{"id":21665,"date":"2024-09-12T15:52:52","date_gmt":"2024-09-12T14:52:52","guid":{"rendered":"https:\/\/interface.media\/?p=21665"},"modified":"2024-09-12T15:52:59","modified_gmt":"2024-09-12T14:52:59","slug":"3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection","status":"publish","type":"post","link":"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/","title":{"rendered":"3 reasons you need a new cyber-resilient approach to data protection"},"content":{"rendered":"\n<p>Ransomware attacks today have become more sophisticated and can have more massive consequences than ever before. For example, in 2024, attackers hit the UK\u2019s NHS with a ransomware cyber-attack against pathology services provider Synovis. The attack caused widespread delays to outpatient appointments and required the NHS to postpone elective procedures.\u00a0<\/p>\n\n\n\n<p>Organisations have to be on high alert to make sure their business-critical data is always protected and that they remain operational without impacting customers \u2014 even in the event of an <a href=\"https:\/\/interface.media\/blog\/2024\/09\/05\/4-ways-uk-businesses-can-defend-against-the-rising-tide-of-supply-chain-cyber-attacks\/\">attack<\/a>.\u00a0<\/p>\n\n\n\n<p>To stay future-proof, organisations are beginning to realise the value of adopting a new way of protecting data assets known as a cyber resilience approach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-three-reasons-to-re-evaluate-your-security-posture\">Three reasons to re-evaluate your security posture<\/h3>\n\n\n\n<p>Three recent technology developments have turned standard cybersecurity measures on their head.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-1-ai-is-empowering-criminals-to-increase-the-volume-and-precision-of-their-attacks-nbsp\"><strong>1. AI is empowering criminals to increase the volume and precision of their attacks.<\/strong>&nbsp;<\/h4>\n\n\n\n<p>The <a href=\"https:\/\/www.ncsc.gov.uk\/report\/impact-of-ai-on-cyber-threat\" target=\"_blank\" rel=\"noreferrer noopener\">UK\u2019s National Cyber Security Centre<\/a> noted the increased effectiveness, speed and sophistication that AI will give attackers. The year after ChatGPT was released, phishing activity increased <a href=\"https:\/\/slashnext.com\/state-of-phishing-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">1,265%,<\/a> and successful <a href=\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/\">ransomware attacks<\/a> rose 95%.\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-2-organisations-must-watch-for-immutability-washing-nbsp\"><strong>2. Organisations must watch for \u201cimmutability-washing.\u201d<\/strong>&nbsp;<\/h4>\n\n\n\n<p>In other words, just because something purports to be immutable doesn\u2019t mean it really is. Truly ransomware-proof security is not what most &#8220;immutable&#8221; storage solutions are offering. Some solutions use periodic snapshots to make data immutable, but that creates periods of vulnerability. Some solutions don\u2019t offer immutability at the architecture level \u2013 just at the API level. But immutability at the software level isn\u2019t enough; it opens the door for attackers to evade the system\u2019s defences.&nbsp;<\/p>\n\n\n\n<p>Attackers are getting better at exploiting the vulnerabilities of flawed immutable storage. To create a truly immutable system, organisations must deploy solutions that prevent deletion and overwriting of data at the foundational level.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-3-the-rise-in-exfiltration-attacks-needs-addressing-nbsp\"><strong>3. The rise in exfiltration attacks needs addressing<\/strong>.&nbsp;<\/h4>\n\n\n\n<p>Today&#8217;s ransomware attackers not only encrypt data; they now exfiltrate that data. Then they threaten to publish or sell it unless you pay a ransom. Data exfiltration is part of <a href=\"https:\/\/securitybrief.co.uk\/story\/blackfog-report-reveals-alarming-rise-in-ransomware-attacks-in-2023\" target=\"_blank\" rel=\"noreferrer noopener\">91% of ransomware attacks<\/a> today.\u00a0<\/p>\n\n\n\n<p>Immutably alone can&#8217;t stop exfiltration attacks because they don&#8217;t rely on changing, deleting or encrypting data to demand a ransom. To defeat data exfiltration, you need a multi-layered approach that secures sensitive data everywhere it exists. Most providers have not hardened their offerings against common exfiltration techniques.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-moving-beyond-immutability-nbsp-the-five-key-layers-of-end-to-end-cyber-resilience\">Moving beyond immutability:&nbsp; The five key layers of end-to-end cyber resilience<\/h3>\n\n\n\n<p>Relying solely on immutable backups won\u2019t protect data against all the current and emerging ransomware perils. It\u2019s time for organisations to move beyond basic immutability and adopt a more holistic security paradigm of end-to-end cyber resilience.<\/p>\n\n\n\n<p>This paradigm includes the strongest type of true immutability. But it doesn&#8217;t stop there; it includes strong, multi-layer defences to defeat data exfiltration and other emergent threats such as AI-enhanced malware. This entails creating security measures at every level to shut down as many threat types as possible and achieve end-to-end cyber resilience. These levels include:&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-api\">API<\/h4>\n\n\n\n<p>Amazon shook up the storage industry when it introduced its immutability API (AWS S3 Object Lock) six years ago. It offers the highest protection against encryption-based ransomware attacks and creates a default interface for common data security apps. In addition, the S3 API\u2019s granular control over data immutability enables compliance with the strictest data retention requirements. For the modern storage system, these capabilities are must-haves.