{"id":144,"date":"2022-04-29T09:37:00","date_gmt":"2022-04-29T09:37:00","guid":{"rendered":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/?p=144"},"modified":"2025-10-17T06:30:15","modified_gmt":"2025-10-17T06:30:15","slug":"5-industries-that-require-advanced-cyber-security-measures","status":"publish","type":"post","link":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/","title":{"rendered":"5 Industries that Require Advanced Cyber Security Measures"},"content":{"rendered":"\n<p>In the modern world, it is impossible to live without being connected. The Internet has become an integral part of our lives, and we rely on it for everything from entertainment to shopping. However, there is an increased risk of cyberattacks with the increase in the usage of internet-connected devices.<\/p>\n\n\n\n<p>Therefore, Cybersecurity has become an essential topic in the last few years. The risk of cyberattacks is ever-present, and businesses need to be aware of this risk and take necessary measures to prevent it.<\/p>\n\n\n\n<p>Companies and organizations need to consider the consequences of a cyberattack on their business and take steps to minimize the risks. Industrial cybersecurity is a growing field due to the increasing number of attacks on industrial control systems.<\/p>\n\n\n\n<p><a href=\"https:\/\/exito-e.com\/cybersecuritysummit\/thailand\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Cybersecurity<\/strong><\/a> is vital for all industries as they are at risk of cyberattacks. Enterprises need to take measures such as implementing advanced cyber security and having a robust cybersecurity team to protect their data and customers. However, some specific industries need to take extraordinary measures to keep their business from cyberattacks. This article will discuss the top industries that need advanced Cybersecurity measures.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">1. <strong>Financial services<\/strong><\/h2>\n\n\n\n<p>Finance is perhaps one of the essential areas where cybersecurity and privacy are critical to success. We need to see organizations take these risks seriously and invest in cybersecurity and identity solutions far into 2022.<\/p>\n\n\n\n<p>Over&nbsp;150 million Americans\u2019 personal&nbsp;information was exposed due to the Equifax credit leak. Expect more assaults like these in the future, both against financial institutions and big government agencies that handle personal financial data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">2. <strong>Healthcare<\/strong><\/h2>\n\n\n\n<p>Healthcare is one of the areas where hackers may get access to some of the most sensitive information. Various studies have found that sick and elderly persons are more vulnerable to internet scams and crimes. Hackers aim to get access to patient\u2019s personal information to exploit it to control them.<\/p>\n\n\n\n<p>Healthcare data must be safeguarded using the most up-to-date cybersecurity techniques. Data must be kept on secure private servers that are only accessible to a limited number of people.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">3. <strong>Government<\/strong><\/h2>\n\n\n\n<p>Government organizations and the military hold a variety of sensitive information and are thus becoming increasingly vulnerable to cyberattacks. For example, consider organizations that handle and store social security numbers, financial data, addresses, and biometrics such as fingerprints.<\/p>\n\n\n\n<p>These information points are not just susceptible but also attack pathways. Malicious hackers have more opportunities to access current systems or change various details if they have more knowledge.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">4. <strong>E-commerce<\/strong><\/h2>\n\n\n\n<p>Over the years, online shopping has grown in popularity, but the COVID-19 pandemic has caused tremendous growth in the 2020s. This is excellent news for businesses since e-commerce can reach a far bigger audience than traditional retailers. However, these businesses need a high level of cybersecurity, as the popularity of online shopping has led to a huge increase in cybercrime,&nbsp;costing $1 trillion in 2020 alone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">5. <strong>Manufacturing<\/strong><\/h2>\n\n\n\n<p>The manufacturing industry is one such industry that is undergoing a lot of technological disruptions. The industry\u2019s processes have been optimized by implementing Industry 4.0 technologies, such as Internet of Things (IoT) sensors, AI robotics, and factory management systems. However, the same technology has increased the vulnerability of manufacturing and warehouse networks to hackers and cyber-attacks<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Cybersecurity is a significant issue for all industries and companies. The risk of cyberattacks is high, and they can be costly to the business in the form of data breaches, ransomware and malware attacks, and more. Therefore, today cybersecurity has become vital for all businesses\u2013large or small and should always be on your radar, and it doesn\u2019t matter if you\u2019re in the finance industry or the manufacturing industry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the modern world, it is impossible to live without being connected. The Internet has become an integral part of our lives, and we rely<\/p>\n","protected":false},"author":1,"featured_media":145,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 Industries that require Advanced Cyber Security Measures<\/title>\n<meta name=\"description\" content=\"Companies and organizations need to Consider the Consequences of a Cyberattack on their business and take steps to Minimize the Risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Industries that require Advanced Cyber Security Measures\" \/>\n<meta property=\"og:description\" content=\"Companies and organizations need to Consider the Consequences of a Cyberattack on their business and take steps to Minimize the Risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Summit | Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-29T09:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T06:30:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/css-blog-2-img.