{"id":21630,"date":"2024-09-05T10:51:19","date_gmt":"2024-09-05T09:51:19","guid":{"rendered":"https:\/\/interface.media\/?p=21630"},"modified":"2024-09-05T10:51:26","modified_gmt":"2024-09-05T09:51:26","slug":"4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks","status":"publish","type":"post","link":"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/","title":{"rendered":"4 ways UK businesses can defend against the rising tide of supply chain cyber attacks"},"content":{"rendered":"\n<p>In an increasingly interconnected world, the importance of robust cybersecurity measures cannot be overstated.&nbsp;<\/p>\n\n\n\n<p>At present, one of the pressing security concerns facing organisations is <a href=\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/\">supply chain attacks<\/a>. Supply chain attacks are a sophisticated, extremely harmful threat technique in which\u00a0<a href=\"https:\/\/supplychainstrategy.media\/blog\/2024\/06\/14\/software-supply-chains-experiencing-severe-cyber-risk\/\">cybercriminals target organisations<\/a>\u00a0by infiltrating or compromising the least secure aspects of a company\u2019s increasingly broad digital ecosystem.<\/p>\n\n\n\n<p>Critically, these attacks specifically exploit interdependencies between companies and their digital suppliers, service providers or other online third-party partners. This makes them particularly challenging to&nbsp;<a href=\"https:\/\/supplychainstrategy.media\/blog\/2024\/05\/29\/developing-a-better-defence-against-software-supply-chain-threats\/\">defend against<\/a>.<\/p>\n\n\n\n<p>Several notable examples of supply chain attacks highlight their potentially devastating impacts, such as the recent attack on the NHS. Several hospitals were forced to cancel operations and blood transfusions following an attack on IT company Synnovis. The IT company was hit by a major ransomware attack. The consequences have affected thousands of patients. In response, the NHS has&nbsp;<a href=\"https:\/\/supplychainstrategy.media\/blog\/2024\/06\/10\/nhs-blood-supply-chain-faces-continued-disruption-in-the-wake-of-third-party-ransomware-cyber-attack\/\">issued a major call for blood donors<\/a>&nbsp;as it struggles to match patient\u2019s blood quickly.&nbsp;<\/p>\n\n\n\n<p>There was also the Okta supply chain breach disclosed in early 2022. Here, a third-party contractor\u2019s systems were breached, subsequently impacting the leading identity and access management firm. Critically, hackers managed to extract information from Okta\u2019s customer support system. This gave them access to sensitive data such as its clients\u2019 names and email addresses.&nbsp;<\/p>\n\n\n\n<p>Similarly, the MOVEit breach stands as another noteworthy example. Discovered in 2023, this incident involved the exploitation of a zero-day vulnerability in the MOVEit Transfer software\u2014a widely used file transfer application developed by Progress Software. The breach led to the unauthorised access and theft of data from numerous organisations globally. The attack was so bad that the&nbsp;<a href=\"https:\/\/www.ncsc.gov.uk\/information\/moveit-vulnerability\">NCSC provided its own information, advice, and assistance to<\/a>&nbsp;affected companies.<\/p>\n\n\n\n<p>Indeed, these two incidents, among many, highlight a crucial lesson for organisations: as supply chain threats become increasingly prevalent and complex, firms must recognise that their security is only as strong as the weakest link in their network of suppliers and partners.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-79-of-uk-businesses-have-experienced-supply-chain-related-security-incidents\">79% of UK businesses have experienced supply chain-related security incidents<\/h3>\n\n\n\n<p>Seeking to ascertain just how widespread the issue of supply chain attacks is at present, ISMS.online recently surveyed 1,526 security professionals globally to uncover their own experiences.&nbsp;<\/p>\n\n\n\n<p>Our latest&nbsp;<a href=\"https:\/\/www.isms.online\/state-of-infosec-24\/\">State of Information Security report details<\/a>&nbsp;the seriousness of the situation facing UK companies. Critically, we discovered that 41% of UK businesses had been subject to partner data compromises in the last 12 months. Further, a staggering 79% reported having experienced security incidents originating from their supply chain or third-party vendors\u2014up 22% versus the previous year.<\/p>\n\n\n\n<p>The message from this dramatic spike in statistics is clear. Supply chain vulnerabilities are not only becoming more prevalent but are also increasingly exploited by cybercriminals. This highlights the urgent need for comprehensive and collaborative cybersecurity measures across all levels of the supply chain.