{"id":2515,"date":"2021-05-05T16:09:29","date_gmt":"2021-05-05T10:39:29","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=2515"},"modified":"2021-05-05T16:10:07","modified_gmt":"2021-05-05T10:40:07","slug":"cybersecurity-strategy","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/","title":{"rendered":"What Cybersecurity Strategy To Follow In 2021"},"content":{"rendered":"<p>Unfortunately, the Covid-19 pandemic has been accompanied by an exponential increase in cyber attacks on companies and citizens. In this post, we reflect on which <span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/\">cybersecurity<\/a><\/strong><\/span> strategy to follow in 2021. What is becoming increasingly clear is that cybercriminals are shooting at all sites. No organization is safe.<\/p>\n<p>So much so that, recently, the press reported a cyber attack on a cannabis club. It would be a bit of a laugh if it weren&#8217;t for the fact that you soon fall into the criticality of the data stored by that type of association. And it is that all organizations, whatever they do, have stored data likely to attract hackers, specialists, extorting money and extorting money in multiple ways.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655ddebf651d5\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655ddebf651d5\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#The_Importance_Of_Deploying_A_Cybersecurity_Layer_In_Its_Projects\" title=\"The Importance Of Deploying A Cybersecurity Layer In Its Projects\">The Importance Of Deploying A Cybersecurity Layer In Its Projects<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#The_Risks_Of_Teleworking_For_Business_Security\" title=\"The Risks Of Teleworking For Business Security\">The Risks Of Teleworking For Business Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#Double_Extortion_Ransomware_Leading_Top_Cyberthreats_For_2021\" title=\"Double Extortion Ransomware, Leading Top Cyberthreats For 2021\">Double Extortion Ransomware, Leading Top Cyberthreats For 2021<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#Keys_To_Deploying_An_Effective_Cybersecurity_Strategy\" title=\"Keys To Deploying An Effective Cybersecurity Strategy\">Keys To Deploying An Effective Cybersecurity Strategy<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"The_Importance_Of_Deploying_A_Cybersecurity_Layer_In_Its_Projects\"><\/span>The Importance Of Deploying A Cybersecurity Layer In Its Projects<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The pandemic has forced most companies to reset themselves to have the most negligible impact on their business. Establishing the technological infrastructure necessary for teleworking has taken most of their efforts. To this is added, a review of the processes to adapt them to the new reality and reduce costs as much as possible.<\/p>\n<p>The consequence of this is that a vital aspect in recent years, such as <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/machines-protect-themselves-the-future-of-cybersecurity\/\"><strong>cybersecurity<\/strong><\/a><\/span>, has been somewhat neglected, especially in sectors such as health and education, which are the ones that have focused the most on solving their deficiencies to face the new demands. Precisely these two areas, together with the traditional financial one, are the ones that have suffered a more significant number of cyberattacks.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Risks_Of_Teleworking_For_Business_Security\"><\/span>The Risks Of Teleworking For Business Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Teleworking opens up numerous vulnerabilities if your technological deployment is not well done. The rush has led to misconfigurations that are a drain for cyberattacks. The WAN networks, using environments multi-cloud, using very different mobile devices using Wi-Fi mainly, the proliferation of VPN networks, are inherent to work in remote and modernization of enterprise IT infrastructure. These circumstances, along with the deployment of IoT data, are expanding the corporate perimeter almost limitlessly. A traditional perimeter protection approach is now outdated and risky.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Double_Extortion_Ransomware_Leading_Top_Cyberthreats_For_2021\"><\/span>Double Extortion Ransomware, Leading Top Cyberthreats For 2021<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The cyberattack trends in 2021 drink from what has happened in 2020 and are its continuation only to grow in quantity and diversity of objectives. Among these, the double extortion Ransomware stands out. This attack begins with the theft of information before encrypting a computer and requesting a ransom. As a pressure, some stolen data is being published on the &#8216;Dark Web. The most common way of stealing information related to ransomware is the carelessness of end-users when using their email, responding to phishing emails, or accessing websites with malware, which are increasingly being circulated by armies of botnets, such as the famous Emoted.<\/p>\n<p>Added to this is vishing. What is vishing? In the business sphere, it is limited to telephone calls received by teleworking employees in which they impersonate company executives who request confidential information from them. The hyper connectivity brought by 5G and the IoT open new &#8216;highways&#8217; for cybercriminals who always have their sights set on the continuous increase in mobile devices both by end-users and in an automated way in multiple <span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/category\/gadgets\/\">gadgets<\/a><\/strong><\/span>, cameras, sensors.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Keys_To_Deploying_An_Effective_Cybersecurity_Strategy\"><\/span>Keys To Deploying An Effective Cybersecurity Strategy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With this landscape, protecting cloud environments, networks, and applications is vital so that critical information does not reach the hands of cybercriminals. It is essential to prevent a cyber attack from spreading throughout the company&#8217;s infrastructure. To achieve this, it is vital to educate end-users of corporate technologies by asking them for full responsibility in their actions. The enterprise IT architecture must also be audited for vulnerabilities and systems patched and updated.