{"id":206,"date":"2024-03-01T14:57:00","date_gmt":"2024-03-01T14:57:00","guid":{"rendered":"https:\/\/3bdatasecurity.com\/3bds-blog\/?p=206"},"modified":"2024-10-25T11:44:17","modified_gmt":"2024-10-25T10:44:17","slug":"how-to-identify-iot-security-risks-in-your-business","status":"publish","type":"post","link":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/","title":{"rendered":"Identifying IoT Security Risks in Your Business"},"content":{"rendered":"\n<p>The Internet of Things (IoT) is transforming how businesses work by connecting everyday objects to the internet, enabling them to send and receive data. This technology boosts efficiency and allows for advanced data analysis.<\/p>\n\n\n\n<p>However, the more devices we connect, the more we open ourselves up to potential security threats. Protecting against these risks is essential for businesses to keep their data safe, maintain their customers&#8217; trust, and ensure smooth operations.<\/p>\n\n\n\n<p>As IoT becomes more common, the risk of cyber attacks grows, putting both business and customer information at risk. It&#8217;s vital for companies to take strong security measures seriously. This means not only looking after the data but also following rules and standards set to keep information safe.<\/p>\n\n\n\n<p>In this blog post, we take a look at the common security risks facing IoT devices, and preventative measures you can take to mitigate them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\"><strong>Common IoT Security Risks<\/strong><\/h3>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Unauthorised Access<\/strong><\/h4>\n\n\n\n<p>Unauthorised access represents a significant threat to IoT ecosystems. This can occur through weak authentication mechanisms, allowing attackers to gain control over devices. Once inside, they can steal sensitive data, manipulate device functionality, or use the device as a gateway to further attacks within the network. The consequences can range from privacy violations to operational disruptions and financial losses.<\/p>\n\n\n\n<p>To combat this risk, it&#8217;s crucial to implement robust authentication methods. Two-factor authentication (2FA) adds an extra layer of security by requiring a second form of verification beyond just a password. Biometric data, such as fingerprints or facial recognition, can also enhance security. Regular password updates and the use of complex, unique passwords for different devices help prevent brute force attacks and unauthorised entry.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Network Security<\/strong><\/h4>\n\n\n\n<p>IoT devices connected to a network can serve as entry points for attackers. Once an IoT device is compromised, the attacker can move within the network, potentially gaining access to sensitive systems and data. This can lead to widespread security breaches affecting not only the IoT ecosystem but also critical business operations.<\/p>\n\n\n\n<p>Network segmentation is a key strategy, isolating IoT devices in separate network zones to limit the spread of potential attacks.<\/p>\n\n\n\n<p>Employing firewalls and intrusion detection\/prevention systems can further safeguard networks by monitoring and controlling incoming and outgoing network traffic based on an applied rule set, and by identifying and responding to suspicious activities.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Data Privacy<\/strong><\/h4>\n\n\n\n<p>IoT devices often collect vast amounts of data, some of which can be highly sensitive. If this data is exposed due to inadequate security measures, it can lead to significant privacy breaches, legal repercussions, and damage to an organisation&#8217;s reputation. The risk is increased when devices unnecessarily collect or retain data without proper safeguards.<\/p>\n\n\n\n<p>Encrypting data both in transit and at rest is fundamental to protecting privacy. Encryption transforms the data into a coded format that is unreadable without the appropriate decryption key, securing it from unauthorised access.<\/p>\n\n\n\n<p>Additionally, organisations should adopt data minimisation practices, collecting only the data that is absolutely necessary for the intended purpose and securely disposing of it when it&#8217;s no longer needed.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Firmware and Software Vulnerabilities<\/strong><\/h4>\n\n\n\n<p>IoT devices operate on firmware and software that, if outdated, can contain exploitable vulnerabilities. Cyber criminals actively seek out these vulnerabilities to launch attacks, which can compromise device integrity and functionality.<\/p>\n\n\n\n<p>Regularly updating and patching IoT devices is critical to mitigating this risk. Manufacturers often release software updates to address known vulnerabilities. By keeping the device firmware and software up to date, organisations can protect against exploitation. Automated updates can ensure timely application of patches without manual intervention, maintaining security with minimal disruption.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Insecure Interfaces<\/strong><\/h4>\n\n\n\n<p>The interfaces that allow users to interact with IoT devices, such as web portals, APIs, cloud platforms, and mobile apps, can be vulnerable to attacks if not properly secured. These vulnerabilities can provide attackers with access to device configurations, sensitive data, and the ability to issue unauthorised commands.<\/p>\n\n\n\n<p>Regular security assessments of all interfaces are essential to identify and rectify vulnerabilities. Implementing strong encryption methods for data transmission and requiring authentication for access control are key measures. Additionally, the principle of least privilege should be applied, ensuring that users have only the access necessary for their role.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Non-Compliance<\/strong><\/h4>\n\n\n\n<p>The Product Security and Telecommunications Infrastructure (PSTI) Act 2022 sets a new standard for the security of consumer smart products. With its implementation, IoT devices that fail to comply with its requirements face not only the risk of cyber attacks but also legal and financial penalties. This legislation aims to ensure that all consumer smart products sold have robust security measures in place to protect against cyber threats.<\/p>\n\n\n\n<p>To comply with the PSTI Act 2022, manufacturers and businesses must ensure their products meet the specified security guidelines. This includes the implementation of measures to prevent unauthorised access, ensuring that software is regularly updated, and that personal data is protected.<\/p>\n\n\n\n<p>Businesses should conduct thorough assessments of their products to identify and rectify any compliance gaps. Additionally, conducting regular compliance audits will be essential for maintaining adherence and avoiding penalties.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\"><strong>Keep Your IoT Devices Cyber Secure and Compliant<\/strong><\/h3>\n\n\n\n<p>Understanding and addressing these common IoT security risks are fundamental steps in securing IoT devices and the networks they operate within. By implementing these prevention strategies, organisations can significantly reduce their vulnerability to attacks.<\/p>\n\n\n\n<p>The landscape of IoT security is complex, and keeping up with the latest threats and compliance requirements can be challenging. This is where our expertise comes into play. The team at 3B Data Security are dedicated to helping businesses secure their IoT environments, offering tailored solutions that not only meet current security standards but also anticipate future vulnerabilities.