{"id":205,"date":"2017-12-08T11:56:06","date_gmt":"2017-12-08T11:56:06","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=205"},"modified":"2021-09-23T06:27:11","modified_gmt":"2021-09-23T06:27:11","slug":"top-5-cybersecurity-threats-for-2018","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/","title":{"rendered":"Top 5 Cybersecurity Threats For 2018"},"content":{"rendered":"<p style=\"text-align: center;\"><b>Top 5 Cybersecurity Threats For 2018<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for.<\/span><\/p>\n<p><strong style=\"font-size: 1rem;\">\u00a01. Crime-As-A-Service (CaaS) Expands Tools and Service<\/strong><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">Criminal organizations will continue their ongoing development and become increasingly more sophisticated. The complex hierarchies, partnerships and collaborations that mimic large private sector organizations will facilitate their diversification into new markets and the commoditization of their activities at a global level. Some organizations will have roots in existing criminal structures, while others will emerge focused purely on cybercrime. <\/span><\/p>\n<p><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.cso.com.au\/article\/632468\/top-five-global-cyber-security-threats-2018\/\">Organizations will struggle to keep pace with this increased sophistication and the impact will extend worldwide, with cryptoware in particular becoming the leading malware of choice for its threat and impact value.<\/a> The resulting cyber incidents in the coming year will be more persistent and damaging than organizations have experienced previously, leading to business disruption and loss of trust in existing security controls.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Over the past few years, it\u2019s become easier to be a cybercriminal. You don\u2019t even have to have a lot of technical knowledge &#8212; just the ability to find the right tools. <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/01\/02\/a-look-at-the-five-biggest-future-cyberthreats-of-2018\/#672609ee49d2\">The more we publicize the success of cybercrimes, the more likely criminals are to take notice. For example, the ransomware profits saturated news headlines, touting it as a $1 billion industry last year<\/a> \u2014 meaning, for too many, it\u2019s becoming too profitable to ignore. The educated cybercriminals will make their attacks more destructive and harder to prevent in order to establish dominance in a saturated criminal market.<\/span><\/p>\n<p><strong><span style=\"font-size: 1rem;\">2. Ransomware in the Cloud<\/span><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The past 12 months have seen a plague of ransomware attacks, with targets including Britain\u2019s National Health Service, San Francisco\u2019s light-rail network, and big companies such as FedEx. Ransomware is a relatively simple form of malware that breaches defenses and locks down computer files using strong encryption. Hackers then demand money in exchange for digital keys to unlock the data. Victims will often pay, especially if the material encrypted hasn\u2019t been backed up.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.technologyreview.com\/s\/609641\/six-cyber-threats-to-really-worry-about-in-2018\/\">That\u2019s made ransomware popular with criminal hackers, who often demand payment in hard-to-trace cryptocurrencies.<\/a> Some particularly vicious strains, such as WannaCry, have compromised hundreds of thousands of computers (see \u201cThe WannaCry Ransomware Attack Could\u2019ve Been a Lot Worse\u201d). One big target in 2018 will be cloud computing businesses, which house mountains of data for companies. Some also run consumer services such as e-mail and photo libraries. The biggest cloud operators, like Google, Amazon, and IBM, have hired some of the brightest minds in digital security, so they won\u2019t be easy to crack. But smaller companies are likely to be more vulnerable, and even a modest breach could lead to a big payday for the hackers involved.<\/span><a href=\"https:\/\/www.technologyreview.com\/s\/609641\/six-cyber-threats-to-really-worry-about-in-2018\/\"><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/a><span style=\"font-weight: 400;\">\u201cWhile the biggest and oldest cloud service providers such as Google, Amazon, and IBM have the resources and experience to make it difficult for attackers to succeed, the MIT Review points out the smaller cloud providers are likely to be more vulnerable and more likely to pay up if customer data were encrypted and held for ransom,\u201d writes Warwick Ashford for Computer Weekly.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><a href=\"https:\/\/hackernoon.com\/cyber-security-trends-and-threats-to-watch-for-in-2018-a13c0f843d65\">This never-ending fight for big data caches all but ensures that we will continue to see data breaches to the degree of 2017\u2019s Equifax breach.<\/a> If we look back to the end of 2014, 500 million records and 1.2 billion emails addresses and usernames had been exposed by data breaches, according to the University of Alabama Birmingham\u2019s Collat School of Business. By July 2017, Risk Based Security reports that number being closer to 6 million records, and that\u2019s only halfway through the year.<\/span><\/p>\n<p><strong>3. Cyber-Physical Attacks<\/strong><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More hacks targeting electrical grids, transportation systems, and other parts of countries\u2019 critical infrastructure are going to take place in 2018. Some will be designed to cause immediate disruption (see \u201c<a href=\"https:\/\/www.wired.com\/2016\/01\/everything-we-know-about-ukraines-power-plant-hack\/\">A Hack Used to Plunge Ukraine into Darkness Could Still Do Far More Damage<\/a>\u201d),<a href=\"https:\/\/www.technologyreview.com\/s\/609641\/six-cyber-threats-to-really-worry-about-in-2018\/\"> while others will involve ransomware that hijacks<\/a> vital systems and threatens to wreak havoc unless owners pay swiftly to regain control of them. During the year, researchers\u2014and hackers\u2014are likely to uncover more chinks in the defenses of older planes, trains, ships, and other modes of transport that could leave them vulnerable.<\/span><\/p>\n<p><strong>4. Cryptomining<\/strong><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The rise of Cryptocurrencies is no more a secret to anyone. With rising turn up in Bitcoin users, the Bitcoin network and other digital currency platforms have become vulnerable to cyber threats. With money involved, attempts of hacking Bitcoin and other digital currencies are bound to be of the top level. Decrypting cryptocurrencies, however, requires some massive computing capacity to solve complex mathematical problems. For that hackers will be smartly hijacking thousands of computers.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.technologyreview.com\/s\/609641\/six-cyber-threats-to-really-worry-about-in-2018\/\">Recent cases have ranged from the hacking of public Wi-Fi in a Starbucks in Argentina to a significant attack on computers at a Russian oil pipeline company.