{"id":153,"date":"2022-03-08T10:10:00","date_gmt":"2022-03-08T10:10:00","guid":{"rendered":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/?p=153"},"modified":"2025-10-17T06:31:07","modified_gmt":"2025-10-17T06:31:07","slug":"cybersecurity-challenges-for-remote-hybrid-work","status":"publish","type":"post","link":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/","title":{"rendered":"Cybersecurity Challenges for Remote &amp; Hybrid work"},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>Introduction<\/strong><\/p>\n\n\n\n<p>The face of workplaces has changed significantly since the start of the COVID-19 outbreak. According to a&nbsp;Microsoft study, 73% of workers want to keep the flexible work arrangements created in response to COVID-19. This has seen a rise in the need for organizations to adapt to remote or hybrid working systems. However, after this shift in the working space of employees, cybersecurity risks have increased by more than 25%.<\/p>\n\n\n\n<p>On the other hand, data breach expenses have climbed dramatically YoY, from $3.86 million in 2020 to $4.24 million in 2021, according to IBM\u2019s report. The average cost of a data breach was more significant in organizations with more than 60% of employees working remotely than the general average cost.<\/p>\n\n\n\n<p>Managing security across remote or hybrid work environments is one of the most challenging for enterprise IT teams. This post will cover some of the most frequent cyber security challenges, and risks that businesses encounter when implementing cybersecurity solutions for remote and hybrid work.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">1.<strong>Security risks in the cloud<\/strong><\/h2>\n\n\n\n<p>Cloud-based applications are similar to other apps in that they are designed to make work more manageable, and most of the organization\u2019s work runs on these&nbsp;cloud-based applications. Even though there are numerous advantages of cloud-based applications, these applications add even another degree of complexity to data management. They also expose organizations to new cybersecurity threats, posing a new set of administrative issues for IT departments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">2.<strong><a href=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/how-to-train-employees-in-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Employees\u2019 lack of security awareness training<\/a><\/strong><\/h2>\n\n\n\n<p>Most companies ignore security awareness training for work-at-home employees, which poses a significant danger to an organization\u2019s cyber security.&nbsp;According to IBM, the number of insider events involving credential theft has increased in frequency and cost since 2016, which could be prevented with proper training.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">3.<strong>Data loss and data leakage risks<\/strong><\/h2>\n\n\n\n<p>When remote workers use a wide range of devices and network gateways, store data in multiple locations, and access different versions of programs they need to complete their tasks, they increase the risk of data loss or harm.<\/p>\n\n\n\n<p>As a result, IT teams must adopt policies that restrict accounts based on granular access for individuals, group permissions, locations, and devices, among other things, to minimize or reduce the risk of malicious activity and data loss.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">4.<strong>Lack of physical security and monitoring of virtual workspaces<\/strong><\/h2>\n\n\n\n<p>Hybrid workspaces are difficult to monitor because of the lack of physical security measures. This means that, while dispersed teams\u2019 capacity to communicate securely is one of the most critical variables in assuring efficiency, it\u2019s also one of the key factors that might put enterprises at risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">5.<strong><a href=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-in-the-age-of-remote-work\/\" target=\"_blank\" rel=\"noreferrer noopener\">Remote workers<\/a> can be easier targets<\/strong><\/h2>\n\n\n\n<p>Some of the concerns that security professionals regularly confront with remote workers include network security challenges such as weak or no home Wi-Fi security, computers shared among family members, missing firewalls, un-secure mobile devices, poor security hygiene, etc. Remote workers may also lack internet access or speed, delaying software updating and potentially leaving vulnerable places for fraudsters to exploit. Unauthorized software and shadow IT can potentially jeopardize a company\u2019s entire cybersecurity posture.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>In this cyber-attack-prone world, empowering remote workers to be safer with the right training is critical. According to a Tessian\u2019s poll of 250, IT decision-makers and 2,000 working professionals, nearly 60% of IT leaders expect to increase cybersecurity awareness training if their organization transitions to a permanent hybrid work environment.<\/p>\n\n\n\n<p>Along with enhancing an organization\u2019s cybersecurity with advanced security models such as&nbsp;zero trust security, initiatives like these are necessary for organizations to combat cybersecurity issues in the age of remote and hybrid working.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction The face of workplaces has changed significantly since the start of the COVID-19 outbreak. According to a&nbsp;Microsoft study, 73% of workers want to keep<\/p>\n","protected":false},"author":1,"featured_media":154,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Challenges for Remote &amp; Hybrid work.<\/title>\n<meta name=\"description\" content=\"Managing security across Remote or Hybrid Work Environments is one of the most Challenging for Enterprise IT teams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Challenges for Remote &amp; Hybrid work.