{"id":22721,"date":"2025-03-21T15:25:25","date_gmt":"2025-03-21T15:25:25","guid":{"rendered":"https:\/\/interface.media\/?p=22721"},"modified":"2025-03-21T15:25:32","modified_gmt":"2025-03-21T15:25:32","slug":"underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight","status":"publish","type":"post","link":"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/","title":{"rendered":"Underestimated, under-mature, under fire? UK cybersecurity in the spotlight"},"content":{"rendered":"\n<p>A new year always brings a fresh impetus to look again at the business\u2019 cybersecurity posture \u2013 and perhaps to find ways to strengthen it.<\/p>\n\n\n\n<p>At the tail end of 2024, the UK\u2019s National Cyber Security Centre highlighted the fact that cyber-related risks facing the UK are being &#8220;<a href=\"https:\/\/www.ncsc.gov.uk\/news\/risk-facing-uk-widely-underestimated-cyber-chief-to-warn-in-first-major-speech\">widely underestimated<\/a>&#8220;, the cyber chief warned in their first major speech after last year\u2019s appointment. As businesses evolve and digital threats grow more sophisticated, prioritising readiness has never been more critical. In 2024, only 2% of UK organisations achieved a \u2018<a href=\"https:\/\/newsroom.cisco.com\/c\/dam\/r\/newsroom\/en\/us\/interactive\/cybersecurity-readiness-index\/documents\/Cisco_Cybersecurity_Readiness_UK.pdf\">mature<\/a>\u2019 level of readiness according to research from Cisco: a 15% drop from the previous year.<\/p>\n\n\n\n<p>There\u2019s every reason to turn this trend around in 2025. If the threats from continuing geopolitical, warfare and cybercrime were not enough motivation; the rapid acceleration and adoption of AI will surely keep the CISO up at night. Fortunately, the security industry doesn\u2019t require any upending. There are globally recognised best practices, widely understood technologies, and well-respected regulations and certifications to support businesses improving their security posture. The difficulty in the management of these threats comes from the limited supply of time, personnel, resources, all of which are in demand throughout a business and the IT organisation that supports them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-crises-are-sure-to-come-why-not-practice\">Crises are sure to come. Why not practice?<\/h3>\n\n\n\n<p>Simulating crises is a very practical way of identifying where ones\u2019 weaknesses lie; whether it be a missing policy, weak controls, or absent documentation of procedures. The outcomes of these exercises provide businesses with a clear view of their vulnerabilities. They then help those businesses develop and act on a list of priorities. Thus, when a real crisis appears the business will be in a good position to blunt its impact.<\/p>\n\n\n\n<p>Start off with some clear questions that you\u2019re looking to test. Online resources or industry consultants can help. However, at first, all you might need to do is give the matter some careful thought. For example,\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What are the most important functions your business needs in order to meet their customers\u2019 expectations and maintain revenue? This would include the people, processes and systems. Answering this question will allow businesses to narrow the focus of what is critical to protect.<\/li>\n\n\n\n<li>Do your staff know who to contact if they receive a phishing email or suspect a ransomware attack, data breach, virus, or any other IT incident?<\/li>\n\n\n\n<li>Do the responsible leaders, teams, and service providers understand the steps for investigation, remediation, crisis communications, and any legal responsibilities?<\/li>\n<\/ul>\n\n\n\n<p>The results of a crisis simulation and the questions it elicits will allow leaders to refine business procedures for a variety of scenarios; from cybersecurity incidents to those in other domains that rely on similar muscles, such as a key vendor going offline, or negative customer feedback going viral.<\/p>\n\n\n\n<p>Lessons from a simulation or test allows one to assign roles and responsibilities in advance, so teams, as well as individuals, know exactly what to do when under pressure. Additionally, practice of response procedures will build confidence, and staff will feel prepared rather than panicked in the event of a real crisis.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-build-a-company-wide-culture-of-cybersecurity-and-test-measure-it\">Build a company-wide culture of cybersecurity and test\/measure it<\/h3>\n\n\n\n<p>Cultural change is a major lever in making anything happen across any domain.&nbsp;<\/p>\n\n\n\n<p>For cyber security to be seen as important to a business, an organisation needs to craft the message that security is everyone\u2019s responsibility (not just IT\u2019s); and that for it to be effective, everyone plays an important role. Most security leaders will agree that most places and people assume that \u2018someone else\u2019 handles security and it isn\u2019t really something to worry about.&nbsp;<\/p>\n\n\n\n<p>This attitude often leads to employees who either created a security incident or are involved in one to \u2018pass the buck\u2019 to the technology organisation. This is a damaging mindset that will perpetuate a weak security posture.<\/p>\n\n\n\n<p>Social engineering, particularly phishing, remains the most significant threat for all businesses. Many lack dedicated security teams, thus making employee awareness even more crucial.