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cyber-security-blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cyber-security-blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/\"},\"author\":{\"name\":\"cyber-security-blog\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\"},\"headline\":\"5 Industries that Require Advanced Cyber Security Measures\",\"datePublished\":\"2022-04-29T09:37:00+00:00\",\"dateModified\":\"2025-10-17T06:30:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/\"},\"wordCount\":608,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/css-blog-2-img.jpg\",\"articleSection\":[\"cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/\",\"name\":\"5 Industries that require Advanced Cyber Security Measures\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/css-blog-2-img.jpg\",\"datePublished\":\"2022-04-29T09:37:00+00:00\",\"dateModified\":\"2025-10-17T06:30:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\"},\"description\":\"Companies and organizations need to Consider the Consequences of a Cyberattack on their business and take steps to Minimize the Risks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/#primaryimage\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/css-blog-2-img.jpg\",\"contentUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/css-blog-2-img.jpg\",\"width\":1000,\"height\":515,\"caption\":\"Advanced Cyber Security Measures\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/5-industries-that-require-advanced-cyber-security-measures\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Industries that Require Advanced Cyber Security Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/\",\"name\":\"Cyber Security Summit Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\",\"name\":\"cyber-security-blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"caption\":\"cyber-security-blog\"},\"sameAs\":[\"https:\\\/\\\/www.cybersecuritysummitindia.com\\\/blogs\"],\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/author\\\/cyber-security-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Industries that require Advanced Cyber Security Measures","description":"Companies and organizations need to Consider the Consequences of a Cyberattack on their business and take steps to Minimize the Risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/","og_locale":"en_US","og_type":"article","og_title":"5 Industries that require Advanced Cyber Security Measures","og_description":"Companies and organizations need to Consider the Consequences of a Cyberattack on their business and take steps to Minimize the Risks.","og_url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/","og_site_name":"Cyber Security Summit | Blogs","article_published_time":"2022-04-29T09:37:00+00:00","article_modified_time":"2025-10-17T06:30:15+00:00","og_image":[{"width":1000,"height":515,"url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/css-blog-2-img.jpg","type":"image\/jpeg"}],"author":"cyber-security-blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cyber-security-blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/#article","isPartOf":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/"},"author":{"name":"cyber-security-blog","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015"},"headline":"5 Industries that Require Advanced Cyber Security Measures","datePublished":"2022-04-29T09:37:00+00:00","dateModified":"2025-10-17T06:30:15+00:00","mainEntityOfPage":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/"},"wordCount":608,"commentCount":0,"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/css-blog-2-img.jpg","articleSection":["cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/","name":"5 Industries that require Advanced Cyber Security Measures","isPartOf":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/#primaryimage"},"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/css-blog-2-img.jpg","datePublished":"2022-04-29T09:37:00+00:00","dateModified":"2025-10-17T06:30:15+00:00","author":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015"},"description":"Companies and organizations need to Consider the Consequences of a Cyberattack on their business and take steps to Minimize the Risks.","breadcrumb":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/#primaryimage","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/css-blog-2-img.jpg","contentUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/css-blog-2-img.jpg","width":1000,"height":515,"caption":"Advanced Cyber Security Measures"},{"@type":"BreadcrumbList","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/5-industries-that-require-advanced-cyber-security-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Industries that Require Advanced Cyber Security Measures"}]},{"@type":"WebSite","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#website","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/","name":"Cyber Security Summit Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015","name":"cyber-security-blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","caption":"cyber-security-blog"},"sameAs":["https:\/\/www.cybersecuritysummitindia.com\/blogs"],"url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/author\/cyber-security-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":2,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/144\/revisions"}],"predecessor-version":[{"id":444,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/144\/revisions\/444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/media\/145"}],"wp:attachment":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/media?parent=144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/categories?post=144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/tags?post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}