{"id":841,"date":"2024-01-18T14:28:24","date_gmt":"2024-01-18T14:28:24","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=841"},"modified":"2024-01-18T14:34:54","modified_gmt":"2024-01-18T14:34:54","slug":"cybersecurityhealthcarechallenges","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/","title":{"rendered":"Cybersecurity Healthcare Challenges"},"content":{"rendered":"<p style=\"text-align: center;\"><b>Cybersecurity Healthcare Challenges<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The healthcare industry, with its primary focus on saving lives and improving patient well-being, is facing a growing and alarming challenge in the realm of cybersecurity. The digital transformation of healthcare has undoubtedly brought numerous benefits, such as improved patient care, efficient data management, and streamlined operations. However, the sector is plagued by a myriad of cybersecurity issues, making it one of the most vulnerable targets for malicious actors. Below, we explore the reasons behind the healthcare industry&#8217;s struggle with cybersecurity and the potential consequences of these vulnerabilities.<\/span><\/p>\n<p><b>Legacy Systems and Outdated Infrastructure<\/b><\/p>\n<p><span style=\"font-weight: 400;\">One of the primary reasons for the healthcare industry&#8217;s cybersecurity woes is the prevalence of legacy systems and outdated infrastructure. Many healthcare organizations still rely on legacy technologies that were not designed with robust security measures in mind. Limited budgets and a hesitancy to learn new systems often mean that medical technology is becoming outdated. Hospitals using techniques that still release system updates should keep all software equipped with the most recent version. These usually contain bug fixes to keep systems reasonably secure.\u00a0 But eventually, the software will become end-of-life, and vendors will stop providing updates.\u00a0\u00a0<\/span><\/p>\n<p><b>Lack of Cybersecurity Awareness<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Healthcare professionals are primarily trained to provide medical care, and cybersecurity may not be a priority in their education and training.Nearly a third of healthcare employees respondents (32%) said they had never received cybersecurity training from their workplace, according to a <\/span><a href=\"https:\/\/usa.kaspersky.com\/blog\/keeping-a-pulse-on-cybersecurity-in-healthcare\/18376\/\"><span style=\"font-weight: 400;\">Kaspersky report<\/span><\/a><span style=\"font-weight: 400;\">. The lack of awareness and understanding among healthcare staff regarding the potential risks and best practices for cybersecurity creates a vulnerable environment. Human error, such as falling victim to phishing attacks or failing to follow secure protocols, can lead to significant breaches.<\/span><\/p>\n<p><b>High Value of Medical Records on the Dark Web<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Medical records contain a treasure trove of sensitive information, including personal details, medical history, and insurance information. The value of such data on the dark web makes healthcare organizations lucrative targets for cybercriminals.Medical records sell hot on the dark web, fetching far higher prices than credit cards. Hackers gain access to medical records much more easily because hospitals that are only transitioning from paper-based to digital systems often do not have robust security systems in place. When a medical record is compromised, the hacker obtains the individual\u2019s name, birth date, social security number and medical information. Medical records that provide social security details are more attractive because it is not easy to change a social security number while it is easy to cancel a credit card. On the dark web, a complete medical record easily sells for an amount (the bitcoin equivalent) of $60; social security numbers sell for $15 each; and stolen credit cards fetch a price of just $1 to $3.<\/span><\/p>\n<p><b>Resource Constraints<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Many healthcare organizations operate with limited budgets and resources, allocating their funds primarily to patient care and medical advancements. As a result, investments in cybersecurity measures often take a back seat. This resource constraint hinders the implementation of robust cybersecurity measures, leaving healthcare systems more susceptible to cyber threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is impossible to separate cybersecurity efforts from dollars-and-cents concerns. Healthcare organizations have limited resources available for technology, and at most organizations, cybersecurity only accounts for a small minority (<\/span><a href=\"https:\/\/www.cdw.com\/content\/cdw\/en\/articles\/security\/the-cost-of-cybersecurity-in-healthcare.html\"><span style=\"font-weight: 400;\">4 to 7 percent<\/span><\/a><span style=\"font-weight: 400;\">) of total IT budgets. After organizations suffer a major breach, it&#8217;s usually a simple task to convince executives to beef up cybersecurity solutions. But for hospitals, clinics and other healthcare providers that have escaped major incidents, it can prove difficult to persuade stakeholders outside of the IT and IS departments to view cybersecurity as a top priority. T<\/span><\/p>\n<p><b>Interconnected Systems and Internet of Things (IoT) Devices<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The integration of interconnected systems and the use of IoT devices in healthcare have expanded the attack surface for cybercriminals. Each connected device presents a potential entry point for hackers to exploit vulnerabilities and gain unauthorized access to sensitive data. Ensuring the security of these interconnected systems poses a significant challenge for healthcare organizations.<\/span><\/p>\n<p><b>Regulatory Compliance Challenges<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The healthcare industry is subject to stringent regulatory requirements, such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States and GDPR in Europe. While these regulations aim to protect patient privacy and data security, they also place a burden on healthcare organizations to navigate complex compliance requirements. The challenge of simultaneously ensuring compliance and maintaining robust cybersecurity practices adds to the industry&#8217;s difficulties.\u00a0<\/span><\/p>\n<p><b>Conclusion\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The healthcare industry&#8217;s struggle with cybersecurity is a multifaceted challenge that stems from a combination of technological, human, and systemic factors. Addressing these issues requires a comprehensive and collaborative approach involving healthcare professionals, policymakers, and cybersecurity experts. As the industry continues to embrace digital innovation, it must prioritize cybersecurity to safeguard patient data, maintain trust, and fulfill its primary mission of providing quality healthcare.