{"id":672,"date":"2022-07-03T13:43:24","date_gmt":"2022-07-03T13:43:24","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=672"},"modified":"2023-10-24T14:13:39","modified_gmt":"2023-10-24T14:13:39","slug":"the-great-resignation-and-the-cybersecurity-industry","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/","title":{"rendered":"The Great Resignation and the Cybersecurity Industry"},"content":{"rendered":"<p><b>The Great Resignation and the Cybersecurity Industry<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A report detailing the stress of those who work in the cybersecurity industry was released this month. The company Deep Instinct released The Voice of SecOps Report, a study focusing on the increasing and unsustainable stress levels among 1,000 C-suite and senior cybersecurity professionals across all industries and roles. The research found that 45% of respondents have considered quitting the industry due to stress, with the primary issues being an unrelenting threat from ransomware and the expectations to always be on call or available. Moreover, cyber professionals often take the fall for issues involving ransomware remediation, negotiation, and restoration efforts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;In a culture of the blame game, the pressure of failure weighs heavily on security analysts. Visibility across the entire IT landscape is a challenge, leaving them blind to many issues. They are working over hours, sometimes 16-18 hours a day, to keep the organization secure and the responsibility to catch a misconfiguration or mistake by an employee clicking on a malicious link falls back on them,&#8221; said Deep Instinct Director of Product Solutions Karen Crowley.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is on top of a sector which has continually struggled to maintain adequate staffing levels. \u201cAs in past years, filling cybersecurity roles and retaining talent continues to be a challenge for many enterprises&#8221; <\/span><span style=\"font-weight: 400;\">said the ISACA in announcing a new survey <\/span><a href=\"https:\/\/www.isaca.org\/go\/state-of-cybersecurity-2022\"><span style=\"font-weight: 400;\">report<\/span><\/a><span style=\"font-weight: 400;\"> titled &#8220;State of Cybersecurity 2022: Global Update on Workforce Efforts, Resources and Cyberoperations.&#8221;<\/span><span style=\"font-weight: 400;\"> &#8220;Sixty-three percent of respondents indicate they have unfilled cybersecurity positions, up eight percentage points from 2021. Sixty-two percent report that their cybersecurity teams are understaffed. One in five say it takes more than six months to find qualified cybersecurity candidates for open positions.&#8221;<\/span><\/p>\n<p><b>How to retain employees in the Great Resignation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Adapting to remote work<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the greatest challenges for cybersecurity professionals is moving from working in the office to remote working. While the improved flexibility has been a silver lining of the pandemic for many, it has added another stress to those working in cybersecurity and ensuring their users were adequately protected while working from home. Overall, this has benefitted those working in cybersecurity as it has offered a larger pool of cyber talent since geography is not the consideration it once was. Kathryn Barnes, Employment Counsel EMEA at <a href=\"https:\/\/www.globalization-partners.com\/\">G-P<\/a> expands, \u201cit\u2019s important to remember that today\u2019s workplace looks very different to how it was pre-pandemic, with 98% of businesses now enjoying remote work of some variety. You get so much more out of your employees when they work flexibly, and as the workplace continues to evolve through 2022 and beyond, the biggest pitfall a company can make is not embracing change. Companies have already invested in online infrastructure that allows employees to work from anywhere, so I expect they will expand using these models, testing the market in new regions. Whilst staff shortages remain top of mind for employers, the talent pool is larger and more global than it\u2019s ever been &#8211; people are no longer confined to looking for talent in just their immediate location. Ultimately, by being flexible and trying new approaches, companies can implement change for the better &#8211; in the best interests of their employees and business growth.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another key factor in retention rates is recognising the importance of personal development. \u201cResearch suggests more than ever that if employers are to retain their people that they have to look beyond the traditional loyalty drivers and focus on offering environments in which people can learn, grow and develop\u201d, highlights Dave Birchall, Chief People Officer at Node4. \u201cIn order to keep pace with the growth of technologies, organizations must enable their people to explore career options and be supported to learn and develop without needing to look for a new employer.