{"id":538,"date":"2024-07-26T14:15:32","date_gmt":"2024-07-26T13:15:32","guid":{"rendered":"https:\/\/3bdatasecurity.com\/3bds-blog\/?p=538"},"modified":"2024-11-06T16:39:50","modified_gmt":"2024-11-06T16:39:50","slug":"the-benefits-of-cyber-essentials-certification-and-how-to-get-started","status":"publish","type":"post","link":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/","title":{"rendered":"10 Years of Cyber Essentials: The Benefits of Certification"},"content":{"rendered":"\n<p>This year marks the 10<sup>th<\/sup> anniversary of the <a href=\"https:\/\/www.ncsc.gov.uk\/section\/products-services\/cyber-essentials\">NCSC Cyber Essentials<\/a> certification.<\/p>\n\n\n\n<p><a href=\"https:\/\/3bdatasecurity.com\/Cyber-Essentials.php\">Cyber Essentials<\/a> is a UK government-backed scheme designed to help organisations protect themselves against a range of the most common cyber attacks. Achieving Cyber Essentials certification demonstrates that your organisation has implemented essential security measures to safeguard its IT infrastructure.<\/p>\n\n\n\n<p>Since its inception in 2014, the Cyber Essentials scheme has continuously evolved to address new and emerging cyber threats. These continual updates ensure that it remains a vital tool for organisations looking to stay secure and strengthen their defences.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What Are the Benefits of Cyber Essentials Certification?<\/strong><\/h3>\n\n\n\n<p><strong>Protection Against Common Cyber Threats<\/strong><\/p>\n\n\n\n<p>Cyber Essentials certification helps organisations defend against 80% of common cyber threats like malware, ransomware, and phishing attacks by implementing recommended security controls.<\/p>\n\n\n\n<p><strong>Enhanced Reputation and Trust<\/strong><\/p>\n\n\n\n<p>Certification demonstrates to customers, partners, and stakeholders that your organisation takes cyber security seriously, enhancing your reputation and helping build trust.<\/p>\n\n\n\n<p><strong>Compliance and Regulatory Requirements<\/strong><\/p>\n\n\n\n<p>For many industries, meeting data protection and cyber security regulations is critical. CE certification helps organisations comply with these requirements, reducing the risk of fines and legal issues. It\u2019s also a great starting point for achieving ISO 27001 certification.<\/p>\n\n\n\n<p><strong>Eligibility for Government Contracts<\/strong><\/p>\n\n\n\n<p>Many government bodies, including the Ministry of Defence, require CE certification for contract bids. Achieving this certification can open up new business opportunities with government agencies, expanding your potential client base and revenue streams.<\/p>\n\n\n\n<p><strong>Ideal for Small Businesses<\/strong><\/p>\n\n\n\n<p>Cyber Essentials is an excellent starting point for small businesses looking to improve their cyber security posture. It provides a clear and structured path to implementing essential security measures without overwhelming resources, making it the perfect first step in establishing a robust cyber security foundation.<\/p>\n\n\n\n<p><strong>Peace of Mind<\/strong><\/p>\n\n\n\n<p>Implementing essential cyber security measures provides peace of mind, allowing you to focus on your core business activities without constant worry about cyber threats.<\/p>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What Are the Levels of Cyber Essentials Certification?<\/strong><\/h3>\n\n\n\n<p>There are two levels of Cyber Essentials Certification:<\/p>\n\n\n\n<p><strong>Cyber Essentials Basic<\/strong><\/p>\n\n\n\n<p>CE Basic consists of a self-assessment, which reviews your organisation\u2019s current security measures. This first level of Certification shows you how to address the cyber security basics using simple security controls, protecting your organisation from the most common types of attacks.<\/p>\n\n\n\n<p><strong>Cyber Essentials Plus<\/strong><\/p>\n\n\n\n<p>CE Plus involves a more in-depth review and technical validation of your organisation\u2019s security, including an internal scan and on-site assessment to verify that the organisation&#8217;s systems meet the CE requirements.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How Do You Achieve Cyber Essentials Certification?<\/strong><\/h3>\n\n\n\n<p>The initial step of CE Certification involves completing a self-assessment based on the standard criteria.<\/p>\n\n\n\n<p>The assessment focuses on five key control areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Boundary firewalls and internet gateways<\/li>\n\n\n\n<li>Secure configuration<\/li>\n\n\n\n<li>Access control<\/li>\n\n\n\n<li>Malware protection<\/li>\n\n\n\n<li>Patch management<\/li>\n<\/ul>\n\n\n\n<p>Successfully completing the self-assessment can result in CE Certification.<\/p>\n\n\n\n<p>To achieve CE Plus Certification, an external evaluation of the controls established in the CE assessment is required. This evaluation includes an audit and vulnerability scans to confirm that the controls are effective.<\/p>\n\n\n\n<p>A successful audit will result in CE Plus Certification.<\/p>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Get Started With Your Cyber Essentials Certification<\/strong><\/h3>\n\n\n\n<p>At 3B Data Security, we are committed to guiding businesses through the CE and CE Plus certification processes.<\/p>\n\n\n\n<p>We are a CE Basic and Plus Certification Body and have a team of expert CE Assessors, who with their set of skills and experience can work to get you certified in no time.<\/p>\n\n\n\n<p>Our assessors are all experienced and qualified auditors who have specialisms in the CE standard and other schemes such as IASME Cyber Assurance, ISO 27001, PCI DSS, and GDPR. We are also a NCSC Cyber Advisor Assured Service Provider.<\/p>\n\n\n\n<p>Get in touch today to find out more about CE Certification, and how the team at 3B Data Security can help your organisation.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/3bdatasecurity.com\/Cyber-Essentials.php\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"284\" src=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-3-1024x284.png\" alt=\"Get in touch 3B Data Security\" class=\"wp-image-166\" style=\"width:189px;height:auto\" srcset=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-3-1024x284.png 1024w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-3-300x83.png 300w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-3-768x213.png 768w, https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/04\/Blog-CTAs-3.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This year marks the 10th anniversary of the NCSC Cyber Essentials certification. Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against a range of the most common cyber attacks. Achieving Cyber Essentials certification demonstrates that your organisation has implemented essential security measures to safeguard its IT infrastructure. Since its inception [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":539,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-other"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Essentials: The Benefits of Certification<\/title>\n<meta name=\"description\" content=\"Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against the most common cyber attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Essentials: The Benefits of Certification\" \/>\n<meta property=\"og:description\" content=\"Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against the most common cyber attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/\" \/>\n<meta property=\"og:site_name\" content=\"3B Data Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/3BDSLtd\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-26T13:15:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-06T16:39:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/07\/Blog-Featured-Image-28.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Annabelle Ilsley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@3bData\" \/>\n<meta name=\"twitter:site\" content=\"@3bData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Annabelle Ilsley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/\"},\"author\":{\"name\":\"Annabelle Ilsley\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"headline\":\"10 Years of Cyber Essentials: The Benefits of Certification\",\"datePublished\":\"2024-07-26T13:15:32+00:00\",\"dateModified\":\"2024-11-06T16:39:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/\"},\"wordCount\":625,\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Blog-Featured-Image-28.png\",\"articleSection\":[\"Other\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/\",\"name\":\"Cyber Essentials: The Benefits of Certification\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Blog-Featured-Image-28.png\",\"datePublished\":\"2024-07-26T13:15:32+00:00\",\"dateModified\":\"2024-11-06T16:39:50+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\"},\"description\":\"Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against the most common cyber attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/#primaryimage\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Blog-Featured-Image-28.png\",\"contentUrl\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Blog-Featured-Image-28.png\",\"width\":2000,\"height\":600,\"caption\":\"benefits of cyber essentials certification\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Years of Cyber Essentials: The Benefits of Certification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#website\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/\",\"name\":\"3B Data Security Blog\",\"description\":\"News and Updates from 3B Data Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/#\\\/schema\\\/person\\\/f979fb9a97552f3b19fcb5a9b61349a6\",\"name\":\"Annabelle Ilsley\",\"url\":\"https:\\\/\\\/3bdatasecurity.com\\\/3bds-blog\\\/author\\\/ag3bds\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Essentials: The Benefits of Certification","description":"Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against the most common cyber attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber Essentials: The Benefits of Certification","og_description":"Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against the most common cyber attacks.","og_url":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/","og_site_name":"3B Data Security Blog","article_publisher":"https:\/\/www.facebook.com\/3BDSLtd\/","article_published_time":"2024-07-26T13:15:32+00:00","article_modified_time":"2024-11-06T16:39:50+00:00","og_image":[{"width":2000,"height":600,"url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/07\/Blog-Featured-Image-28.png","type":"image\/png"}],"author":"Annabelle Ilsley","twitter_card":"summary_large_image","twitter_creator":"@3bData","twitter_site":"@3bData","twitter_misc":{"Written by":"Annabelle Ilsley","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/#article","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/"},"author":{"name":"Annabelle Ilsley","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"headline":"10 Years of Cyber Essentials: The Benefits of Certification","datePublished":"2024-07-26T13:15:32+00:00","dateModified":"2024-11-06T16:39:50+00:00","mainEntityOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/"},"wordCount":625,"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/07\/Blog-Featured-Image-28.png","articleSection":["Other"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/","name":"Cyber Essentials: The Benefits of Certification","isPartOf":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/#primaryimage"},"image":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/#primaryimage"},"thumbnailUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/07\/Blog-Featured-Image-28.png","datePublished":"2024-07-26T13:15:32+00:00","dateModified":"2024-11-06T16:39:50+00:00","author":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6"},"description":"Cyber Essentials is a UK government-backed scheme designed to help organisations protect themselves against the most common cyber attacks.","breadcrumb":{"@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/#primaryimage","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/07\/Blog-Featured-Image-28.png","contentUrl":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-content\/uploads\/2024\/07\/Blog-Featured-Image-28.png","width":2000,"height":600,"caption":"benefits of cyber essentials certification"},{"@type":"BreadcrumbList","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/the-benefits-of-cyber-essentials-certification-and-how-to-get-started\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/3bdatasecurity.com\/3bds-blog\/"},{"@type":"ListItem","position":2,"name":"10 Years of Cyber Essentials: The Benefits of Certification"}]},{"@type":"WebSite","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#website","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/","name":"3B Data Security Blog","description":"News and Updates from 3B Data Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/3bdatasecurity.com\/3bds-blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/3bdatasecurity.com\/3bds-blog\/#\/schema\/person\/f979fb9a97552f3b19fcb5a9b61349a6","name":"Annabelle Ilsley","url":"https:\/\/3bdatasecurity.com\/3bds-blog\/author\/ag3bds\/"}]}},"_links":{"self":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/comments?post=538"}],"version-history":[{"count":10,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/538\/revisions"}],"predecessor-version":[{"id":609,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/posts\/538\/revisions\/609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media\/539"}],"wp:attachment":[{"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/media?parent=538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/categories?post=538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3bdatasecurity.com\/3bds-blog\/wp-json\/wp\/v2\/tags?post=538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}