{"id":888,"date":"2024-07-04T10:01:46","date_gmt":"2024-07-04T10:01:46","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=888"},"modified":"2024-07-04T10:01:46","modified_gmt":"2024-07-04T10:01:46","slug":"why-your-operation-technology-ot-needs-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/","title":{"rendered":"Why Your Operation Technology (OT) Needs Cybersecurity"},"content":{"rendered":"<p><b>Why Your Operation Technology (OT) Needs Cybersecurity\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Until recently, manufacturing hardware and processes existed largely un-networked. As the global economy demands production and logistical schedules optimized down to the minute, many industries are securely connecting operational technology (OT) to improve production processes and maximize efficiencies.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In an era where industries like energy, manufacturing, and transportation have embraced digitalisation, the term &#8220;<a href=\"https:\/\/www.fortinet.com\/solutions\/industries\/scada-industrial-control-systems\/what-is-ot-security\">operational technology<\/a>&#8221; (OT) has gained prominence. OT encompasses the hardware and software used to control physical processes, from power grids and water treatment plants to manufacturing assembly lines.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While this technological evolution has brought about incredible advancements in efficiency and productivity, it has also accelerated the size, scope, and composition of an organization&#8217;s attack surface.\u00a0<\/span><\/p>\n<p><b>Understanding the Risks: Why OT Cybersecurity is Crucial<\/b><\/p>\n<p><b>1. Increased Connectivity and Integration<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Digital Transformation<\/b><span style=\"font-weight: 400;\">: The integration of OT with IT systems as part of digital transformation initiatives has increased connectivity, making OT systems more vulnerable to cyber-attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Remote Access<\/b><span style=\"font-weight: 400;\">: Remote monitoring and control capabilities, though convenient, open up new attack vectors for cybercriminals.<\/span><\/li>\n<\/ul>\n<p><b>2. Critical Infrastructure Protection<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Essential Services<\/b><span style=\"font-weight: 400;\">: OT systems often manage critical infrastructure that society relies on, such as power grids, water treatment facilities, and transportation networks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>National Security<\/b><span style=\"font-weight: 400;\">: Disruption in these services can have severe consequences for national security, public safety, and the economy.<\/span><\/li>\n<\/ul>\n<p><b>3. Increasing Cyber Threats<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Sophisticated Attacks<\/b><span style=\"font-weight: 400;\">: Threat actors targeting OT are becoming more sophisticated, with attackers using advanced persistent threats (APTs) to infiltrate and disrupt operations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Targeted Attacks<\/b><span style=\"font-weight: 400;\">: Specific industries, such as energy and manufacturing, are frequent targets due to their critical nature and potential for disruption.<\/span><\/li>\n<\/ul>\n<p><b>4. Legacy Systems and Vulnerabilities<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Outdated Technology<\/b><span style=\"font-weight: 400;\">: Many OT systems were designed before cybersecurity was a major concern, resulting in outdated technology with inherent vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Lack of Patching<\/b><span style=\"font-weight: 400;\">: Industrial control systems (ICS) and other OT components often lack regular updates and patches, making them more susceptible to attacks.<\/span><\/li>\n<\/ul>\n<p><b>5. Regulatory Compliance<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Industry Regulations<\/b><span style=\"font-weight: 400;\">: Compliance with industry-specific regulations (e.g., NERC CIP for energy, FDA for pharmaceuticals) often mandates stringent cybersecurity measures for OT systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Government Mandates<\/b><span style=\"font-weight: 400;\">: Increasing government regulations require organizations to implement robust cybersecurity frameworks to protect critical infrastructure.<\/span><\/li>\n<\/ul>\n<p><b>6. Safety and Reliability<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Operational Safety<\/b><span style=\"font-weight: 400;\">: Cyber-attacks on OT can lead to dangerous situations, putting workers\u2019 safety at risk and potentially causing physical harm.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Reliability of Operations<\/b><span style=\"font-weight: 400;\">: Ensuring the continuous and reliable operation of industrial processes is crucial. Cyber-attacks can cause significant downtime and disrupt production.<\/span><\/li>\n<\/ul>\n<p><b>7. Financial Impact<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cost of Downtime<\/b><span style=\"font-weight: 400;\">: Operational disruptions due to cyber incidents can lead to substantial financial losses from halted production, repair costs, and lost revenue.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ransomware<\/b><span style=\"font-weight: 400;\">: The rise of ransomware attacks targeting OT systems can result in significant financial demands and operational paralysis.<\/span><\/li>\n<\/ul>\n<p><b>8. Intellectual Property Protection<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Sensitive Data<\/b><span style=\"font-weight: 400;\">: OT environments often contain valuable intellectual property, proprietary processes, and trade secrets that cybercriminals aim to steal.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Competitive Advantage<\/b><span style=\"font-weight: 400;\">: Protecting this information is essential for maintaining a competitive edge in the industry.<\/span><\/li>\n<\/ul>\n<p><b>9. Incident Response and Recovery<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Preparedness<\/b><span style=\"font-weight: 400;\">: Having robust cybersecurity measures in place helps organizations quickly detect, respond to, and recover from cyber incidents.