{"id":34111,"date":"2019-04-11T14:19:27","date_gmt":"2019-04-11T18:19:27","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=34111"},"modified":"2023-04-18T16:08:08","modified_gmt":"2023-04-18T20:08:08","slug":"shielding-iot-security-breach","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/","title":{"rendered":"Shielding IoT Against Security Breach"},"content":{"rendered":"<p>The Internet of Things (IoT) is an interconnected array of electronic devices linked by the Internet, through which they transmit and receive data. The original \u201cthing\u201d was a Coca Cola vending machine which was able to report how many bottles of soda were left inside. But, along with the Internet, IoT has come a long way since then. It is now a widespread and growing phenomenon that is classified into two main domains: Consumer and Business.<\/p>\n<p>Consumer IoT: Includes devices like refrigerators, door locks, light bulbs, surveillance systems that are a part of smart homes. Also, IoT consumer\/lifestyle devices like fitness bands, smartwatches, drones, etc.<\/p>\n<p>Business IoT: Segmented by its verticals to include devices like electricity, gas, water meters used by utility companies. And devices used in connected vehicles, retail, health, agriculture, etc.<\/p>\n<p><a href=\"https:\/\/venturebeat.com\/2019\/01\/29\/pepper-iot-smart-devices-arent-so-bright-when-it-comes-to-security\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-34112 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/iot-pepper.jpg\" alt=\"iot-pepper\" width=\"578\" height=\"462\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 578px; --smush-placeholder-aspect-ratio: 578\/462;\" \/><\/a><br \/>\n<em>Pepper IoT: Smart devices aren\u2019t so bright when it comes to security<\/em><\/p>\n<p>According to an analysis done by Gartner (a research and consultancy company), there will be around 21 billion connected IoT devices by 2020. And while we quote this statistic with pride and look curiously at the business opportunities it will give rise to, there is one alarming concern \u2013<b> IoT security<\/b>. The increasing popularity of IoT has raised some serious security issues since more the number of smart devices, more is the possibility of attack vectors. The <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet\" target=\"_blank\" rel=\"noopener\">DDoS (Distributed Denial of Service) attacks<\/a>, in the year 2016, that affected IoT devices around the world was an eye-opener and a proof that the security threat against IoT is real. It is imperative for digital businesses to balance the benefits that IoT-connected products can deliver with the recognition that these devices have become an attractive attack plane for cybercriminals who are seeking to cause disruption and exfiltrate sensitive data.<\/p>\n<p>Just like any other emerging technology, IoT also comes with lots of benefits and risks. Many IoT devices lack some basic security requirements. There are a plethora of IoT protocols, that create security blind spots. The scope of IoT deployments hinders visibility into security incidents. There is a lack of responsibility regarding privacy and security.<\/p>\n<p>Some risks associated with both home and enterprise IoT include the following:<\/p>\n<p>Data security concerns<\/p>\n<p>Physical safety risks<\/p>\n<p>Privacy issue<\/p>\n<p>Data storage management<\/p>\n<p>So, what can be done to secure our IoT-connected world?<\/p>\n<p>You can put some personal security measures in place to fortify your devices against the attacks by cybercriminals. And this is where IoT security comes in.<\/p>\n<h3>What is IoT Security?<\/h3>\n<p><a href=\"https:\/\/medium.com\/read-write-participate\/minimum-standards-for-tackling-iot-security-70f90b37f2d5\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-large wp-image-34113 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/minimum-standards-for-tackling-iot-security-1024x243.jpeg\" alt=\"minimum-standards-for-tackling-iot-security\" width=\"1024\" height=\"243\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/minimum-standards-for-tackling-iot-security-1024x243.jpeg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/minimum-standards-for-tackling-iot-security-768x182.jpeg 768w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/243;\" \/><\/a><br \/>\n<em>Minimum Standards for Tackling IoT Security<\/em><\/p>\n<p>In the development of an IoT application, security and testing frameworks play a very important role. IoT Security is defined as \u201cthe technology area concerned with safeguarding the connected devices and networks in the Internet of Things (IoT).\u201d Simply put, IoT security refers to the precautionary measures taken to build the security of IoT devices and reduce their susceptibility to attacks from criminals.<\/p>\n<p>Here are some IoT Security Solutions for the most common IoT security issues:<\/p>\n<ul>\n<li><b>IoT network security:<\/b> Always protect and secure the network that connects IoT devices to back-end systems on the internet, by implementing traditional security features like antivirus, firewalls, and intrusion prevention and detection systems. IoT network security can be a bit challenging because there is a wider range of communication protocols, standards, and device capabilities. All of these pose signi\ufb01cant issues and increased complexity.<\/li>\n<\/ul>\n<ul>\n<li><b>IoT authentication:<\/b> Provide the ability for users to authenticate an IoT device by introducing multiple user management features for a single device (like a connected car), ranging from simple static passwords to robust authentication mechanisms like two-factor authentication and biometrics.<\/li>\n<\/ul>\n<ul>\n<li><b>IoT encryption:<\/b> Encryption of data at rest and in transit between IoT edge devices and back-end systems helps to maintain data integrity and prevents data sniffing by hackers. Encryption can be done by using cryptographic algorithms and fully-encrypted key lifecycle management processes that would boost the overall security of user data and privacy.<\/li>\n<\/ul>\n<ul>\n<li><b>IoT PKI:<\/b> To ensure a secure connection between an IoT device and an application, IoT public key infrastructure security methods can be used, such as X.509 digital certi\ufb01cate, cryptographic key, and life-cycle capabilities including public\/private key generation, distribution, management, and revocation.