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-data-nbsp\">Data&nbsp;<\/h4>\n\n\n\n<p>Stopping data exfiltration is the goal here. Anywhere sensitive data exists, organisations need to deploy strict data security measures. To make sure backup data can\u2019t be accessed or intercepted by unauthorised parties, what\u2019s needed is a hardened storage solution that has many layers of security at the data level. That includes broad cryptographic and identity and access management (IAM) features.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-storage-nbsp\">Storage&nbsp;<\/h4>\n\n\n\n<p>Should an advanced hacker get root access to a storage server, they can evade API-level protections and gain unfettered access to all the server\u2019s data. Sophisticated, AI-powered tools and techniques that defeat authentication make attacks like this harder to defeat. A storage system must make sure data is safe \u2013 even if a bad actor finds their way into the deepest level of an organisation\u2019s storage system.\u00a0<\/p>\n\n\n\n<p>Next-gen solutions address this scenario with distributed erasure coding technology. It makes data at the storage level unintelligible to hackers and not worth exfiltrating. An IT team can also use it to completely reconstruct any data lost or corrupted in an attack. This works even if several drives or a whole server are destroyed.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-geographic-nbsp\">Geographic&nbsp;<\/h4>\n\n\n\n<p>Storing data in one location makes it especially susceptible to attack. Bad actors try to infiltrate several organisations at once by attacking data centres or other high-value targets. This raises the odds of actually getting the ransom. Today\u2019s storage recommendations include having many offsite backups, geographically separate, to defend data from vulnerabilities at one site.\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-architecture-nbsp\">Architecture&nbsp;<\/h4>\n\n\n\n<p>The security of storage architecture determines the security of the storage system. That\u2019s why cyber resilience must focus on getting rid of vulnerabilities located in the core system architecture.&nbsp;When a ransomware attack is in process, one of the first things an attacker tries to do is to escalate their privileges. If they can do that, then they can deactivate or otherwise bypass immutability protections at the API level.<\/p>\n\n\n\n<p>If a standard file system or another intrinsically mutable architecture is the foundation of an organisation\u2019s storage system, its data is left out in the open. The risk of ransomware attacks at the architecture level increases if a storage system is founded on a vulnerable architecture, given the explosion of malware and hacking tools enhanced by AI.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-go-beyond-immutable-nbsp-staying-ahead-of-ai-fuelled-ransomware-nbsp\">Go beyond immutable:&nbsp; Staying ahead of AI-fuelled ransomware&nbsp;<\/h3>\n\n\n\n<p>AI-powered ransomware attacks are on the rise, rendering many traditional approaches to protect backup data ineffective. Immutability is a must, but it\u2019s not enough to combat the increasing sophistication of cyber criminals \u2013 and not only that, but most so-called immutable solutions really aren\u2019t.&nbsp;<\/p>\n\n\n\n<p>What\u2019s organisations needed today is end-to-end cyber resilience that addresses five key levels in order to future-proof their data security strategy.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Candida Valois, field CTO at Scality, explores the rise in ransomware and how to take meaningful steps to protect your organisation and its data. <\/p>\n","protected":false},"author":480,"featured_media":21666,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"apple_news_api_created_at":"2024-09-12T14:52:57Z","apple_news_api_id":"8f6f9d53-6299-4bd7-bd3e-c07c71253714","apple_news_api_modified_at":"2024-09-12T14:52:57Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/Aj2-dU2KZS9e9PsB8cSU3FA","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[3],"tags":[],"topic":[613,650],"class_list":["post-21665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-interface","topic-cybersecurity","topic-digital-strategy"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 reasons you need a new cyber-resilient approach to data protection - Interface<\/title>\n<meta name=\"description\" content=\"Candida Valois, field CTO at Scality, explores the rise in ransomware and how to take meaningful steps to protect your organisation and its data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 reasons you need a new cyber-resilient approach to data protection\" \/>\n<meta property=\"og:description\" content=\"Candida Valois, field CTO at Scality, explores the rise in ransomware and how to take meaningful steps to protect your organisation and its data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Interface\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-12T14:52:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-12T14:52:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2165712946.