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mitigation<\/b><span style=\"font-weight: 400;\">: Effective cybersecurity can mitigate the impact of an attack, reducing downtime and preventing data loss.<\/span><\/li>\n<\/ul>\n<p><b>Conclusion<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Securing OT systems is not just about protecting technology but safeguarding critical infrastructure, ensuring operational continuity, and maintaining public safety. As cyber threats evolve, the need for comprehensive OT cybersecurity strategies becomes increasingly crucial. Organizations must invest in robust cybersecurity measures, regular updates, employee training, and incident response planning to protect their OT environments from the growing landscape of cyber threats.<\/span><\/p>\n<p><b>Monitoring Remote Sessions<\/b><\/p>\n<p><span style=\"font-weight: 400;\">With more employees working from home, companies are seeking ways of monitoring remote sessions. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won\u2019t be able to see what was happening on users\u2019 desktops when the breach occurred. Another reason for recording remote sessions is to maintain compliance, as required for medical and financial institutions or auditing for business protocols, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TSFactory\u2019s RecordTS v7 will record Windows remote sessions reliably and securely for RDS, Citrix and VMware systems. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/\"><span style=\"font-weight: 400;\">Click here<\/span><\/a><span style=\"font-weight: 400;\"> to learn more about secure remote session recording.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why Your Operation Technology (OT) Needs Cybersecurity\u00a0 Until recently, manufacturing hardware and processes existed largely un-networked. As the global economy demands production and logistical schedules optimized down to the minute, many industries are securely connecting operational technology (OT) to improve production processes and maximize efficiencies.\u00a0 In an era where industries like energy, manufacturing, and transportation [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":889,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Your Operation Technology (OT) Needs Cybersecurity - Blogs<\/title>\n<meta name=\"description\" content=\"Until recently, manufacturing hardware and processes existed largely un-networked. As the global economy demands production and logistical schedules optimized down to the minute, many industries are securely connecting operational technology (OT) to improve production processes and maximize efficiencies.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Your Operation Technology (OT) Needs Cybersecurity - Blogs\" \/>\n<meta property=\"og:description\" content=\"Until recently, manufacturing hardware and processes existed largely un-networked. As the global economy demands production and logistical schedules optimized down to the minute, many industries are securely connecting operational technology (OT) to improve production processes and maximize efficiencies.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-04T10:01:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/operationtechnology.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/\",\"name\":\"Why Your Operation Technology (OT) Needs Cybersecurity - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/operationtechnology.jpg\",\"datePublished\":\"2024-07-04T10:01:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"Until recently, manufacturing hardware and processes existed largely un-networked. As the global economy demands production and logistical schedules optimized down to the minute, many industries are securely connecting operational technology (OT) to improve production processes and maximize efficiencies.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/operationtechnology.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/operationtechnology.jpg\",\"width\":1280,\"height\":1920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Your Operation Technology (OT) Needs Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Your Operation Technology (OT) Needs Cybersecurity - Blogs","description":"Until recently, manufacturing hardware and processes existed largely un-networked. As the global economy demands production and logistical schedules optimized down to the minute, many industries are securely connecting operational technology (OT) to improve production processes and maximize efficiencies.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Why Your Operation Technology (OT) Needs Cybersecurity - Blogs","og_description":"Until recently, manufacturing hardware and processes existed largely un-networked. As the global economy demands production and logistical schedules optimized down to the minute, many industries are securely connecting operational technology (OT) to improve production processes and maximize efficiencies.\u00a0","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2024-07-04T10:01:46+00:00","og_image":[{"width":1280,"height":1920,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/operationtechnology.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/","name":"Why Your Operation Technology (OT) Needs Cybersecurity - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/operationtechnology.jpg","datePublished":"2024-07-04T10:01:46+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"Until recently, manufacturing hardware and processes existed largely un-networked. As the global economy demands production and logistical schedules optimized down to the minute, many industries are securely connecting operational technology (OT) to improve production processes and maximize efficiencies.\u00a0","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/operationtechnology.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2024\/07\/operationtechnology.jpg","width":1280,"height":1920},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/why-your-operation-technology-ot-needs-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Why Your Operation Technology (OT) Needs Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=888"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/888\/revisions"}],"predecessor-version":[{"id":890,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/888\/revisions\/890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/889"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}