<\/li>\n<\/ul>\n<ul>\n<li><b>IoT security analytics:<\/b> Collect, aggregate, monitor, and normalize data from IoT devices and then provide actionable reporting and alerting on speci\ufb01c activities. These security analytics solutions are starting to add sophisticated machine learning, AI, and big data techniques to provide more predictive modeling and anomaly detection. IoT Security Analytics Solutions are capable to detect IoT-specific attacks and intrusions, which can\u2019t even be identified by traditional network security solutions like \ufb01rewalls.<\/li>\n<\/ul>\n<ul>\n<li><b>IoT API security:<\/b> IoT API Security methods can be used to protect the integrity of the data movement between IoT devices, back-end systems, and applications using documented REST-based APIs. It also ensures that only authorized devices, developers, and apps are communicating with APIs or detecting any potential threats and attacks against speci\ufb01c APIs.<\/li>\n<\/ul>\n<ul>\n<li><b>Develop Secured IoT Apps:<\/b> The developers of IoT applications need to emphasize on the security aspect of the app by strictly implementing all the above-mentioned security technologies. The developers must try their best to strike a perfect balance between the User Interface and Security of IoT apps.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/ten-best-practices-for-securing-the-internet-of-things-in-your-organization\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"size-full wp-image-34114 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg\" alt=\"\" width=\"770\" height=\"577\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg 770w, https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization-768x576.jpg 768w\" data-sizes=\"(max-width: 770px) 100vw, 770px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 770px; --smush-placeholder-aspect-ratio: 770\/577;\" \/><\/a><br \/>\n<em>Ten best practices for securing the Internet of Things in your organization<\/em><\/p>\n<p>Most of these IoT security techniques revolve around two things, keeping IoT secure against attacks and keeping user-data safe, both of which can be resolved with strict legal and regulatory frameworks. The implementation of these security options will secure your IoT devices against any external security breach. And as the evolution of IoT-specific security threats will undoubtedly drive innovation in this space, you can expect more new IoT-specific security technologies emerging in the near future.<\/p>\n<p>To summarize, IoT security cannot be an afterthought \u2013 it should be an integral part of the device. Rather than searching for a silver bullet that doesn\u2019t exist, you must re-engineer, optimize and adapt current cutting edge security controls that work for the IT network for the complex embedded apps that is at the heart of Internet of Things.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things (IoT) is an interconnected array of electronic devices linked by the Internet, through which they transmit and receive data. The original \u201cthing\u201d was a Coca Cola<\/p>\n","protected":false},"author":1,"featured_media":34114,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,1],"tags":[3026,5891,7860,10104,6557,6555,6020,9527,974,6249,6287,6207,988,256,5946,5947,10107,20,10096,9273,9860,2094,1239,5111,10105,177,7208,5879,21,115,10106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shielding IoT Against Security Breach<\/title>\n<meta name=\"description\" content=\"The Internet of Things (IoT) is an interconnected array of electronic devices linked by the Internet, through which they transmit and receive data. The\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shielding IoT Against Security Breach\" \/>\n<meta property=\"og:description\" content=\"The Internet of Things (IoT) is an interconnected array of electronic devices linked by the Internet, through which they transmit and receive data. The\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-11T18:19:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-18T20:08:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"577\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/\",\"name\":\"Shielding IoT Against Security Breach\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg\",\"datePublished\":\"2019-04-11T18:19:27+00:00\",\"dateModified\":\"2023-04-18T20:08:08+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"The Internet of Things (IoT) is an interconnected array of electronic devices linked by the Internet, through which they transmit and receive data. The\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg\",\"width\":770,\"height\":577},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shielding IoT Against Security Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shielding IoT Against Security Breach","description":"The Internet of Things (IoT) is an interconnected array of electronic devices linked by the Internet, through which they transmit and receive data. The","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/","og_locale":"en_US","og_type":"article","og_title":"Shielding IoT Against Security Breach","og_description":"The Internet of Things (IoT) is an interconnected array of electronic devices linked by the Internet, through which they transmit and receive data. The","og_url":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2019-04-11T18:19:27+00:00","article_modified_time":"2023-04-18T20:08:08+00:00","og_image":[{"width":770,"height":577,"url":"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/","url":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/","name":"Shielding IoT Against Security Breach","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg","datePublished":"2019-04-11T18:19:27+00:00","dateModified":"2023-04-18T20:08:08+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"The Internet of Things (IoT) is an interconnected array of electronic devices linked by the Internet, through which they transmit and receive data. The","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/best-practices-for-securing-the-internet-of-things-in-your-organization.jpg","width":770,"height":577},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2019\/shielding-iot-security-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Shielding IoT Against Security Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/34111"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=34111"}],"version-history":[{"count":2,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/34111\/revisions"}],"predecessor-version":[{"id":45936,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/34111\/revisions\/45936"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/34114"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=34111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=34111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=34111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}