3BI-unsplash-50x33.jpg 50w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/max-duzij-qAjJk-un3BI-unsplash.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<div class=\"div-spacer\"><\/div>\n<p>Cybersecurity, or rather, &#8220;cyber-insecurity&#8221;, has become a key cause of concern for businesses across industries. So, how do we as business owners, professionals, and individuals protect our identities and data from cyber-criminals?<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>&#8220;Throw enough money at the problem &#8211; that should do the trick.&#8221; Many business leaders believe this to be true. Until, of course, it&#8217;s far too late.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Indeed, contrary to popular opinion, it&#8217;s not money or extraordinary IT expertise that can solve our problems. Instead, it&#8217;s just an awareness of the critical pitfalls that leave open us to cyber attacks &#8211; and then taking action to resolve them &#8211; that does the trick.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>You can reduce the <a href=\"https:\/\/www.gartner.com\/en\/articles\/the-top-8-cybersecurity-predictions-for-2021-2022\" target=\"_blank\" rel=\"noopener\">risk of cyberattacks<\/a> by addressing the following leading causes of failure within your organization.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>1. Hardware mismanagement<\/h2>\n<p>Management&#8217;s failure to be proactive regarding the computer systems is a cardinal error. It begins with the supply chain, knowing who&#8217;s selling you components, spares, and refurbished devices. It means that the sources need to have the proper credentials to demonstrate the expected security around the hardware they send your way. However, it&#8217;s a common pitfall to overlook these aspects only to find imported viruses contaminating your systems. So, adopt vigilance from the original manufacturer to all hardware warehousing and distributor stops.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>The first thing hackers look for are old systems. Why? Because it&#8217;s easiest pick the low-hanging fruit. The older, the better because the firewalls are fewer and, in many cases, a cinch to smash through. The stark reality is that you&#8217;re inviting bad actors into the fold when the supply chain is &#8220;iffy&#8221; and outdated devices prevail. Management&#8217;s most significant failure is assuming that yesterday&#8217;s technology can address today&#8217;s challenges.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>2. Cultural disconnect<\/h2>\n<p>Business leaders come from all walks of life, and therefore it applies that not all of them will have a solid background in IT. While this wasn&#8217;t always a critical concern, the tables have turned today, and IT is at the forefront of global business &#8211; especially as businesses not only look to appeal to audiences across the world, but also have employees from across the world!<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Unfortunately, lacking this background can result in a critical disconnect of priorities, especially when strategic decisions need to be made. cybersecurity, in such instances, isn&#8217;t always prioritized.<\/p>\n<div class=\"div-spacer\"><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-53530\" src=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-cottonbro-5483064-1024x683.jpg\" alt=\"cybersecurity tips\" width=\"1024\" height=\"683\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-cottonbro-5483064-1024x683.jpg 1024w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-cottonbro-5483064-300x200.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-cottonbro-5483064-768x512.jpg 768w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-cottonbro-5483064-600x400.jpg 600w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-cottonbro-5483064-50x33.jpg 50w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/pexels-cottonbro-5483064.jpg 1279w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<div class=\"div-spacer\"><\/div>\n<p>Decision-makers aren&#8217;t aware of their cyber vulnerabilities. Instead, it becomes a case of the bystander effect, wherein they assume someone else will take lead on this instead. Except it doesn&#8217;t quite work like that. More likely, if there&#8217;s already fragility in the systems, more overload will make it worse, opening the doors to a host of viruses and breakdowns. Put it down to a cultural disconnect between the C-suite executives, the CIOs and their teams, and everyone else in between.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>3. Misunderstanding the cloud<\/h2>\n<p>Cloud vendors talk a great cybersecurity game, but if an attacker compromises your customer&#8217;s data (or your own), it&#8217;s your problem. If fines kick in, you are liable. If the ransomware attack impacts your data, the servers won&#8217;t be coming to your aid.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>So, even as you&#8217;re placing your data on the cloud, don&#8217;t assume you are protected from cloud data attacks.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>However, now that we&#8217;ve covered all the concerns, the good news is that cloud vendors invest hundreds of millions of dollars to shore up the space from cyberattacks. For example, <a href=\"https:\/\/www.forbes.com\/sites\/kalevleetaru\/2018\/04\/03\/the-cloud-is-rising-to-the-cybersecurity-challenge\/#c64cbde67bac\" target=\"_blank\" rel=\"noopener\">Google offers a Cloud Security Command Center<\/a> to scan for cracks in the cloud fabric. Likewise, Amazon and Microsoft have constructed numerous software applications to erase vulnerabilities. However, organized crime in cyberspace is a massive business, and the perpetrators are technologically resourceful. So, despite the default protections provided by vendors, the final responsibility for security is yours.