{"id":1873,"date":"2021-01-16T18:53:07","date_gmt":"2021-01-16T17:53:07","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=1873"},"modified":"2021-01-16T18:53:07","modified_gmt":"2021-01-16T17:53:07","slug":"cybersecurity-a-top-priority-for-businesses","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2021\/01\/16\/cybersecurity-a-top-priority-for-businesses\/","title":{"rendered":"Cybersecurity: A top priority for businesses"},"content":{"rendered":"<p>\u00a0<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" style=\"display:block;margin-left:auto;margin-right:auto;\" title=\"Untitled 2.jpeg\" src=\"http:\/\/hjinterim.files.wordpress.com\/2021\/01\/untitled-2.jpeg\" alt=\"Untitled 2\" width=\"791\" height=\"448\" border=\"0\" \/><\/p>\n<p>\u00a0<\/p>\n<p>The\u00a0digitization and connection of everything makes businesses increasingly\u00a0vulnerable to cyber-attacks, the incidence and sophistication of which are\u00a0increasing. To keep pace with developments, businesses are raising their<br \/>investment in IT security and joining forces to combat cybercrime.<\/p>\n<p>The\u00a02014 hack of Sony Pictures Entertainment and last year&#8217;s infiltration of the\u00a0German parliament&#8217;s computer system show that cyber-attacks can strike anytime,\u00a0anywhere. Cybercrime has grave implications and costs the global economy about\u00a0$450 billion a year, experts say. Intellectual property theft can delay\u00a0technical progress and skew competitiveness. Moreover, falling victim to\u00a0sabotage and hacktivism can significantly damage an organization&#8217;s reputation.<br \/>Security strategies and IT architecture need to meet ever-increasing\u00a0Requirements to monitor IT systems effectively and protect them from attack.\u00a0Investment in cybersecurity is rising to match the demand. A study by the<br \/>National Initiative for Information and Internet Safety says more than\u00a0one-third of surveyed German businesses expect spending on IT security and data\u00a0protection to double by 2020.\u00a0 It is no surprise that the cybersecurity market is booming.<\/p>\n<p>Cybersecurity Ventures, a market research firm, expects the cybersecurity market to grow \u00a0from $115 billion in 2019 to $210 billion in 2021.<\/p>\n<p>BASF\u00a0invests in extensive cybersecurity measures as part of a continuous drive to\u00a0improve security. Bond Information Protection Extended Release (Viper) is a\u00a0central element. The program has three goals in mind: to raise security<br \/>awareness among employees, protect highly critical systems and information,\u00a0such as research data, and improve overall security for systems throughout the\u00a0organization. &#8221; Cybersecurity is a top priority for BASF. With our global<br \/>network of IT security experts and programs such as Viper, we have taken action\u00a0to mount an effective defense against cyber-attacks,&#8221; says Hans-Ulrich\u00a0Engel, member of the Board of Executive Directors of BASF SE. &#8220;To keep<br \/>pace with developments in the digital age and respond to the increasing threat\u00a0to security, we must continuously strengthen defense mechanisms and constantly\u00a0adapt our security concepts and solutions. Only then can we leverage the<br \/>potential of digitization on the one hand and protect ourselves effectively\u00a0against cyber-attacks on the other hand.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" style=\"float:left;\" title=\"HJ Links.jpg\" src=\"http:\/\/hjinterim.files.wordpress.com\/2021\/01\/hj-links.jpg\" alt=\"HJ Links\" width=\"87\" height=\"128\" border=\"0\" \/><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>Prof.\u00a0Dr. Ir. H.J. Jansen, IT-SEC<\/p>\n<p>\u00a0<\/p>\n<p>BASF\u00a0established a new cyber defense organization last year to prevent cyber-attacks\u00a0more effectively and to minimize the impacts of potential attacks on business.