<\/p>\n\n\n\n<p>Indeed, companies must work to mitigate these threats and minimise their risk exposure by reassessing their cybersecurity strategies. But where and how exactly should they focus their efforts? At ISMS.online, we believe that there are four key areas that companies should prioritise when it comes to achieving best practices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-stronger-supply-chain-vetting-processes\">1. Stronger supply chain vetting processes<\/h3>\n\n\n\n<p>First, it is critical to implement rigorous security vetting processes when selecting partners and suppliers. This involves thorough due diligence, assessing potential partners\u2019 security posture and cybersecurity measures, and reviewing past security incidents and responses. Companies should also evaluate compliance with relevant regulations and continually monitor their partners\u2019 security practices where appropriate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-enhanced-cybersecurity-measures\">2. Enhanced cybersecurity measures<\/h3>\n\n\n\n<p>Of course, it\u2019s not good to demand that partners have robust security measures without <a href=\"https:\/\/interface.media\/blog\/2024\/08\/19\/meeting-the-zero-trust-mandate-with-single-stack-security\/\">adopting best practices yourself<\/a>. Therefore, bolstering internal cybersecurity measures and extending them to the supply chain is needed to significantly reduce risks. <\/p>\n\n\n\n<p>Here, strategies to consider include the regular auditing of internal systems, comprehensive employee training in cyber threat recognition and response, the adoption of advanced cybersecurity technologies like multi-factor authentication and encryption and keeping an updated and unique incident response plan in case of supply chain breaches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-robust-partnership-agreements\">3. Robust partnership agreements<\/h3>\n\n\n\n<p>Detailed and stringent partnership agreements will undoubtedly help establish clear cybersecurity expectations and responsibilities. Indeed, it is important to define security requirements, request regular security status reports, and define access controls to safeguard sensitive information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-alignment-with-essential-standards\">4. Alignment with essential standards<\/h3>\n\n\n\n<p>Aligning with critical standards and asking that partners and clients do the same can be a highly effective way of ensuring consistent and high-security levels across the supply chain. Of course, there are a variety of standards to consider. However, for UK companies, some of the most important ones to align with include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cyber Essentials<\/strong>: A UK government-backed scheme designed to help organisations protect themselves against common cyber threats by providing clear guidance regarding basic security controls.<\/li>\n\n\n\n<li><strong>ISO 27001<\/strong>: An international standard for information security management systems that provides a systematic approach to managing sensitive company information, ensuring it remains secure.<\/li>\n\n\n\n<li><strong>NCSC Supply Chain Security Guidance<\/strong>: A comprehensive supply chain security guide providing recommendations about managing supply chain risks, implementing robust cybersecurity measures, and ensuring continuous monitoring and improvement.<\/li>\n<\/ul>\n\n\n\n<p>Given the growing threat of supply chain attacks, it is imperative to demand the adoption of cybersecurity best practices both internally and among suppliers, service providers, and partners.&nbsp;<\/p>\n\n\n\n<p>From aligning with essential standards to developing new partnership agreements, it can feel like a daunting or challenging task. Indeed, the difficulty for many companies is knowing where to start. However, achieving best practices on each of these fronts doesn\u2019t need to be as daunting or burdensome as the businesses might think.<\/p>\n\n\n\n<p>Indeed, with proper support and guidance, best practices can be adopted, followed internally, and advocated externally with relative ease.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Luke Dash, CEO at ISMS.online, explores the rising tide of supply chain cyber attacks on UK organisations and how companies can beat the odds.<\/p>\n","protected":false},"author":480,"featured_media":21636,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"apple_news_api_created_at":"2024-09-05T09:51:22Z","apple_news_api_id":"50c1c6d5-6fbd-48c5-b91e-fd2582492ff7","apple_news_api_modified_at":"2024-09-05T09:51:22Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AUMHG1W-9SMW5Hv0lgkkv9w","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[3],"tags":[],"topic":[613],"class_list":["post-21630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-interface","topic-cybersecurity"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 ways UK businesses can defend against the rising tide of supply chain cyber attacks - Interface<\/title>\n<meta name=\"description\" content=\"Luke Dash, CEO at ISMS.online, explores the rising tide of supply chain cyber attacks on UK organisations and how companies can beat the odds.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 ways UK businesses can defend against the rising tide of supply chain cyber attacks\" \/>\n<meta property=\"og:description\" content=\"Luke Dash, CEO at ISMS.online, explores the rising tide of supply chain cyber attacks on UK organisations and how companies can beat the odds.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Interface\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-05T09:51:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:51:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2047054219.