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>The most common <a href=\"https:\/\/www.forbes.com\/sites\/kalevleetaru\/2018\/04\/03\/the-cloud-is-rising-to-the-cybersecurity-challenge\/?sh=34abe8fa67ba\" target=\"_blank\" rel=\"noopener\">data breach<\/a> causes on the cloud are (1) confusing access to storage resources and (2) failure to update security protocols and records as people move in and out of the business.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>For example, terminating an employee (or accepting a resignation) should align with the return of all company devices and removing access to cloud files. Yet, a reliable study indicates that <a href=\"https:\/\/www.ekransystem.com\/en\/blog\/data-theft-by-dearting-employees#:~:text=Departing%20employees%20are%20a%20source,employees%20steal%20data%20when%20leaving.\" target=\"_blank\" rel=\"noopener\">25% of departing employees steal confidential data on exit<\/a>. Of course, these lapses are easily resolvable &#8211; in theory. But if the described carelessness prevails in practice, the damage can be devastating.<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>4. Remote working<\/h2>\n<p>No article about modern cybersecurity is complete without talking about remote work. Remote working opens up a proverbial tsunami of digital traps and threats. Working in the office under centralized IT protections is one thing. Allowing thousands of employees to disperse overnight to home offices, taking company devices with them, is quite another.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>There\u2019s no comparison to the security standards maintained in your office versus those at home. However, here are the common remote-working security gaps that companies need to keep in mind:<\/p>\n<div class=\"div-minispacer\"><\/div>\n<ul>\n<li>Employees tend to work from locations with little to no Wi-Fi security (think Starbucks). Add to this the loss of devices, and accessing files with looser restrictions to accommodate the remote scenario and you have entered the ideal playground for hackers!<\/li>\n<\/ul>\n<div class=\"div-minispacer\"><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-53529\" src=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/franck-DoWZMPZ-M9s-unsplash-1024x768.jpg\" alt=\"cybersecurity tips\" width=\"1024\" height=\"768\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/franck-DoWZMPZ-M9s-unsplash-1024x768.jpg 1024w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/franck-DoWZMPZ-M9s-unsplash-300x225.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/franck-DoWZMPZ-M9s-unsplash-768x576.jpg 768w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/franck-DoWZMPZ-M9s-unsplash-50x38.jpg 50w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2022\/04\/franck-DoWZMPZ-M9s-unsplash.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<div class=\"div-spacer\"><\/div>\n<ul>\n<li><a href=\"https:\/\/www.cepro.com\/news\/study-finds-link-between-cybersecurity-attacks-and-remote-work-technology\/#:~:text=According%20to%20the%20research%2C%20over,67%25)%20targeting%20remote%20employees.\" target=\"_blank\" rel=\"noopener\">According to a research study<\/a>, more than 50% of remote workers use personal devices to access cloud-based data.<\/li>\n<\/ul>\n<div class=\"div-minispacer\"><\/div>\n<ul>\n<li>To top it all, over 66% of CIOs and IT teams have no visibility of home networks. As a result, the majority of cyber-attacks are hitting remote workers (i.e., around two-thirds of all those recorded in the last year).<\/li>\n<\/ul>\n<div class=\"div-minispacer\"><\/div>\n<p>No doubt, the pandemic forced the shift to a remote working environment on us. However, companies needed to simultaneously trigger rapid action on the cybersecurity front to help employees upgrade their home protections. Indeed, this would requires massive revisions in IT policy and deploying specialists to elevate oversight standards &#8211;\u00a0 but it is the need of the hour and the next big business challenge!<\/p>\n<div class=\"div-spacer\"><\/div>\n<h2>Conclusion<\/h2>\n<p>When it comes to cybersecurity, these are the most common pitfalls businesses need to address. While some take time, others are overnight fixes that can save you plenty of headaches to come. However, not every business has the exact same security lapses and concerns. So reach out to your employees to better understand which practices you follow (or don&#8217;t) and ensure that the right challenges are addressed.<\/p>\n<div class=\"div-minispacer\"><\/div>\n<p>Sogolytics can help you better connect with your people, increase your response rate, and ensure candid feedback that helps you identify and address your organization&#8217;s specific concerns! Want to learn more? <a href=\"https:\/\/www.sogolytics.com\/contact-us\/\" target=\"_blank\" rel=\"noopener\">Let&#8217;s connect<\/a> to discuss how we can help!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When a company falls victim to a ransomware attack, it&#8217;s not only the money management has to pay the perpetrators to remove their criminal encryption that hurts. It&#8217;s the crippling downtime, demotivated staff, sales dislocation for days, maybe weeks, and worse that impacts morale. Adding salt to the injury, authorities are usually helpless because the hackers live outside the country! Cybersecurity, or rather, &#8220;cyber-insecurity&#8221;, has become a key cause of concern for businesses across industries. So, how do we as business owners, professionals, and individuals protect our identities and data from cyber-criminals? &#8220;Throw enough money at the problem &#8211; that should do the trick.&#8221; Many business leaders believe this to be true. Until, of course, it&#8217;s far too late. Indeed, contrary to popular opinion, it&#8217;s not money or extraordinary IT expertise that can solve our problems. Instead, it&#8217;s just an awareness of the critical pitfalls that leave open us to cyber attacks &#8211; and then taking action to resolve them &#8211; that does the trick. You can reduce the risk of cyberattacks by addressing the following leading causes of failure within your organization. 