\u00a0The cross-functional organization \u2013 a kind of counter- cyber-espionage center \u2013\u00a0is composed of IT experts with a variety of specialist areas including cyber\u00a0security operations, security strategy and architecture, security analytics as\u00a0well as risk management, who work hand in hand to recognize and respond to<br \/>attacks on BASF&#8217;s IT architecture as quickly as possible. &#8220;Rapid response\u00a0is key in the struggle against cybercrime,&#8221; says Prof. Dr. Ir. Henk Jan\u00a0Jansen, IT-SEC Security. &#8220;The longer an attack goes undiscovered, the more\u00a0difficult it is to establish which Systems are impacted and the more time the\u00a0attacker has to harm the organization.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>Modern\u00a0security techniques analyze and monitor the IT network to counter known threats\u00a0and predict new ones. BASF&#8217;s Cyber Security Defense Team uses a threat\u00a0intelligence platform, consisting of a monitoring and early warning system. The\u00a0platform consolidates data from different sources and analyzes irregularities\u00a0to enable early recognition and assessment of attack patterns as well as a\u00a0timely and appropriate response. The intelligence obtained from data analysis<br \/>helps\u00a0to\u00a0identify and pre-empt future cyber-attacks before they have a chance to wreak\u00a0havoc. Not even the best protective measures are 100% successful, however.\u00a0&#8220;We are well prepared for a worse- case scenario,&#8221; claims Prof. Dr.<br \/>Ir. H.J. Jansen. &#8220;In the event of a security incident, our computer\u00a0emergency response team will initiate the necessary steps immediately to\u00a0minimize damage and keep operations going.&#8221;<\/p>\n<p><img decoding=\"async\" style=\"float:left;\" title=\"bigstock-Big-Data-And-Artificial-Intell-239591671.jpg\" src=\"http:\/\/hjinterim.files.wordpress.com\/2021\/01\/bigstock-big-data-and-artificial-intell-239591671.jpg\" alt=\"Bigstock Big Data And Artificial Intell 239591671\" width=\"251\" height=\"168\" border=\"0\" \/><\/p>\n<p>Strategic\u00a0alliances<\/p>\n<p>Apart\u00a0from close internal collaboration and bundling cyber-attack defense resources,\u00a0BASF relies on strategic alliances with other businesses and organizations. In\u00a0November 2014, seven DAX 30 companies \u2013 including BASF \u2013 set up their own Cyber\u00a0Security Sharing and Analytics Center for this purpose. The objective is to\u00a0share information and intelligence across industries, build up more expertise,\u00a0as well as improve defense techniques and counterstrategies for a faster and<br \/>more effective collective response to cybersecurity challenges.<\/p>\n<p>\u00a0<\/p>\n<p>BASF\u00a0also teamed up with DAX companies Allianz, Bayer and Volkswagen in November\u00a02015 in setting up a dedicated cybersecurity service provider: the German\u00a0Cybersecurity Organization (DCSO). The hope is that close collaboration between\u00a0industry and government experts will contribute to meaningful improvement of\u00a0corporate security architectures. The organization bundles expertise, offers\u00a0security audits, as well as provides new services and corporate security<br \/>technologies that are not commercially available today in that form. DCSO\u00a0collaborates closely with the Federal Ministry of the Interior and the Federal\u00a0Office for Information Security in Germany. Apart from enabling theparticipating companies to protect themselves better, the collaboration via\u00a0DCSO allows them to share IT infrastructures and reduce costs. &#8220;A security<\/p>\n<p>Assessment\u00a0needs to be conducted for every newly designed app,&#8221; says Prof. Dr. Ir.\u00a0H.J. Jansen. &#8220;Each company has to pay the associated costs per app. DCSO\u00a0conducts the process just once for all the organizations involved, which cuts<br \/>the cost for the organizations.