<\/p>\n<p>In this analysis of the IT infrastructure, it is essential to update passwords and deploy profiles with specific authorizations to access systems and data, accompanied by monitoring mobile devices with MDM (Mobile Devices Management) solutions. But given the sophistication of current cyberattacks, it is practically essential to deploy automated prevention solutions based on Artificial Intelligence and Machine Learning. The solutions IA and ML allow current practices ahead of cyber-attacks thanks to information gathered earlier about their modus operandi.<\/p>\n<p>Fortunately, market research shows that cybersecurity budgets are increasing in companies. Contingency plans should always be included in these strategies as a critical piece of <span style=\"color: #0000ff;\"><strong><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/category\/security\/\">security<\/a><\/strong><\/span>. Since, if necessary, having an effective Backup and Disaster Recovery plan is the best protection against a cyberattack.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Also Read: <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/master-data-management\/\">What Are The Benefits Of Master Data Management<\/a><\/span><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unfortunately, the Covid-19 pandemic has been accompanied by an exponential increase in cyber attacks on companies and citizens. In this&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2516,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[96,587,586,151],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Cybersecurity Strategy To Follow In 2021 At Trends Tech Blog<\/title>\n<meta name=\"description\" content=\"Cyber attacks on companies and citizens. In this post, we reflect on which cybersecurity strategy to follow in 2021. What is becoming.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Cybersecurity Strategy To Follow In 2021 At Trends Tech Blog\" \/>\n<meta property=\"og:description\" content=\"Cyber attacks on companies and citizens. In this post, we reflect on which cybersecurity strategy to follow in 2021. What is becoming.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-05T10:39:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-05T10:40:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2021\/05\/What-Cybersecurity-Strategy-To-Follow-In-2021.Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"What Cybersecurity Strategy To Follow In 2021\",\"datePublished\":\"2021-05-05T10:39:29+00:00\",\"dateModified\":\"2021-05-05T10:40:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/\"},\"wordCount\":737,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"Cybersecurity\",\"Cybersecurity 2021\",\"Cybersecurity Strategies\",\"Security\"],\"articleSection\":[\"SECURITY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/\",\"url\":\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/\",\"name\":\"What Cybersecurity Strategy To Follow In 2021 At Trends Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2021-05-05T10:39:29+00:00\",\"dateModified\":\"2021-05-05T10:40:07+00:00\",\"description\":\"Cyber attacks on companies and citizens. In this post, we reflect on which cybersecurity strategy to follow in 2021. What is becoming.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Cybersecurity Strategy To Follow In 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Cybersecurity Strategy To Follow In 2021 At Trends Tech Blog","description":"Cyber attacks on companies and citizens. In this post, we reflect on which cybersecurity strategy to follow in 2021. What is becoming.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/","og_locale":"en_US","og_type":"article","og_title":"What Cybersecurity Strategy To Follow In 2021 At Trends Tech Blog","og_description":"Cyber attacks on companies and citizens. In this post, we reflect on which cybersecurity strategy to follow in 2021. What is becoming.","og_url":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/","og_site_name":"Trends Tech Blog","article_published_time":"2021-05-05T10:39:29+00:00","article_modified_time":"2021-05-05T10:40:07+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2021\/05\/What-Cybersecurity-Strategy-To-Follow-In-2021.Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"What Cybersecurity Strategy To Follow In 2021","datePublished":"2021-05-05T10:39:29+00:00","dateModified":"2021-05-05T10:40:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/"},"wordCount":737,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["Cybersecurity","Cybersecurity 2021","Cybersecurity Strategies","Security"],"articleSection":["SECURITY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/","url":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/","name":"What Cybersecurity Strategy To Follow In 2021 At Trends Tech Blog","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2021-05-05T10:39:29+00:00","dateModified":"2021-05-05T10:40:07+00:00","description":"Cyber attacks on companies and citizens. In this post, we reflect on which cybersecurity strategy to follow in 2021. What is becoming.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/cybersecurity-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"SECURITY","item":"https:\/\/www.trendstechblog.com\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What Cybersecurity Strategy To Follow In 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/2515"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=2515"}],"version-history":[{"count":1,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/2515\/revisions"}],"predecessor-version":[{"id":2517,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/2515\/revisions\/2517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/2516"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=2515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=2515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=2515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}