{"id":3091,"date":"2018-04-10T13:36:34","date_gmt":"2018-04-10T20:36:34","guid":{"rendered":"https:\/\/newed.any0.dpdns.org\/industry\/blog\/uncategorized\/three-strategies-to-advance-government-cybersecurity\/"},"modified":"2023-05-31T16:36:17","modified_gmt":"2023-05-31T23:36:17","slug":"three-strategies-to-advance-government-cybersecurity","status":"publish","type":"post","link":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/","title":{"rendered":"Three strategies to advance government cybersecurity"},"content":{"rendered":"<p>Cyberattacks on government agencies, whether national, state, local, or tribal, can not only compromise private citizen information and cost money, they can also damage political careers, threaten national security, and erode citizens\u2019 trust in government.<\/p>\n<p>Cybercriminals can come in many sizes from nation state efforts to individual actors. Some may deploy sophisticated measures while others might operate through simple phishing scams and malicious URLs. And the threats are continually evolving.<\/p>\n<p><strong>What can you do? <\/strong><\/p>\n<p>Many of the security breaches that have been in the headlines\u2014and the countless more that aren\u2019t reported publicly\u2014could have been <em>significantly mitigated, if not entirely avoided<\/em> with three key strategies. These recommended strategies don\u2019t require significant financial outlay or human capital and they can go a long way toward helping your government agency protect its technology infrastructure:<\/p>\n<ol>\n<li><strong>Organizational accountability<\/strong><\/li>\n<\/ol>\n<p>Clear lines of authority and responsibility should be established at the highest levels. Policy, strategy, and the execution of <strong><em>a robust security posture should reside within senior leadership<\/em><\/strong>.<\/p>\n<ol start=\"2\">\n<li><strong>Identity management<\/strong><\/li>\n<\/ol>\n<p>Username and password are not enough. Security strategies that count on \u201chiding behind thick castle walls and deep moats\u201d are doomed to failure. The security perimeter is ever evolving. Today\u2019s reality requires new approaches to credential, authenticate, and manage resources within networks. <strong><em>Identity is the new firewall<\/em><\/strong>.<\/p>\n<ol start=\"3\">\n<li><strong>Cyber hygiene<\/strong><\/li>\n<\/ol>\n<p><strong><em>Patching<\/em><\/strong> critical systems and maintaining their health is vital to protecting agency information. It\u2019s also crucial to move toward more standardized and automated <strong><em>backups<\/em><\/strong> including validation of backup processes. Finally, mitigating attacks requires <strong><em>training<\/em><\/strong> personnel on best practices\u2014including how to work safely in email, on social media, or with outside systems. Often, employees (at all levels) in the public sector don\u2019t recognize that they\u2019re potentially compromising sensitive information. <strong><em>Devices are the new perimeter.<\/em><\/strong><\/p>\n<p><strong>See how California is advancing its cybersecurity<\/strong><\/p>\n<p>In <a href=\"http:\/\/calchannel.granicus.com\/MediaPlayer.php?view_id=7&amp;clip_id=5226\" target=\"_blank\" rel=\"noopener noreferrer\">this video<\/a> of a recent public hearing on cybersecurity in the state of California, top government leaders share some of the ways they\u2019re implementing the above strategies. Many of them talk about how they\u2019re using <a href=\"https:\/\/enterprise.microsoft.com\/en-us\/industries\/government\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft cloud solutions<\/a> to help them secure their technology infrastructure.<\/p>\n<p>For example, about 38 minutes into the video, Department of Technology Director Amy Tong says: \u201chelp screen out or flag &#8230; these phishing emails.\u201d<\/p>\n<p>Around an hour and 21 minutes into the video, LTC. Jim Parsons of the Military Department Cyber Network Defense Team says: \u201cEvery user\u2019s mailbox gains the protections from the Office 365 policies and security controls that are in place.\u201d He goes on to explain why that\u2019s so important given that the security perimeter has shifted and cybercriminals have learned that they just need to compromise a user in order to gain access to the data they want.<\/p>\n<p>Toward the end of the video\u2014an hour and 32 minutes in\u2014Scott Howland, Chief Information Officer for the California Highway Patrol, shares several statistics demonstrating the state of California\u2019s cybersecurity progress, including that while phishing attacks have increased, infections resulting from phishing have gone down.<\/p>\n<p><strong>Your partner in government cybersecurity<\/strong><\/p>\n<p>We\u2019re here to help you advance your government agency\u2019s cybersecurity strategies. Contact your Microsoft representative to learn how you can take advantage of our in-depth approach to <a href=\"https:\/\/enterprise.microsoft.com\/en-us\/industries\/government\/check-the-facts\/\" target=\"_blank\" rel=\"noopener noreferrer\">security and regulatory compliance<\/a> to help you protect your systems and data end to end\u2014while keeping people productive. You might be surprised to learn how quickly you can start improving your cybersecurity posture with our <a href=\"https:\/\/enterprise.microsoft.com\/en-us\/industries\/government\/\" target=\"_blank\" rel=\"noopener noreferrer\">trusted cloud solutions for Government<\/a>.