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>BASF\u00a0collaborates with other industry leaders on the research end, too. An\u00a0organization called the Digital Society Institute was set up with the support\u00a0of BASF, Allianz and consultancy Ernst &amp; Young\u00a0 (EY) at the European School of Management and Technology in Berlin in early 2016 to deliver information as well as develop analyses and strategies for the digital future. This scientifically autonomous research institute investigates issues to do with digitization, including cybersecurity, and promotes debate with stakeholders in business, industry, politics and society at large. The close connections benefit BASF\u2019s talent management, too: &#8220;BASF security workers can attend the European School of Management and Technology and participate in our training program for continued professional development in areas including security analytics,&#8221; says Prof. Dr. Ir. H.J. Jansen.<\/p>\n<p>\u00a0<\/p>\n<p>Alongside\u00a0partnerships and modern technologies, employee education and awareness are\u00a0hugely important. Attacks target human weaknesses, not just deficiencies in\u00a0system architectures. Social engineering is the top hacking method. The single\u00a0most effective way to beat social engineering methods is appropriate employee\u00a0conduct. &#8220;The best door and the safest locks won&#8217;t protect your home from\u00a0invasion if you don&#8217;t close and lock the door. It is the same with our security<br \/>systems. They only work in combination with appropriate behavior on the part of\u00a0the individual,&#8221; comments Prof. Dr. Ir. H.J. Jansen, Corporate Security.<\/p>\n<p>\u00a0<\/p>\n<p>To\u00a0heighten vigilance in the face of potential threats and raise employee awareness\u00a0of the importance of proper information handling, Corporate Security and\u00a0Information Services &amp; Supply Chain Operations host a variety of programs<br \/>and seminars, some of which were presented at the Global Safety Days 2016. More\u00a0than 14,000 employees at 70 sites around the world had the opportunity to\u00a0attend presentations and workshops on information security and cybersecurity.<br \/>The activities on offer included an interactive obstacle course in\u00a0Ludwigshafen, which invited participants to make their way through a series of\u00a0learning activities on specific topics, such as password protection, and the<br \/>chance to attend a live hacking demonstration. More information about the\u00a0various global activities is available on the Be Secure Portal.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"float:left;\" title=\"wallls.com_107824.jpg\" src=\"http:\/\/hjinterim.files.wordpress.com\/2021\/01\/wallls.com_107824.jpg\" alt=\"Wallls com 107824\" width=\"600\" height=\"375\" border=\"0\" \/><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>This\u00a0article was published in the current issue of the top five hacking methods<\/p>\n<p>1.\u00a0Social engineering<\/p>\n<p>Attackers\u00a0pretending to be legitimate sources, such as system administrators, bank\u00a0employees, officials or suppliers attempt to access devices or accounts with\u00a0fake calls or phishing emails.<\/p>\n<p>\u00a0<\/p>\n<p>2.\u00a0Account theft<\/p>\n<p>\u201cHostile\u00a0takeover&#8221; of a user account \u2013 known as account theft \u2013 allows hackers to\u00a0move freely in corporate networks. The problem is particularly acute if the\u00a0stolen private passwords are identical to the person\u2019s work passwords.<\/p>\n<p>\u00a0<\/p>\n<p>3.\u00a0Web-based attacks<\/p>\n<p>The\u00a0steadily increasing number of Internet apps offers a broad target. Hackers use\u00a0manipulated apps to access the underlying databases and steal user data.<\/p>\n<p>\u00a0<\/p>\n<p>4.\u00a0Device attacks<\/p>\n<p>Hackers\u00a0attack user devices instead of servers. A common trick is to send a link that,\u00a0when clicked, lets the hacker access the user&#8217;s web browser. The attacker gains\u00a0control over the device and access to the company server.