{"id":1561,"date":"2022-06-30T10:39:50","date_gmt":"2022-06-30T10:39:50","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=1561"},"modified":"2023-07-18T13:52:51","modified_gmt":"2023-07-18T13:52:51","slug":"insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/","title":{"rendered":"Insufficient cyber security skills are behind 80% of breaches: Misconceptions to be aware of"},"content":{"rendered":"<p>Vulnerable digital platforms put millions of users&#8217; data at risk everday. A data breach can occur on any system or application, from top-tier social media platforms to small IT service provider apps. Most of the time data breaches occur due to poor system set up often due to a lack of cyber security skills.<\/p>\n<p>Not all breaches are the same. Some are caused by a faulty system or bugs in the software or inexperienced programmers. As more and more companies build their online presence, a significant part of their business is online-based and therefore vulnerable. A business may only have a few products or services showcased and a simple payment option on their website but that is enough for hackers to cause some real damage and for significant data breaches to occur.<\/p>\n<p><strong>Let&#8217;s go through some notable breaches:<\/strong><\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1563 aligncenter\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/facebook-threat-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/facebook-threat-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/facebook-threat-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/facebook-threat-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/facebook-threat-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/facebook-threat-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/facebook-threat-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/facebook-threat-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/facebook-threat.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\n<p>&nbsp;<\/p>\n<p><strong>Facebook API bug:<\/strong> Even though API makes interaction with web functionality easy, it can put information into the wrong hands if not handled correctly. In 2018 a photo API bug on Facebook enabled third-party apps to see pictures belonging to nearly 7 million users the apps weren\u2019t authorized to access. This may have allowed up to 1,500 apps from 876 developers to inappropriately access people&#8217;s pictures.\u00a0 The bug also allowed some third-party apps to see photos that people had uploaded to the Facebook platform but hadn\u2019t shared.<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1565 aligncenter\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/LOG4J-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/LOG4J-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/LOG4J-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/LOG4J-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/LOG4J-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/LOG4J-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/LOG4J-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/LOG4J-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/LOG4J.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\n<p>&nbsp;<\/p>\n<p><strong>Log4j vulnerability:<\/strong> java-based Log4j is a widely used functionality for web programs. As used in most services, the Log4j vulnerability exposed hundreds of industries to potential attacks. Even tech giants such as Amazon, Google, Twitter, and Microsoft suffered from exposure. Nearly one-third of the world&#8217;s web servers use java, and Log4j is a critical functionality. Over 3.7 million hacking attempts with 46 per cent of familiar malicious entities are recorded.<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1566 aligncenter\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/colonial-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/colonial-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/colonial-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/colonial-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/colonial-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/colonial-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/colonial-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/colonial-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/colonial.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\n<p>&nbsp;<\/p>\n<p><strong>Colonial Pipeline ransomware cyber attack:<\/strong> On May 7, 2021, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Colonial_Pipeline\">Colonial Pipeline<\/a>, an American\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Oil_pipeline\">oil pipeline<\/a>\u00a0system that carries\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Gasoline\">gasoline<\/a>\u00a0and\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Jet_fuel\">jet fuel<\/a>\u00a0mainly to the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Southeastern_United_States\">Southeastern United States<\/a>, suffered a\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Ransomware\">ransomware<\/a>\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Cyberattack\">cyberattack<\/a>\u00a0that impacted computerized equipment managing the pipeline. The company was forced to stop all pipeline operations to contain the attack and had to pay $4.4 million to the hacker group calling themselves DarkSide. It was the largest cyberattack on an oil infrastructure target in the history of the United States.\u00a0Darkside is believed to have stolen 100 gigabytes of data from company servers the day before the malware attack.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Prevention Role<\/strong><\/p>\n<p>It doesn&#8217;t matter how secure a system is, it is always vulnerable to hackers. According to statistics, almost two-thirds of businesses have lost revenue due to security issues, most of which occurred due to errors made by unskilled developers. IT skills and cybersecurity skills are not the same thing. Often startups and new businesses want to tackle both in the same budget. Cybersecurity professionals can be found within the IT department but they have to be top-notch. For this reason, many companies work with managed services providers (MSPs) to provide a simpler solution and access the security skills needed.<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1567 aligncenter\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/ransomware-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/ransomware-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/ransomware-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/ransomware-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/ransomware-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/ransomware-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/ransomware-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/ransomware-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/ransomware.