<\/p>\n\n\n\n<p>Get in touch with us today to discover how we can help secure your IoT devices, and improve your resilience against cyber threats.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/3bdatasecurity.com\/contact.php\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"284\" src=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4-1024x284.png\" alt=\"\" class=\"wp-image-201\" style=\"width:208px;height:auto\" srcset=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4-1024x284.png 1024w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4-300x83.png 300w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4-768x213.png 768w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-4.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things (IoT) is transforming how businesses work by connecting everyday objects to the internet, enabling them to send and receive data. This technology boosts efficiency and allows for advanced data analysis. In this blog post, we take a look at the common security risks facing IoT devices, and preventative measures you can take to mitigate them.<\/p>\n","protected":false},"author":5,"featured_media":287,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[15],"class_list":["post-206","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","tag-cyber-risks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Identifying IoT Security Risks<\/title>\n<meta name=\"description\" content=\"We take a look at the common security risks facing IoT devices, and preventative measures you can take to mitigate them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identifying IoT Security Risks\" \/>\n<meta property=\"og:description\" content=\"We take a look at the common security risks facing IoT devices, and preventative measures you can take to mitigate them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"3B Data Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/3BDSLtd\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-01T14:57:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-25T10:44:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Annabelle Ilsley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@3bData\" \/>\n<meta name=\"twitter:site\" content=\"@3bData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Annabelle Ilsley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/\"},\"author\":{\"name\":\"Annabelle Ilsley\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"headline\":\"Identifying IoT Security Risks in Your Business\",\"datePublished\":\"2024-03-01T14:57:00+00:00\",\"dateModified\":\"2024-10-25T10:44:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/\"},\"wordCount\":953,\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-2.png\",\"keywords\":[\"Cyber Risks\"],\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/\",\"name\":\"Identifying IoT Security Risks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-2.png\",\"datePublished\":\"2024-03-01T14:57:00+00:00\",\"dateModified\":\"2024-10-25T10:44:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"description\":\"We take a look at the common security risks facing IoT devices, and preventative measures you can take to mitigate them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-2.png\",\"contentUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Blog-Featured-Image-2.png\",\"width\":2000,\"height\":600,\"caption\":\"Identifying IoT Security Risks in Your Business\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/how-to-identify-iot-security-risks-in-your-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identifying IoT Security Risks in Your Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\",\"name\":\"3B Data Security Blog\",\"description\":\"News and Updates from 3B Data Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\",\"name\":\"Annabelle Ilsley\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/author\\\/ag3bds\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identifying IoT Security Risks","description":"We take a look at the common security risks facing IoT devices, and preventative measures you can take to mitigate them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/","og_locale":"en_GB","og_type":"article","og_title":"Identifying IoT Security Risks","og_description":"We take a look at the common security risks facing IoT devices, and preventative measures you can take to mitigate them.","og_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/","og_site_name":"3B Data Security Blog","article_publisher":"https:\/\/www.facebook.com\/3BDSLtd\/","article_published_time":"2024-03-01T14:57:00+00:00","article_modified_time":"2024-10-25T10:44:17+00:00","og_image":[{"width":2000,"height":600,"url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-2.png","type":"image\/png"}],"author":"Annabelle Ilsley","twitter_card":"summary_large_image","twitter_creator":"@3bData","twitter_site":"@3bData","twitter_misc":{"Written by":"Annabelle Ilsley","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/#article","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/"},"author":{"name":"Annabelle Ilsley","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"headline":"Identifying IoT Security Risks in Your Business","datePublished":"2024-03-01T14:57:00+00:00","dateModified":"2024-10-25T10:44:17+00:00","mainEntityOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/"},"wordCount":953,"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-2.png","keywords":["Cyber Risks"],"articleSection":["Cyber Attacks"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/","name":"Identifying IoT Security Risks","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/#primaryimage"},"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-2.png","datePublished":"2024-03-01T14:57:00+00:00","dateModified":"2024-10-25T10:44:17+00:00","author":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"description":"We take a look at the common security risks facing IoT devices, and preventative measures you can take to mitigate them.","breadcrumb":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/#primaryimage","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-2.png","contentUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-Featured-Image-2.png","width":2000,"height":600,"caption":"Identifying IoT Security Risks in Your Business"},{"@type":"BreadcrumbList","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/how-to-identify-iot-security-risks-in-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/3bdatasecurity.com\/3bds-blog\/"},{"@type":"ListItem","position":2,"name":"Identifying IoT Security Risks in Your Business"}]},{"@type":"WebSite","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/","name":"3B Data Security Blog","description":"News and Updates from 3B Data Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6","name":"Annabelle Ilsley","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ag3bds\/"}]}},"_links":{"self":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":2,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/206\/revisions"}],"predecessor-version":[{"id":209,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/206\/revisions\/209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media\/287"}],"wp:attachment":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media?parent=206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/categories?post=206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/tags?post=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}