<\/p>\n<p>\u00a0<\/p>\n<p>5.\u00a0Safety loopholes in server software<\/p>\n<p>Many\u00a0servers now use standard software that comes with regular updates.\u00a0 If the supplier overlooks a gap in security, resourceful hackers will find their way in.<\/p>\n<p>\u00a0<\/p>\n<p>Possible\u00a0telltale signs of a phishing email:<\/p>\n<p>\u25fe\u00a0Sender&#8217;s name and email content do not match<\/p>\n<p>\u25fe\u00a0Links to unknown websites<\/p>\n<p>\u25fe\u00a0Unsolicited request for sensitive information<\/p>\n<p>\u25fe\u00a0Unsolicited attachments and a request to click or update them<\/p>\n<p>\u25fe\u00a0Bad spelling and grammar<\/p>\n<p>\u25fe\u00a0Insistence to respond right away<\/p>\n<p>\u25fe Links\u00a0to orders, deliveries or unpaid invoices<\/p>\n<p>\u00a0<\/p>\n<p>Dos\u00a0and don&#8217;ts if you think security may have been breached:<\/p>\n<p>\u00a0<\/p>\n<p>If\u00a0you have received what you believe to be a phishing email, please forward the\u00a0email as attachment to phishing@basf.com and then delete it. The email will be\u00a0analyzed and any untrustworthy senders will be blocked. The Be Secure portal<br \/>offers more information, video tutorials and behavioral tips about information\u00a0protection and cybersecurity.<\/p>\n<p>\u00a0<\/p>\n<p>Protect\u00a0yourself:<\/p>\n<p>Use\u00a0secure passwords<\/p>\n<p>Always\u00a0use secure passwords that include upper- and lower-case letters, numbers and\u00a0special characters to increase the number of possible combinations. Change your<br \/>passwords regularly and activate additional authentication factors such as the\u00a0smart card. These days lot of administrators coming with the most\u00a0 ridicules password phrases with at least 10 (QAdum`HLP-) till 128 digits or even more which is even more ridicules, a password phrase is consisting on an something a user can remember do you think I could remember myself this very secure 128bit password: r&lt;E)Lg'{&#8216;4s7u.LN::KFSWaVL&amp;]U!uY&#8217;d&lt;HG\\fDZ9Up)sQqayQx8^pbw&lt;^&#8217;Unpuh~2P\/Y9yfkL\/B)&gt;t}CPWn3XHES{.Vm[UbJ\/(.Q}=RA3)aP][8zM&#8221;(]bdB@*$\\2r;: even when I would use it daily? For example, you could create a password with the maximum of 2048 characters and would look like this:<\/p>\n<p>\u00a0<\/p>\n<p>4xdQ<em>Kr}9r[^&lt;.[DgD$j%#}Z2#vXq489GC8<code>nbYU5Z\"5,x&amp;amp;f}$+KbUKm?gB!X*6n^rTa%c^CSwY$4dQ2\"9&amp;amp;9D8fF[w,(VAuY\/;v'v#$'TTSqg)LFmMSVc94KZAS3~?N=#6VWmA)&amp;amp;Y%]84n\/YebY<\/code>&lt;Vr<code>6{C*{qYmWnSm%p;<\/code>$5P&#8221;qS](a.5[Fpqy&amp;&lt;<code>m[uwe\\8{C#:NRBb\/K;huR$v[G?Cn$X#!XLkc&amp;gt;L(;c=9%z!vf*HAV;2Y[q$xV&amp;gt;D_,kb=3H$U2%}WCA)kaQkr*&amp;gt;V$]XQEWz6DgY\"&amp;gt;HKtSC\/3wdp'ge6hU\"JYD_[\/yN+\"\"!ArNCL:^\"<\/code>@42H9ZE:!A?+[WQ&lt;&amp;hR+cM<code>@~%]Q;^wNgX[57A6gJ~5HD\/e#R&amp;amp;wde%f4Hpb6+kx\".!\\{g?,Y]tc7.fL&amp;lt;\"j?\\MF^us&amp;gt;(hkB{j+?.8xRde{$KAw\"\/Zuq45Jwyy^w+[J6~\/T~ufd5XBYhHsC&amp;gt;R=;z(v~nS\"y<\/code>&amp;faY,4HrfzSz&#8221;9(fLJ^@_e~BPEB+\/S<\/em>)w^V}m$LhTjfu&#8217;n&#8221;)GZ^wrVaYV;j$7A5&#8243;Q#EVBTct@;&gt;rJ@&lt;!<em>x)<code>7,NYrCE#J;%U2+jEys]DpXL3()kuyux.\\:,5ayUa@=k[\"k2&amp;gt;HHp@R<\/code>=JNh~JxD\\wd+&#042;T4{&#8220;Z<\/em>n;&amp;H:rw\\ZF_$+8}R%.M6x[NN2E97<em>:+%YP,wYY7UMaW2t#vr$QB{R)tvDVTMb5KMT,&lt;~T8r])_a._ppF+&#8221;R8&amp;j6}W~5?rECu8N]tdK=&lt;a href=&quot;+d$N<code>3U?a&amp;amp;VL\"r8N?Dv+7a4&amp;amp;A((Zr^RaSd,)qW3&amp;gt;r6~5&amp;lt;.eV7z6h\/eX=.#\\]~f&amp;lt;yQqD+WX:G7pY\"vF.Z?f~&amp;gt;P4*nMsNQjyyY.@\/]f+#uR*;&amp;gt;:[qCpqUEvP'8XP)m+=E}$cn58X33r6g<\/code>4&#8243;&gt;g8!<\/a>c2y@[K&#8217;Sn+y!}5%5\\V+}c6ECdAVy])&#8217;D(.G&gt;Ex}^FHuDBG;]v[64_d]EW\/s[tHbUnczcu)Y~q_gqj\/UjR,Sz$nXYN42^Ac=P=dF#LQWY~;n6K^&gt;SPKc8K<\/em>?yG4N(=m+rTCVrdm+U,TV}&gt;.cw4zVV~Dvs_jL_$29&lt;a&gt;8[K])nQRajWFvWR@c,~<em>8]W\/Pvw;a,)B:j^us22eh&#8217;eMYh{b&amp;9~.Cm+@&gt;,fM\\bb+gcE\\N@swS:Jt)?uakhd3PD[[;n{gGcvA]&gt;UA4m},PSJmJy!(:!a!a%S9hF$!)7w\\W]7PX:~z&#040;_$!?:<\/em>&lt;vdL8ndX%.dpX9q<em>fY5M^@MHmGS].S\/U&#8221;~CQ&amp;K#g=m:Zqz{Xs#H:hX6!