\" \/>\n<meta property=\"og:description\" content=\"Managing security across Remote or Hybrid Work Environments is one of the most Challenging for Enterprise IT teams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Summit | Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-08T10:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T06:31:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/service_2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cyber-security-blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cyber-security-blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/\"},\"author\":{\"name\":\"cyber-security-blog\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\"},\"headline\":\"Cybersecurity Challenges for Remote &amp; Hybrid work\",\"datePublished\":\"2022-03-08T10:10:00+00:00\",\"dateModified\":\"2025-10-17T06:31:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/\"},\"wordCount\":594,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/service_2-1.jpg\",\"articleSection\":[\"cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/\",\"name\":\"Cybersecurity Challenges for Remote & Hybrid work.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/service_2-1.jpg\",\"datePublished\":\"2022-03-08T10:10:00+00:00\",\"dateModified\":\"2025-10-17T06:31:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\"},\"description\":\"Managing security across Remote or Hybrid Work Environments is one of the most Challenging for Enterprise IT teams.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/service_2-1.jpg\",\"contentUrl\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/service_2-1.jpg\",\"width\":1000,\"height\":500,\"caption\":\"Cybersecurity Challenges for Remote & Hybrid work\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/cybersecurity-challenges-for-remote-hybrid-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Challenges for Remote &amp; Hybrid work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/\",\"name\":\"Cyber Security Summit Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/#\\\/schema\\\/person\\\/b577e17e4103ae2c9f712a5ea9c7e015\",\"name\":\"cyber-security-blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g\",\"caption\":\"cyber-security-blog\"},\"sameAs\":[\"https:\\\/\\\/www.cybersecuritysummitindia.com\\\/blogs\"],\"url\":\"https:\\\/\\\/exito-e.com\\\/cybersecuritysummit\\\/blog\\\/author\\\/cyber-security-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Challenges for Remote & Hybrid work.","description":"Managing security across Remote or Hybrid Work Environments is one of the most Challenging for Enterprise IT teams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Challenges for Remote & Hybrid work.","og_description":"Managing security across Remote or Hybrid Work Environments is one of the most Challenging for Enterprise IT teams.","og_url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/","og_site_name":"Cyber Security Summit | Blogs","article_published_time":"2022-03-08T10:10:00+00:00","article_modified_time":"2025-10-17T06:31:07+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/service_2-1.jpg","type":"image\/jpeg"}],"author":"cyber-security-blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"cyber-security-blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/#article","isPartOf":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/"},"author":{"name":"cyber-security-blog","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015"},"headline":"Cybersecurity Challenges for Remote &amp; Hybrid work","datePublished":"2022-03-08T10:10:00+00:00","dateModified":"2025-10-17T06:31:07+00:00","mainEntityOfPage":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/"},"wordCount":594,"commentCount":0,"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/service_2-1.jpg","articleSection":["cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/","name":"Cybersecurity Challenges for Remote & Hybrid work.","isPartOf":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/#primaryimage"},"image":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/#primaryimage"},"thumbnailUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/service_2-1.jpg","datePublished":"2022-03-08T10:10:00+00:00","dateModified":"2025-10-17T06:31:07+00:00","author":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015"},"description":"Managing security across Remote or Hybrid Work Environments is one of the most Challenging for Enterprise IT teams.","breadcrumb":{"@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/#primaryimage","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/service_2-1.jpg","contentUrl":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-content\/uploads\/2022\/05\/service_2-1.jpg","width":1000,"height":500,"caption":"Cybersecurity Challenges for Remote & Hybrid work"},{"@type":"BreadcrumbList","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/cybersecurity-challenges-for-remote-hybrid-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Challenges for Remote &amp; Hybrid work"}]},{"@type":"WebSite","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#website","url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/","name":"Cyber Security Summit Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/#\/schema\/person\/b577e17e4103ae2c9f712a5ea9c7e015","name":"cyber-security-blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5633e03856d812007a03f225c948ee3174c854c109072c782283501ec95c5878?s=96&d=mm&r=g","caption":"cyber-security-blog"},"sameAs":["https:\/\/www.cybersecuritysummitindia.com\/blogs"],"url":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/author\/cyber-security-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/comments?post=153"}],"version-history":[{"count":2,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/153\/revisions"}],"predecessor-version":[{"id":446,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/posts\/153\/revisions\/446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/media\/154"}],"wp:attachment":[{"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/media?parent=153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/categories?post=153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exito-e.com\/cybersecuritysummit\/blog\/wp-json\/wp\/v2\/tags?post=153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}