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Brightmore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Brightmore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/\",\"url\":\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/\",\"name\":\"4 ways UK businesses can defend against the rising tide of supply chain cyber attacks - Interface\",\"isPartOf\":{\"@id\":\"https:\/\/interface.media\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2047054219.jpg\",\"datePublished\":\"2024-09-05T09:51:19+00:00\",\"dateModified\":\"2024-09-05T09:51:26+00:00\",\"author\":{\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\"},\"description\":\"Luke Dash, CEO at ISMS.online, explores the rising tide of supply chain cyber attacks on UK organisations and how companies can beat the odds.\",\"breadcrumb\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#primaryimage\",\"url\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2047054219.jpg\",\"contentUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2047054219.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"E-mail phishing icon. Fraud email alert, scam malware notification concept. E-mail spam message with hook trojan viruses. Vector isolated illustration on black background with icons.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/interface.media\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 ways UK businesses can defend against the rising tide of supply chain cyber attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/interface.media\/#website\",\"url\":\"https:\/\/interface.media\/\",\"name\":\"Interface\",\"description\":\"Delivering World Class Content \u201cFrom Executive, For Executive\u201c\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/interface.media\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\",\"name\":\"Dan Brightmore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"caption\":\"Dan Brightmore\"},\"url\":\"https:\/\/interface.media\/blog\/author\/dbrightmore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"4 ways UK businesses can defend against the rising tide of supply chain cyber attacks - Interface","description":"Luke Dash, CEO at ISMS.online, explores the rising tide of supply chain cyber attacks on UK organisations and how companies can beat the odds.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"4 ways UK businesses can defend against the rising tide of supply chain cyber attacks","og_description":"Luke Dash, CEO at ISMS.online, explores the rising tide of supply chain cyber attacks on UK organisations and how companies can beat the odds.","og_url":"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/","og_site_name":"Interface","article_published_time":"2024-09-05T09:51:19+00:00","article_modified_time":"2024-09-05T09:51:26+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2047054219.jpg","type":"image\/jpeg"}],"author":"Dan Brightmore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Brightmore","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/","url":"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/","name":"4 ways UK businesses can defend against the rising tide of supply chain cyber attacks - Interface","isPartOf":{"@id":"https:\/\/interface.media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2047054219.jpg","datePublished":"2024-09-05T09:51:19+00:00","dateModified":"2024-09-05T09:51:26+00:00","author":{"@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748"},"description":"Luke Dash, CEO at ISMS.online, explores the rising tide of supply chain cyber attacks on UK organisations and how companies can beat the odds.","breadcrumb":{"@id":"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#primaryimage","url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2047054219.jpg","contentUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2047054219.jpg","width":1024,"height":1024,"caption":"E-mail phishing icon. Fraud email alert, scam malware notification concept. E-mail spam message with hook trojan viruses. Vector isolated illustration on black background with icons."},{"@type":"BreadcrumbList","@id":"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interface.media\/"},{"@type":"ListItem","position":2,"name":"4 ways UK businesses can defend against the rising tide of supply chain cyber attacks"}]},{"@type":"WebSite","@id":"https:\/\/interface.media\/#website","url":"https:\/\/interface.media\/","name":"Interface","description":"Delivering World Class Content \u201cFrom Executive, For Executive\u201c","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interface.media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748","name":"Dan Brightmore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","caption":"Dan Brightmore"},"url":"https:\/\/interface.media\/blog\/author\/dbrightmore\/"}]}},"_links":{"self":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/comments?post=21630"}],"version-history":[{"count":1,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21630\/revisions"}],"predecessor-version":[{"id":21640,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21630\/revisions\/21640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media\/21636"}],"wp:attachment":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media?parent=21630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/categories?post=21630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/tags?post=21630"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/topic?post=21630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}