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Automation is one way to manage the talent shortage as this can take care of the basic routine tasks. This helps the analysts work smarter and put their skills to good use wherever they are needed most. However, in the era of the Great Resignation, this model can be sustainable only if it is supplemented by talent nurturing, upskilling and reskilling strategies. All businesses are trying to fish for talent from the same pond so organizations should actively work on creating a skills pipeline for cybersecurity roles internally and investing in training and retention of the existing workforce. A regular rhythm of review and updation can be set for these specialized roles to increase the relevance and make it more fulfilling both for the employees as well as the organization<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employers have a responsibility to address increasing resignations in the cyber security industry. Creating the right environment is not a luxury when it comes to retaining staff, it\u2019s a necessity. They should understand core leadership purposes and principles, ensuring they don\u2019t simply assign tasks but also provide employees with the tools and support needed to succeed in the workplace.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cGood leadership focuses on breeding good culture. Employer brand, role and salary might be what attracts people to join an organization, but it is culture that makes them stay. Teams need to be made to feel comfortable, both physically and intellectually. Leaders need to build a supportive culture that rewards employees for engaging with the businesses,\u201d Ilona Simpson, CIO of Europe, the Middle East and Africa (EMEA) at Netskope, staed, agreeing that high rates of employees resigning from security positions can have severe consequences for organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThis certainly isn\u2019t easy in the hybrid working world (and no one said it would be), but it isn\u2019t impossible. I have always found the best security talent to be people who bring intellectual curiosity and a bias for problem solving to a team. So a simple step in those cases is to help rid them of admin work and let them focus on problem solving.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cybersecurity sector certainly hasn\u2019t been the only one to face the effects of the Great Resignation. The hospitality and retails sectors have all faced a mass exodus of employees. It is important for all businesses to focus on how to obtain new staff as well as doing what they can to retain their current employees. Employers must now recognize that in order to attract and retain staff, they have to step things up a gear. For example, building a strong company culture with good benefits is key to creating a business that staff want to work for, creating a more open workplace or by improving staff mental health.<\/span><\/p>\n<p><b>Monitoring Remote Sessions<\/b><\/p>\n<p>With more employees working from home, companies are seeking ways of monitoring remote sessions. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won\u2019t be able to see what was happening on users\u2019 desktops when the breach occurred. Another reason for recording remote sessions is to maintain compliance, as required for medical and financial institutions or auditing for business protocols, etc.<\/p>\n<p>TSFactory\u2019s RecordTS v6 will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/forums\/news\/2020\/03\/20\/recordts-v5-released-this-month\/\">Click here<\/a>\u00a0to learn more about secure remote session recording.<\/p>\n<p><b>Sources<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/business.express\/the-impact-of-the-great-resignation-on-cyber-security\/\"><b>https:\/\/business.express\/the-impact-of-the-great-resignation-on-cyber-security\/<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.scmagazine.com\/editorial\/brief\/risk-management\/great-resignation-in-cybersecurity-examined\"><b>https:\/\/www.scmagazine.com\/editorial\/brief\/risk-management\/great-resignation-in-cybersecurity-examined<\/b><\/a><\/p>\n<p><a href=\"https:\/\/cybermagazine.com\/cyber-security\/what-can-be-done-about-great-resignation\"><b>https:\/\/cybermagazine.com\/cyber-security\/what-can-be-done-about-great-resignation<\/b><\/a><\/p>\n<p><a href=\"https:\/\/virtualizationreview.com\/articles\/2022\/03\/24\/cybersecurity-staffing.aspx\"><b>https:\/\/virtualizationreview.com\/articles\/2022\/03\/24\/cybersecurity-staffing.aspx<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.computerweekly.com\/feature\/How-to-retain-cyber-talent-in-the-Great-Resignation\"><b>https:\/\/www.computerweekly.com\/feature\/How-to-retain-cyber-talent-in-the-Great-Resignation<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.bisinfotech.com\/how-to-retain-cyber-talent-in-the-great-resignation-wave\/\"><b>https:\/\/www.bisinfotech.com\/how-to-retain-cyber-talent-in-the-great-resignation-wave\/<\/b><\/a><\/p>\n<p><a href=\"https:\/\/www.deepinstinct.com\/news\/the-great-resignation-reaches-the-cybersecurity-industry\"><b>https:\/\/www.deepinstinct.com\/news\/the-great-resignation-reaches-the-cybersecurity-industry<\/b><\/a><\/p>\n<p><a href=\"https:\/\/virtualizationreview.com\/articles\/2022\/03\/24\/cybersecurity-staffing.aspx\"><b>https:\/\/virtualizationreview.com\/articles\/2022\/03\/24\/cybersecurity-staffing.aspx<\/b><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Great Resignation and the Cybersecurity Industry A report detailing the stress of those who work in the cybersecurity industry was released this month. The company Deep Instinct released The Voice of SecOps Report, a study focusing on the increasing and unsustainable stress levels among 1,000 C-suite and senior