&nbsp;<\/p>\n\n\n\n<p>Security teams should explain the most common tactics used by cybercriminals to everyone in the organisation. This means employees are, more average, more likely to spot a scam and report it. Follow-up training is important for people to remain sharp. Without practice, people will eventually succumb to social engineering attacks, as they continue to become more and more convincing. It\u2019s worth checking out the information on the <a href=\"https:\/\/www.ncsc.gov.uk\/\">NCSC<\/a>.\u00a0<\/p>\n\n\n\n<p>If your gut reaction is to think \u2018we\u2019re above average intelligence, we won\u2019t be scammed\u2019 you should disabuse yourself of that notion. There are scores of statistics showing that bad actors successfully hack, phish, or attack thousands of businesses each year. Those businesses suffer enormous damage to their reputation and revenue.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-recognise-that-the-basics-when-it-comes-to-cybersecurity-tools-have-changed\">Recognise that \u201cthe basics\u201d when it comes to cybersecurity tools have changed<\/h3>\n\n\n\n<p>Some practical technologies that have become \u2018non-negotiable\u2019 security include antivirus\/anti-malware, multi-factor authentication (MFA), and phishing defences in email platforms.&nbsp;<\/p>\n\n\n\n<p>These are relatively simple foundational security measures that, when applied properly, cut out many common threats. Antivirus is not a comprehensive solution to all risks. Modern threats, particularly social engineering, require more robust defences like MFA. Cyber teams also need to continuously educate employees, as modern attacks use many techniques to evade detection, including some that don&#8217;t use viruses at all. Simulating, as mentioned, and surprise testing or \u2018red teaming\u2019 exercises, really cultivate a culture of vigilance, encouraging employees to be suspicious of unexpected requests or unfamiliar communications.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/interface.media\/blog\/2025\/03\/10\/how-do-you-secure-agentic-ai\/\">explosion in AI<\/a> has benefited the cybercriminal as they are able to quickly and easily create more convincing and sophisticated threats. AI is also helping the cybersecurity industry by introducing a high level of automation in security defences. However, even with AI, some human oversight will still be necessary to validate controls are working as intended.<\/p>\n\n\n\n<p>Clearly, while more sophisticated and comprehensive security solutions can reduce risk more effectively, SMBs without the luxury of enterprise resources can still raise their cybersecurity posture by using resources provided by governmental cybersecurity agencies. Most provide standards, checklists and resources that can help any business to evaluate their preparedness and implement procedures for identifying, slowing, and hopefully, stopping risky activities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-be-concerned-but-not-alarmed\">Be concerned, but not alarmed<\/h3>\n\n\n\n<p>The cybersecurity industry is a big business, and its marketing relies on pointing out the very real risks that bad actors and their actions can bring on to anyone. In addition, if one were to read security industry articles, it can make for a great deal of doom and gloom for the smaller business who may not have a CISO, large IT staff, or the latest and greatest security technologies.<\/p>\n\n\n\n<p>Have realistic expectations. <a href=\"https:\/\/interface.media\/blog\/2025\/02\/26\/ai-facial-recognition-and-the-rising-threat-of-biometric-theft\/\">No security system can guarantee 100% success<\/a> in stopping all threats. However, even a modest budget and the right information and culture can create robust security measures and significantly reduce the likelihood and impact of an incident, attack, or breach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>John Mutuski, CISO of Pipedrive, interrogates the idea that UK cybersecurity risks really are being \u201cwidely underestimated\u201d.<\/p>\n","protected":false},"author":480,"featured_media":22722,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"apple_news_api_created_at":"2025-03-21T15:25:29Z","apple_news_api_id":"5e06aaec-6c11-4572-919d-6419cf99bdab","apple_news_api_modified_at":"2025-03-21T15:25:29Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AXgaq7GwRRXKRnWQZz5m9qw","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[3],"tags":[],"topic":[613],"class_list":["post-22721","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-interface","topic-cybersecurity"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Underestimated, under-mature, under fire? UK cybersecurity in the spotlight - Interface<\/title>\n<meta name=\"description\" content=\"John Mutuski, CISO of Pipedrive, interrogates the idea that UK cybersecurity risks really are being \u201cwidely underestimated\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Underestimated, under-mature, under fire? UK cybersecurity in the spotlight\" \/>\n<meta property=\"og:description\" content=\"John Mutuski, CISO of Pipedrive, interrogates the idea that UK cybersecurity risks really are being \u201cwidely underestimated\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/\" \/>\n<meta property=\"og:site_name\" content=\"Interface\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-21T15:25:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-21T15:25:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2025\/03\/iStock-1212566677.