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\n<p>&nbsp;<\/p>\n<p>Sixty-four percent of organisations lost revenue in 2021 due to ransomware attacks. It is not a new phenomenon, but the post-pandemic use case for ransomware attacks grew tenfold. For C-level executives, the cybersecurity skill gap is a crucial concern. Sixty percent of leaders struggle to find the right candidate to tackle advanced cyber threats. Fifty-two percent of C-level executives reported that it is challenging to retain talent.<\/p>\n<p>Organisations are looking to hire diverse teams to handle critical situations rather than training them to a certain level, which may take a while. &#8220;Zero-day&#8221; software vulnerability is another intriguing concept. It is an excellent opportunity for seasoned veterans to find loopholes in company software. Without a proper skillset, this vulnerability may remain unexposed and undetected.<\/p>","protected":false},"excerpt":{"rendered":"<p>Vulnerable digital platforms put millions of users&#8217; data at risk everday. A data breach can occur on any system or&#8230;<\/p>","protected":false},"author":35,"featured_media":1562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37,36],"tags":[],"class_list":["post-1561","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Insufficient cyber security skills are behind 80% of breaches: Misconceptions to be aware of - Techknowledge<\/title>\n<meta name=\"description\" content=\"Most of the time data breaches occur due to poor system set up often due to a lack of cyber security skills.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insufficient cyber security skills are behind 80% of breaches: Misconceptions to be aware of - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"Most of the time data breaches occur due to poor system set up often due to a lack of cyber security skills.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-30T10:39:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-18T13:52:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/cyber-security-skills.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kiruthika Dhanajeyan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kiruthika Dhanajeyan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/\",\"url\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/\",\"name\":\"Insufficient cyber security skills are behind 80% of breaches: Misconceptions to be aware of - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/cyber-security-skills.png\",\"datePublished\":\"2022-06-30T10:39:50+00:00\",\"dateModified\":\"2023-07-18T13:52:51+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/c049902fc7b3f4f50d4409a0fb538e2d\"},\"description\":\"Most of the time data breaches occur due to poor system set up often due to a lack of cyber security skills.\",\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/cyber-security-skills.png\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/cyber-security-skills.png\",\"width\":1200,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest news\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Insufficient cyber security skills are behind 80% of breaches: Misconceptions to be aware of\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/c049902fc7b3f4f50d4409a0fb538e2d\",\"name\":\"Kiruthika Dhanajeyan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/664083f45bd14af2f89d70393a294dad3e765b2345976e81a523360ddf66ac8c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/664083f45bd14af2f89d70393a294dad3e765b2345976e81a523360ddf66ac8c?s=96&d=mm&r=g\",\"caption\":\"Kiruthika Dhanajeyan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insufficient cyber security skills are behind 80% of breaches: Misconceptions to be aware of - Techknowledge","description":"Most of the time data breaches occur due to poor system set up often due to a lack of cyber security skills.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/","og_locale":"fr_FR","og_type":"article","og_title":"Insufficient cyber security skills are behind 80% of breaches: Misconceptions to be aware of - Techknowledge","og_description":"Most of the time data breaches occur due to poor system set up often due to a lack of cyber security skills.","og_url":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/","og_site_name":"Techknowledge","article_published_time":"2022-06-30T10:39:50+00:00","article_modified_time":"2023-07-18T13:52:51+00:00","og_image":[{"width":1200,"height":1200,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/cyber-security-skills.png","type":"image\/png"}],"author":"Kiruthika Dhanajeyan","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Kiruthika Dhanajeyan","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/","url":"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/","name":"Insufficient cyber security skills are behind 80% of breaches: Misconceptions to be aware of - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/cyber-security-skills.png","datePublished":"2022-06-30T10:39:50+00:00","dateModified":"2023-07-18T13:52:51+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/c049902fc7b3f4f50d4409a0fb538e2d"},"description":"Most of the time data breaches occur due to poor system set up often due to a lack of cyber security skills.","breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/cyber-security-skills.png","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/cyber-security-skills.png","width":1200,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/insufficient-cyber-security-skills-are-behind-80-of-breaches-misconceptions-to-be-aware-of\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Latest news","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/"},{"@type":"ListItem","position":4,"name":"Insufficient cyber security skills are behind 80% of breaches: Misconceptions to be aware of"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/c049902fc7b3f4f50d4409a0fb538e2d","name":"Kiruthika Dhanajeyan","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/664083f45bd14af2f89d70393a294dad3e765b2345976e81a523360ddf66ac8c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/664083f45bd14af2f89d70393a294dad3e765b2345976e81a523360ddf66ac8c?s=96&d=mm&r=g","caption":"Kiruthika Dhanajeyan"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/comments?post=1561"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1561\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media\/1562"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media?parent=1561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/categories?post=1561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/tags?post=1561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}