1. Hardware mismanagement Management&#8217;s failure to be proactive regarding the computer systems is a cardinal error. It begins with the supply chain, knowing who&#8217;s selling you components, spares, and refurbished devices. It means that the sources need to have the proper credentials to demonstrate the expected security around the hardware they send your way. However, it&#8217;s a common pitfall to overlook these aspects only to find imported [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":5049,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,75],"tags":[198,702,703,545],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.7.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Guarantee 100% Cybersecurity [or at least come close] - Sogolytics Blog<\/title>\n<meta name=\"description\" content=\"Want to secure your organization against cyber-attacks? Here are the common pitfalls you need to be aware of (and bridge) to improve your security!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Guarantee 100% Cybersecurity [or at least come close] - Sogolytics Blog\" \/>\n<meta property=\"og:description\" content=\"Want to secure your organization against cyber-attacks? Here are the common pitfalls you need to be aware of (and bridge) to improve your security!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Sogolytics Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T14:51:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-27T02:51:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2018\/12\/focus.png\" \/>\n\t<meta property=\"og:image:width\" content=\"487\" \/>\n\t<meta property=\"og:image:height\" content=\"714\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gordon Polovin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/\",\"name\":\"How to Guarantee 100% Cybersecurity [or at least come close] - Sogolytics Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\"},\"datePublished\":\"2022-04-26T14:51:36+00:00\",\"dateModified\":\"2022-04-27T02:51:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285\"},\"description\":\"Want to secure your organization against cyber-attacks? Here are the common pitfalls you need to be aware of (and bridge) to improve your security!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"How to Guarantee 100% Cybersecurity [or at least come close]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/\",\"name\":\"Sogolytics Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285\",\"name\":\"Gordon Polovin\",\"description\":\"With an MBA from the University of the Witwatersrand in South Africa and work with clients and industries in the UK, Europe, Canada, and the US, Gordon's range of experiences make him well suited for the diverse topics and compelling conversations that Sogolytics clients value. Learn more about Gordon on his website.\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/author\/gpolovin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Guarantee 100% Cybersecurity [or at least come close] - Sogolytics Blog","description":"Want to secure your organization against cyber-attacks? Here are the common pitfalls you need to be aware of (and bridge) to improve your security!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"How to Guarantee 100% Cybersecurity [or at least come close] - Sogolytics Blog","og_description":"Want to secure your organization against cyber-attacks? Here are the common pitfalls you need to be aware of (and bridge) to improve your security!","og_url":"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/","og_site_name":"Sogolytics Blog","article_published_time":"2022-04-26T14:51:36+00:00","article_modified_time":"2022-04-27T02:51:55+00:00","og_image":[{"width":487,"height":714,"url":"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2018\/12\/focus.png","type":"image\/png"}],"author":"Gordon Polovin","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/","url":"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/","name":"How to Guarantee 100% Cybersecurity [or at least come close] - Sogolytics Blog","isPartOf":{"@id":"https:\/\/www.sogolytics.com\/blog\/#website"},"datePublished":"2022-04-26T14:51:36+00:00","dateModified":"2022-04-27T02:51:55+00:00","author":{"@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285"},"description":"Want to secure your organization against cyber-attacks? Here are the common pitfalls you need to be aware of (and bridge) to improve your security!","breadcrumb":{"@id":"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sogolytics.com\/blog\/how-to-guarantee-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"How to Guarantee 100% Cybersecurity [or at least come close]"}]},{"@type":"WebSite","@id":"https:\/\/www.sogolytics.com\/blog\/#website","url":"https:\/\/www.sogolytics.com\/blog\/","name":"Sogolytics Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/93290d69063997af1ba9a4bfb602a285","name":"Gordon Polovin","description":"With an MBA from the University of the Witwatersrand in South Africa and work with clients and industries in the UK, Europe, Canada, and the US, Gordon's range of experiences make him well suited for the diverse topics and compelling conversations that Sogolytics clients value. Learn more about Gordon on his website.","url":"https:\/\/www.sogolytics.com\/blog\/author\/gpolovin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/53524"}],"collection":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/comments?post=53524"}],"version-history":[{"count":4,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/53524\/revisions"}],"predecessor-version":[{"id":53534,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/53524\/revisions\/53534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/media\/5049"}],"wp:attachment":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/media?parent=53524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/categories?post=53524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/tags?post=53524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}