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1254\" \/>\n\t<meta property=\"og:image:height\" content=\"836\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Brightmore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Brightmore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/\",\"url\":\"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/\",\"name\":\"Underestimated, under-mature, under fire? UK cybersecurity in the spotlight - Interface\",\"isPartOf\":{\"@id\":\"https:\/\/interface.media\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2025\/03\/iStock-1212566677.jpg\",\"datePublished\":\"2025-03-21T15:25:25+00:00\",\"dateModified\":\"2025-03-21T15:25:32+00:00\",\"author\":{\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\"},\"description\":\"John Mutuski, CISO of Pipedrive, interrogates the idea that UK cybersecurity risks really are being \u201cwidely underestimated\u201d.\",\"breadcrumb\":{\"@id\":\"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#primaryimage\",\"url\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2025\/03\/iStock-1212566677.jpg\",\"contentUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2025\/03\/iStock-1212566677.jpg\",\"width\":1254,\"height\":836,\"caption\":\"Composition abstract made elements of paper, geometric\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/interface.media\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Underestimated, under-mature, under fire? UK cybersecurity in the spotlight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/interface.media\/#website\",\"url\":\"https:\/\/interface.media\/\",\"name\":\"Interface\",\"description\":\"Delivering World Class Content \u201cFrom Executive, For Executive\u201c\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/interface.media\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\",\"name\":\"Dan Brightmore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"caption\":\"Dan Brightmore\"},\"url\":\"https:\/\/interface.media\/blog\/author\/dbrightmore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Underestimated, under-mature, under fire? UK cybersecurity in the spotlight - Interface","description":"John Mutuski, CISO of Pipedrive, interrogates the idea that UK cybersecurity risks really are being \u201cwidely underestimated\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Underestimated, under-mature, under fire? UK cybersecurity in the spotlight","og_description":"John Mutuski, CISO of Pipedrive, interrogates the idea that UK cybersecurity risks really are being \u201cwidely underestimated\u201d.","og_url":"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/","og_site_name":"Interface","article_published_time":"2025-03-21T15:25:25+00:00","article_modified_time":"2025-03-21T15:25:32+00:00","og_image":[{"width":1254,"height":836,"url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2025\/03\/iStock-1212566677.jpg","type":"image\/jpeg"}],"author":"Dan Brightmore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Brightmore","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/","url":"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/","name":"Underestimated, under-mature, under fire? UK cybersecurity in the spotlight - Interface","isPartOf":{"@id":"https:\/\/interface.media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#primaryimage"},"image":{"@id":"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#primaryimage"},"thumbnailUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2025\/03\/iStock-1212566677.jpg","datePublished":"2025-03-21T15:25:25+00:00","dateModified":"2025-03-21T15:25:32+00:00","author":{"@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748"},"description":"John Mutuski, CISO of Pipedrive, interrogates the idea that UK cybersecurity risks really are being \u201cwidely underestimated\u201d.","breadcrumb":{"@id":"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#primaryimage","url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2025\/03\/iStock-1212566677.jpg","contentUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2025\/03\/iStock-1212566677.jpg","width":1254,"height":836,"caption":"Composition abstract made elements of paper, geometric"},{"@type":"BreadcrumbList","@id":"https:\/\/interface.media\/blog\/2025\/03\/21\/underestimated-under-mature-under-fire-uk-cybersecurity-in-the-spotlight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interface.media\/"},{"@type":"ListItem","position":2,"name":"Underestimated, under-mature, under fire? UK cybersecurity in the spotlight"}]},{"@type":"WebSite","@id":"https:\/\/interface.media\/#website","url":"https:\/\/interface.media\/","name":"Interface","description":"Delivering World Class Content \u201cFrom Executive, For Executive\u201c","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interface.media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748","name":"Dan Brightmore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","caption":"Dan Brightmore"},"url":"https:\/\/interface.media\/blog\/author\/dbrightmore\/"}]}},"_links":{"self":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/22721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/comments?post=22721"}],"version-history":[{"count":1,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/22721\/revisions"}],"predecessor-version":[{"id":22723,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/22721\/revisions\/22723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media\/22722"}],"wp:attachment":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media?parent=22721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/categories?post=22721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/tags?post=22721"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/topic?post=22721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}