<\/span><\/p>\n<p><b>Monitoring Remote Sessions<\/b><\/p>\n<p><span style=\"font-weight: 400;\">With more employees working from home, companies are seeking ways of monitoring remote sessions. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won\u2019t be able to see what was happening on users\u2019 desktops when the breach occurred. Another reason for recording remote sessions is to maintain compliance, as required for medical and financial institutions or auditing for business protocols, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.tsfactory.com\/products\/tsf-products.php\">TSFactory\u2019s RecordTS v7<\/a> will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p><b>Sources<\/b><\/p>\n<p><a href=\"https:\/\/usa.kaspersky.com\/blog\/keeping-a-pulse-on-cybersecurity-in-healthcare\/18376\/\"><span style=\"font-weight: 400;\">https:\/\/usa.kaspersky.com\/blog\/keeping-a-pulse-on-cybersecurity-in-healthcare\/18376\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC8059789\/#:~:text=Overall%2C%20the%20health%20care%20industry,target%20%5B15%2C22%5D\"><span style=\"font-weight: 400;\">https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC8059789<\/span><\/a><span style=\"font-weight: 400;\">\/<\/span><\/p>\n<p><a href=\"https:\/\/www.redcentricplc.com\/security\/cybersecurity-landscape-in-healthcare\/\"><span style=\"font-weight: 400;\">https:\/\/www.redcentricplc.com\/security\/cybersecurity-landscape-in-healthcare\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2023\/09\/08\/confronting-the-chronic-healthcare-cybersecurity-crisis\/?sh=4985bc8c78e4\"><span style=\"font-weight: 400;\">https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2023\/09\/08\/confronting-the-chronic-healthcare-cybersecurity-crisis\/?sh=4985bc8c78e4<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.mosmedicalrecordreview.com\/blog\/why-medical-records-are-hot-product-on-the-dark-web-marketplace\/\"><span style=\"font-weight: 400;\">https:\/\/www.mosmedicalrecordreview.com\/blog\/why-medical-records-are-hot-product-on-the-dark-web-marketplace\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.cdw.com\/content\/cdw\/en\/articles\/security\/the-cost-of-cybersecurity-in-healthcare.html\"><span style=\"font-weight: 400;\">https:\/\/www.cdw.com\/content\/cdw\/en\/articles\/security\/the-cost-of-cybersecurity-in-healthcare.html<\/span><\/a><\/p>\n<p><a href=\"https:\/\/research.aimultiple.com\/cybersecurity-in-healthcare\/\"><span style=\"font-weight: 400;\">https:\/\/research.aimultiple.com\/cybersecurity-in-healthcare\/<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Healthcare Challenges The healthcare industry, with its primary focus on saving lives and improving patient well-being, is facing a growing and alarming challenge in the realm of cybersecurity. The digital transformation of healthcare has undoubtedly brought numerous benefits, such as improved patient care, efficient data management, and streamlined operations. However, the sector is plagued [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Healthcare Challenges - Blogs<\/title>\n<meta name=\"description\" content=\"The healthcare industry, with its primary focus on saving lives and improving patient well-being, is facing a growing and alarming challenge in the realm of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Healthcare Challenges - Blogs\" \/>\n<meta property=\"og:description\" content=\"The healthcare industry, with its primary focus on saving lives and improving patient well-being, is facing a growing and alarming challenge in the realm of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-18T14:28:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-18T14:34:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/01\/pexels-cottonbro-studio-4057764.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/\",\"name\":\"Cybersecurity Healthcare Challenges - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/01\/pexels-cottonbro-studio-4057764.jpg\",\"datePublished\":\"2024-01-18T14:28:24+00:00\",\"dateModified\":\"2024-01-18T14:34:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"The healthcare industry, with its primary focus on saving lives and improving patient well-being, is facing a growing and alarming challenge in the realm of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/01\/pexels-cottonbro-studio-4057764.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/01\/pexels-cottonbro-studio-4057764.jpg\",\"width\":1280,\"height\":1920,\"caption\":\"Cybersecurity Healthcare Challenges\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Healthcare Challenges\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Healthcare Challenges - Blogs","description":"The healthcare industry, with its primary focus on saving lives and improving patient well-being, is facing a growing and alarming challenge in the realm of cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Healthcare Challenges - Blogs","og_description":"The healthcare industry, with its primary focus on saving lives and improving patient well-being, is facing a growing and alarming challenge in the realm of cybersecurity.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2024-01-18T14:28:24+00:00","article_modified_time":"2024-01-18T14:34:54+00:00","og_image":[{"width":1280,"height":1920,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/01\/pexels-cottonbro-studio-4057764.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/","name":"Cybersecurity Healthcare Challenges - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/01\/pexels-cottonbro-studio-4057764.jpg","datePublished":"2024-01-18T14:28:24+00:00","dateModified":"2024-01-18T14:34:54+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"The healthcare industry, with its primary focus on saving lives and improving patient well-being, is facing a growing and alarming challenge in the realm of cybersecurity.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/01\/pexels-cottonbro-studio-4057764.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/01\/pexels-cottonbro-studio-4057764.jpg","width":1280,"height":1920,"caption":"Cybersecurity Healthcare Challenges"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurityhealthcarechallenges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Healthcare Challenges"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=841"}],"version-history":[{"count":5,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/841\/revisions"}],"predecessor-version":[{"id":847,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/841\/revisions\/847"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/843"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}