<\/a> As currency mining grows, so will hackers\u2019 temptation to breach many more computer networks. If they target hospital chains, airports, and other sensitive locations, the potential for collateral damage is deeply worrying.<\/span><\/p>\n<p><strong><span style=\"font-size: 1rem;\">5. IoT<\/span><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The growth of the Internet of Things (IoT) has been phenomenal for innovation.<a href=\"https:\/\/www.ica.in\/advisory\/cyber-security-threats-2018-stay-safe-online\"> As Ohio University\u2019s online resources point out, the IoT alone has played a humongous part in transportation route planning, accident prevention, safety, and even the development of the autonomous car.<\/a> In our homes, the rise of Alexa, Cortana, and Siri home devices have simplified ordering and ushered in a new era of voice control. Smart fridges, toasters, and homes\u200a\u2014\u200aalmost everything is \u201csmart\u201d and connected to the internet nowadays. The bad news is that every connection is a doorway, and that\u2019s exactly what attackers are looking for.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">In 2016, hackers used an army of connected web of devices to shut down the internet in major parts of the US, in what has now been called the Dyn DDoS Attack. Because many IoT products are manufactured with poor security, they become easy targets for deploying malicious software \u2026 and when you coordinate an attack between a million of them, the results can be catastrophic.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">It\u2019s predicted that these coordinated \u201cbotnets\u201d will become more commonplace, especially with unsecured IoT devices. They may not all attack for DDoS purpose, and they may never make their presence known at all. Some programs exist simply to siphon CPU power for mining cryptocurrencies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The IoT (Internet of Things) devices are more vulnerable to a hack and have a much more insecure design. However, many organisations are opting for it due to its lack of complexion. IoT devices also kill the transparency and give the organisations a chance to use the user\u2019s data in ways unintended by the user. This is a serious issue as a security compromise in IoT devices connected with industrial control systems can lead to a harm to individuals or even loss of life as the industrial tools would go out of control.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.cso.com.au\/article\/632468\/top-five-global-cyber-security-threats-2018\/\">Organizations will adopt IoT devices with enthusiasm, not realizing that these devices are often insecure by design and therefore offer many opportunities for attackers.<\/a> In addition, there will be an increasing lack of transparency in the rapidly-evolving IoT ecosystem, with vague terms and conditions that allow organizations to use personal data in ways customers did not intend. It will be problematic for organizations to know what information is leaving their networks or what data is being secretly captured and transmitted by devices such as smartphones and smart TVs.<\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><b>Want to Know More?<\/b><\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Want to know one of the best ways to protect your servers?<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Download a 30 day trial of RecordTS and begin recording and protecting your servers today.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">https:\/\/www.tsfactory.com\/<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Top 5 Cybersecurity Threats For 2018 Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for. \u00a01. Crime-As-A-Service (CaaS) Expands Tools and Service<\/p>\n","protected":false},"author":2,"featured_media":103,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[33,14],"class_list":["post-205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest","tag-caas","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 5 Cybersecurity Threats For 2018 - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Cybersecurity Threats For 2018 - Blogs\" \/>\n<meta property=\"og:description\" content=\"Top 5 Cybersecurity Threats For 2018 Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for. \u00a01. Crime-As-A-Service (CaaS) Expands Tools and Service\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-08T11:56:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-23T06:27:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/dark-computer-green-software-225769-e1632378425529.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"401\" \/>\n\t<meta property=\"og:image:height\" content=\"267\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/\",\"name\":\"Top 5 Cybersecurity Threats For 2018 - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/dark-computer-green-software-225769-e1632378425529.jpg\",\"datePublished\":\"2017-12-08T11:56:06+00:00\",\"dateModified\":\"2021-09-23T06:27:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/dark-computer-green-software-225769-e1632378425529.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/dark-computer-green-software-225769-e1632378425529.jpg\",\"width\":401,\"height\":267},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 Cybersecurity Threats For 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Cybersecurity Threats For 2018 - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Cybersecurity Threats For 2018 - Blogs","og_description":"Top 5 Cybersecurity Threats For 2018 Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for. \u00a01. Crime-As-A-Service (CaaS) Expands Tools and Service","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2017-12-08T11:56:06+00:00","article_modified_time":"2021-09-23T06:27:11+00:00","og_image":[{"width":401,"height":267,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/dark-computer-green-software-225769-e1632378425529.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/","name":"Top 5 Cybersecurity Threats For 2018 - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/dark-computer-green-software-225769-e1632378425529.jpg","datePublished":"2017-12-08T11:56:06+00:00","dateModified":"2021-09-23T06:27:11+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/dark-computer-green-software-225769-e1632378425529.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/dark-computer-green-software-225769-e1632378425529.jpg","width":401,"height":267},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/top-5-cybersecurity-threats-for-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Top 5 Cybersecurity Threats For 2018"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=205"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/205\/revisions"}],"predecessor-version":[{"id":206,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/205\/revisions\/206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/103"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}