=(M<\/em>j\/Xc&gt;Xryxb&lt;ARA[p#H$FqM4Ak\\s2\\fxC\\vG5]_JR^;;T&lt;bD@kq6&#8242;[+:K&#8217;!nb+JP}Y_3{ZTf&#8221;%qJkUNC&#8221;NMDQ3N~&gt;@NnHYjBMg?\/yB&gt;jAr&#125;n@U2Wmc4&amp;k:8LF~uX5}y%cwVzeT&amp;Qua^$Gageq.w\\92!aSX<code>7m)?\"QZ]w}&amp;gt;fVfjKLbK4!.w!Y\"7}WR\\uHmxd6vdg%bLk72(JRX62]K(&amp;gt;:??'xuzq\/\"ZLz4y,A_t$'}zaa[k&amp;lt;RPe(&amp;amp;\/kH@%_(B+v6'S=~$B7{mc2f&amp;gt;7~@'t6TxS&amp;lt;NKrX=UU~^tvb4D;\/~dMVpAcGgXN,+BzQRAHKhKW&amp;gt;G5LJnX,{D*\\*qQF_,9W)ctB=]\/$(aGz!R%ZZYXBj2229xL~9J!pL{'[,RJ&amp;amp;mU+ej@V_R8qE$2&amp;gt;$GKx!ub<\/code>FeXH{~!&#8217;7kca[BXVFzVGN3k3J8,\/rpUr+_ZnBuqvWqK&#8221;[98%TF;77WE6E[WCE.*#(&gt;by&amp;]n:Yk,SQ*RzY%a*@5B9Z=zDCtUKM(HU<code>LRp!K5w2W+=}ZRUbUa]\"kcB'%rQN@t4Q<\/code>Kdm%U=L])9;K{wPzQG,Y3nQAUd<code>W<\/code>&gt;92QqU]U(!T8@)f:{*(9=q&#8217;A&lt;(x*4?$2c,6te_u[+TN5~&lt;LXshzq(Zbt}x,<code>3hFXS&amp;gt;3acXV9C(=D3&amp;gt;,%<\/code>SfWr)n&amp;)PSVMSbk\\BL;d8p@6YQJ+#jA&#8221;V&lt;{AN75N~&gt;d:Q3Q%v~8Mp4)^G<code>+<\/code>%fQ*Sd4n{hT@)nBuMxq^w&gt;=@,uCz$]&lt;8rtf,6#Zm&gt;!bx^Sq8EwKE=h}&gt;z&lt;}g5&#8243;,SDYbT<\/p>\n<p>This\u00a0really looks ridicules 2048 characters, please be my guest to count them, what\u00a0do you think?<\/p>\n<p>\u00a0<\/p>\n<p>Believe\u00a0me 8 is more then enough despite these administrators are saying they are not<br \/>living in a real world! In case you need to generate a great password go to the<br \/>following website: https:\/\/passwordsgenerator.net\/<\/p>\n<p>\u00a0<\/p>\n<p>Classify\u00a0information<\/p>\n<p>Classify\u00a0and label your business information so that it is handled securely by everyone\u00a0involved. Share information strictly on a need-to-know basis.<\/p>\n<p>\u00a0<\/p>\n<p>Stick\u00a0to authorized web services<\/p>\n<p>Only\u00a0use BASF-authorized web services for storing files or communications such as\u00a0One Drive for\u00a0Business.<\/p>\n<p>\u00a0<\/p>\n<p>Check\u00a0files and links before opening<\/p>\n<p>Carefully\u00a0check the source, links and files of any emails you receive to be safe from\u00a0malware and fraudsters.<\/p>\n<p>\u00a0<\/p>\n<p>Only\u00a0connect authorized devices with the network and use encryption<\/p>\n<p>Do\u00a0not connect any unknown, non-BASF-internal or private storage media (memory\u00a0sticks, hard drives or similar) to the BASF infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 \u00a0 The\u00a0digitization and connection of everything makes businesses increasingly\u00a0vulnerable to cyber-attacks, the incidence and sophistication of which are\u00a0increasing. To keep pace with developments, businesses are raising theirinvestment in IT security and joining forces to combat cybercrime. The\u00a02014 hack of Sony Pictures Entertainment and last year&#8217;s infiltration of the\u00a0German parliament&#8217;s computer system show that cyber-attacks &#8230; <a title=\"Cybersecurity: A top priority for businesses\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2021\/01\/16\/cybersecurity-a-top-priority-for-businesses\/\">Read more<span class=\"screen-reader-text\">Cybersecurity: A top priority for businesses<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1875,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[18,28,19,20,29,22,23,24,25,26,27],"tags":[],"class_list":["post-1873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education","category-entities","category-financial-industry","category-gdpr","category-government","category-reaching-out-network","category-recruitement","category-reporting","category-security","category-security-treats","category-your-help-is-needed"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/1873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=1873"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/1873\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=1873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=1873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=1873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}