cybersecurity professionals across all industries and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":673,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-672","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Great Resignation and the Cybersecurity Industry - Blogs<\/title>\n<meta name=\"description\" content=\"&quot;In a culture of the blame game, the pressure of failure weighs heavily on security analysts. Visibility across the entire IT landscape is a challenge, leaving them blind to many issues. They are working over hours, sometimes 16-18 hours a day, to keep the organization secure and the responsibility to catch a misconfiguration or mistake by an employee clicking on a malicious link falls back on them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Great Resignation and the Cybersecurity Industry - Blogs\" \/>\n<meta property=\"og:description\" content=\"&quot;In a culture of the blame game, the pressure of failure weighs heavily on security analysts. Visibility across the entire IT landscape is a challenge, leaving them blind to many issues. They are working over hours, sometimes 16-18 hours a day, to keep the organization secure and the responsibility to catch a misconfiguration or mistake by an employee clicking on a malicious link falls back on them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-03T13:43:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-24T14:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/07\/pexels-kat-smith-551588.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"854\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/\",\"name\":\"The Great Resignation and the Cybersecurity Industry - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/07\/pexels-kat-smith-551588.jpg\",\"datePublished\":\"2022-07-03T13:43:24+00:00\",\"dateModified\":\"2023-10-24T14:13:39+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"\\\"In a culture of the blame game, the pressure of failure weighs heavily on security analysts. Visibility across the entire IT landscape is a challenge, leaving them blind to many issues. They are working over hours, sometimes 16-18 hours a day, to keep the organization secure and the responsibility to catch a misconfiguration or mistake by an employee clicking on a malicious link falls back on them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/07\/pexels-kat-smith-551588.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/07\/pexels-kat-smith-551588.jpg\",\"width\":1280,\"height\":854},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Great Resignation and the Cybersecurity Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Great Resignation and the Cybersecurity Industry - Blogs","description":"\"In a culture of the blame game, the pressure of failure weighs heavily on security analysts. Visibility across the entire IT landscape is a challenge, leaving them blind to many issues. They are working over hours, sometimes 16-18 hours a day, to keep the organization secure and the responsibility to catch a misconfiguration or mistake by an employee clicking on a malicious link falls back on them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/","og_locale":"en_US","og_type":"article","og_title":"The Great Resignation and the Cybersecurity Industry - Blogs","og_description":"\"In a culture of the blame game, the pressure of failure weighs heavily on security analysts. Visibility across the entire IT landscape is a challenge, leaving them blind to many issues. They are working over hours, sometimes 16-18 hours a day, to keep the organization secure and the responsibility to catch a misconfiguration or mistake by an employee clicking on a malicious link falls back on them.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2022-07-03T13:43:24+00:00","article_modified_time":"2023-10-24T14:13:39+00:00","og_image":[{"width":1280,"height":854,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/07\/pexels-kat-smith-551588.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/","name":"The Great Resignation and the Cybersecurity Industry - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/07\/pexels-kat-smith-551588.jpg","datePublished":"2022-07-03T13:43:24+00:00","dateModified":"2023-10-24T14:13:39+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"\"In a culture of the blame game, the pressure of failure weighs heavily on security analysts. Visibility across the entire IT landscape is a challenge, leaving them blind to many issues. They are working over hours, sometimes 16-18 hours a day, to keep the organization secure and the responsibility to catch a misconfiguration or mistake by an employee clicking on a malicious link falls back on them.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/07\/pexels-kat-smith-551588.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/07\/pexels-kat-smith-551588.jpg","width":1280,"height":854},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/the-great-resignation-and-the-cybersecurity-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"The Great Resignation and the Cybersecurity Industry"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=672"}],"version-history":[{"count":2,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/672\/revisions"}],"predecessor-version":[{"id":813,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/672\/revisions\/813"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/673"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}