<\/p>\n<p>You can also:<\/p>\n<ul>\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/en-US\/microsoft-365\/government\" target=\"_blank\" rel=\"noopener noreferrer\">Learn more about Microsoft Office 365 for U.S. Government<\/a><\/li>\n<li>View the on-demand webinar: <a href=\"https:\/\/resources.office.com\/en-us-landing-cybersecurity-as-a-foundation-for-government.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity as a foundation for government<\/a><\/li>\n<li><a href=\"https:\/\/ptdrv.linkedin.com\/h3oza3w\" target=\"_blank\" rel=\"noopener noreferrer\">Find out about Advanced Threat Protection and how to start your free trial<\/a><\/li>\n<li><a href=\"https:\/\/ptdrv.linkedin.com\/e51yvbq\" target=\"_blank\" rel=\"noopener noreferrer\">Access several resources to help you with your government agency\u2019s cybersecurity strategy<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Learn three strategies that can help your government agency protect its technology infrastructure and see how the state of California has improved its cybersecurity.<\/p>\n","protected":false},"author":138,"featured_media":10910,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1515],"post_tag":[],"content-type":[1483],"coauthors":[1071],"class_list":["post-3091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","content-type-thought-leadership","review-flag-free-1593619515-401","review-flag-new-1593580249-279","review-flag-partn-1593580285-60"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three strategies to advance government cybersecurity - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three strategies to advance government cybersecurity - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Learn three strategies that can help your government agency protect its technology infrastructure and see how the state of California has improved its cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-10T20:36:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T23:36:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stuart McKee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/\"},\"author\":[{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/author\/stuart-mckee_1\/\",\"@type\":\"Person\",\"@name\":\"Stuart McKee\"}],\"headline\":\"Three strategies to advance government cybersecurity\",\"datePublished\":\"2018-04-10T20:36:34+00:00\",\"dateModified\":\"2023-05-31T23:36:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/\"},\"wordCount\":623,\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png\",\"articleSection\":[\"Government\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/\",\"name\":\"Three strategies to advance government cybersecurity - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png\",\"datePublished\":\"2018-04-10T20:36:34+00:00\",\"dateModified\":\"2023-05-31T23:36:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png\",\"width\":960,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three strategies to advance government cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three strategies to advance government cybersecurity - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Three strategies to advance government cybersecurity - Microsoft Industry Blogs","og_description":"Learn three strategies that can help your government agency protect its technology infrastructure and see how the state of California has improved its cybersecurity.","og_url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2018-04-10T20:36:34+00:00","article_modified_time":"2023-05-31T23:36:17+00:00","og_image":[{"width":960,"height":300,"url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Stuart McKee","Est. reading time":"2 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/"},"author":[{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/author\/stuart-mckee_1\/","@type":"Person","@name":"Stuart McKee"}],"headline":"Three strategies to advance government cybersecurity","datePublished":"2018-04-10T20:36:34+00:00","dateModified":"2023-05-31T23:36:17+00:00","mainEntityOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/"},"wordCount":623,"publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png","articleSection":["Government"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/","name":"Three strategies to advance government cybersecurity - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png","datePublished":"2018-04-10T20:36:34+00:00","dateModified":"2023-05-31T23:36:17+00:00","breadcrumb":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#primaryimage","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/04\/503_banner.png","width":960,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/government\/2018\/04\/10\/three-strategies-to-advance-government-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Three strategies to advance government cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#website","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/3091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/138"}],"replies":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=3091"}],"version-history":[{"count":0,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/3091\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/10910"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=3091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=3091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=3091"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=3091"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=3091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}