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1414\" \/>\n\t<meta property=\"og:image:height\" content=\"742\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Brightmore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Brightmore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/\",\"url\":\"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/\",\"name\":\"3 reasons you need a new cyber-resilient approach to data protection - Interface\",\"isPartOf\":{\"@id\":\"https:\/\/interface.media\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2165712946.jpg\",\"datePublished\":\"2024-09-12T14:52:52+00:00\",\"dateModified\":\"2024-09-12T14:52:59+00:00\",\"author\":{\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\"},\"description\":\"Candida Valois, field CTO at Scality, explores the rise in ransomware and how to take meaningful steps to protect your organisation and its data.\",\"breadcrumb\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#primaryimage\",\"url\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2165712946.jpg\",\"contentUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2165712946.jpg\",\"width\":1414,\"height\":742,\"caption\":\"Brutalist geometric shapes, dotted objects. Stipple elements modern symbols. Simple primitive forms. Retro design, trendy contemporary minimalist style, y2k. Dot shading, drawing. Vector illustration.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/interface.media\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 reasons you need a new cyber-resilient approach to data protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/interface.media\/#website\",\"url\":\"https:\/\/interface.media\/\",\"name\":\"Interface\",\"description\":\"Delivering World Class Content \u201cFrom Executive, For Executive\u201c\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/interface.media\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\",\"name\":\"Dan Brightmore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"caption\":\"Dan Brightmore\"},\"url\":\"https:\/\/interface.media\/blog\/author\/dbrightmore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"3 reasons you need a new cyber-resilient approach to data protection - Interface","description":"Candida Valois, field CTO at Scality, explores the rise in ransomware and how to take meaningful steps to protect your organisation and its data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"3 reasons you need a new cyber-resilient approach to data protection","og_description":"Candida Valois, field CTO at Scality, explores the rise in ransomware and how to take meaningful steps to protect your organisation and its data.","og_url":"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/","og_site_name":"Interface","article_published_time":"2024-09-12T14:52:52+00:00","article_modified_time":"2024-09-12T14:52:59+00:00","og_image":[{"width":1414,"height":742,"url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2165712946.jpg","type":"image\/jpeg"}],"author":"Dan Brightmore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Brightmore","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/","url":"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/","name":"3 reasons you need a new cyber-resilient approach to data protection - Interface","isPartOf":{"@id":"https:\/\/interface.media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#primaryimage"},"image":{"@id":"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2165712946.jpg","datePublished":"2024-09-12T14:52:52+00:00","dateModified":"2024-09-12T14:52:59+00:00","author":{"@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748"},"description":"Candida Valois, field CTO at Scality, explores the rise in ransomware and how to take meaningful steps to protect your organisation and its data.","breadcrumb":{"@id":"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#primaryimage","url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2165712946.jpg","contentUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/09\/iStock-2165712946.jpg","width":1414,"height":742,"caption":"Brutalist geometric shapes, dotted objects. Stipple elements modern symbols. Simple primitive forms. Retro design, trendy contemporary minimalist style, y2k. Dot shading, drawing. Vector illustration."},{"@type":"BreadcrumbList","@id":"https:\/\/interface.media\/blog\/2024\/09\/12\/3-reasons-you-need-a-new-cyber-resilient-approach-to-data-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interface.media\/"},{"@type":"ListItem","position":2,"name":"3 reasons you need a new cyber-resilient approach to data protection"}]},{"@type":"WebSite","@id":"https:\/\/interface.media\/#website","url":"https:\/\/interface.media\/","name":"Interface","description":"Delivering World Class Content \u201cFrom Executive, For Executive\u201c","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interface.media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748","name":"Dan Brightmore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","caption":"Dan Brightmore"},"url":"https:\/\/interface.media\/blog\/author\/dbrightmore\/"}]}},"_links":{"self":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/comments?post=21665"}],"version-history":[{"count":1,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21665\/revisions"}],"predecessor-version":[{"id":21667,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21665\/revisions\/21667"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media\/21666"}],"wp:attachment":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media?parent=21665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/categories?post=21665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/tags?post=21665"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/topic?post=21665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}