{"id":1777,"date":"2022-08-30T13:52:09","date_gmt":"2022-08-30T13:52:09","guid":{"rendered":"https:\/\/www.ilinksolutions.com\/post\/?p=1777"},"modified":"2024-06-09T13:44:25","modified_gmt":"2024-06-09T13:44:25","slug":"role-of-cybersecurity-in-safeguarding-the-united-states","status":"publish","type":"post","link":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/","title":{"rendered":"The Role of Cybersecurity in Safeguarding the United States"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":1792,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[3,8],"tags":[],"class_list":["post-1777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-software-testing","entry"],"acf":{"short_description":"With custom-designed digital transformation, you can overcome these obstacles and create systems that put your operation on par with the cybersecurity standards needed to protect this country and its digital assets. To learn how this can happen for your organization, connect with our team at i-Link Solutions today. ","hero_video":"","block_1":"<h3>The Role of Cybersecurity in Safeguarding the United States<\/h3>\r\nIn September 2021, members of one of the most renowned ransomware groups, REvil, were met with <a href=\"https:\/\/threatpost.com\/revil-affiliates-arrested-doj-europol\/176087\/\" target=\"_blank\" rel=\"noopener\">an unpleasant surprise:<\/a> The hacked were hacking back. Specifically, the U.S. Department of Justice (DOJ) and its partners had penetrated the cyber thugs\u2019 infrastructure by hacking their backup infrastructure. REvil, whose servers had been shut down, restored them using a backup. But the U.S. Government had already hacked it, and they used their access to start controlling some of REvil\u2019s systems. As a result, over 49,000 computers and servers received protection from insipid ransomware.","image_block_1":"","block_2":"<h3>How the Government Is Striking Back<\/h3>\r\nThe U.S. government isn\u2019t taking ransomware and other cyber attacks sitting down. But its attack-back strategy involves more than covert digital ops throughout the dark web. The government has started instituting cyber standards that require businesses in some of the most pivotal industries to tighten their cyber belts. For example:\r\n<ul>\r\n \t<li>Those in the healthcare industry are mandated by the <a href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\">Health Insurance and Portability and Accountability Act (HIPAA)<\/a> to safeguard sensitive patient data.<\/li>\r\n \t<li>The <a href=\"https:\/\/www.ftc.gov\/business-guidance\/privacy-security\/gramm-leach-bliley-act\">Gramm-Leach-Bliley Act<\/a> forces those in the financial sector to develop and provide information regarding stringent cybersecurity standards for the protection of financial information.<\/li>\r\n \t<li>The <a href=\"https:\/\/www.dhs.gov\/topics\/cybersecurity\">Department of Homeland Security<\/a> has engaged in a series of sprints to protect public, government, and private sector digital assets from attacks.<\/li>\r\n<\/ul>\r\nUsing these and other measures, the Department of Defense (DoD) is fulfilling its three ongoing missions:\r\n<ul>\r\n \t<li>Defend its networks, information, and systems from attackers<\/li>\r\n \t<li>Defend the homeland of the United States<\/li>\r\n \t<li>Support military operations with cyber tools, as well as defend organizations and people in the United States from significant attacks<\/li>\r\n<\/ul>\r\nThe efforts by the government have not only tightened security measures for organizations throughout the country.\u00a0 Their effects have also made a deep impact on the software development process.\r\n<h3>The Link Between U.S. Cybersecurity Policies and Software Development<\/h3>\r\nThe connection between the cybersecurity policies of the U.S. and software development is similar to those between U.S. driver safety laws and the car manufacturing industry. In short, private sector developers are saying: If the law dictates it, we have to build it. Truly secure software programs used to exist merely in fields of dreams. But now, developers know that when it comes to a secure app, if they build it, compliance will come. As a result, applications designed for a range of industries have security features as well as data protection measures woven into their DNA.\r\n\r\nThe necessity for secure apps that keep businesses in compliance with U.S. data security regulations has helped give birth to a relatively recent development methodology: DevSecOps.","block_3":"<h3>The Emergence of DevSecOps<\/h3>\r\nDevSecOps involves incorporating security into the development process. Not as an afterthought or \u201cfinal step,\u201d but throughout the development life cycle. The approach involves giving cybersecurity experts a seat at the development table. It ensures that all of an app\u2019s components\u2014and the interactions between them\u2014enhance the security of the app, customer data, and the business systems that interface with it.\r\n\r\nThis approach is essential when designing solutions for organizations that need to rise to meet U.S. cybersecurity standards. For example, suppose a healthcare provider needed an app that managed patient data. This\u00a0is easier for doctors and nurses to access the info they need on mobile devices in the palms of their hands.\r\n\r\nHIPAA dictates that healthcare organizations need to \u201cprotect against reasonably anticipated, impermissible uses or disclosures\u201d of patient data. Therefore, security pros on the DevSecOps team may have to work with the front-end and back-end developers to ensure:\r\n<ul>\r\n \t<li>Multi-factor authentication: used to prevent people from seeing unauthorized info in the event a mobile device gets left in front of the wrong eyes or in a public place<\/li>\r\n \t<li>The secure transferal of information to and from back-end databases, whether they\u2019re in the cloud or connected via a data center on the premises<\/li>\r\n \t<li>Role-based access privileges limit access, so only users that need certain elements of the app to do their jobs have the right to see and\/or modify them.<\/li>\r\n<\/ul>\r\nIn this way, the final product has the security features necessary to keep the healthcare organization\u2019s data and operations secure.\r\n<h3>How A.I. Enables Companies to Conform to U.S. Cybersecurity Requirements<\/h3>\r\nIt\u2019s infeasible to manually monitor and adjust the data management systems. Especially if they work with the information of tens of thousands of people. But with A.I., it can be relatively easy to meet data management standards outlined by the government\u2014without sacrificing efficiency.\r\n\r\nFor example, A.I. can be used in search algorithms that execute queries across large volumes of data\u2014much of which may be designated as \u201csensitive\u201d by U.S. regulations. Using AI-enhanced search functions, everyone from financial advisers to physicians can quickly locate the information they need without leaving sensitive data on the screens of workstations for inordinate amounts of time.\r\n\r\nThis was the case in a recent study performed with doctors using an AI-enabled database. About 91.7% of them preferred the system, which produced the results they needed in <a href=\"https:\/\/healthitanalytics.com\/news\/artificial-intelligence-assists-with-ehr-data-organization\">18% less time<\/a> than a traditional database search.\r\n<h3>Digital Transformations That Help Align Organizations with Government Standards<\/h3>\r\nThere are several challenges organizations face. Especially when it comes to ensuring their systems protect them from the same threats the government is combatting:\r\n<ol>\r\n \t<li>Lack of training or resources to deal with the most dangerous threats<\/li>\r\n \t<li>Lack of evidence to test the real capacity of threat prevention and\/or mitigation<\/li>\r\n \t<li>Lack of specific technical measures to address threats<\/li>\r\n \t<li>Lack of quality systems to stop sophisticated attacks<\/li>\r\n<\/ol>\r\nBut with custom-designed digital transformation, you can overcome these obstacles.\u00a0 You can also create systems that put your operation on par with the cybersecurity standards needed to protect this country and its digital assets. To learn how this can happen for your organization, connect with our team at i-Link Solutions today.","card_block_3":"","repeat_block":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity - i-Link Solutions<\/title>\n<meta name=\"description\" content=\"Create systems that put your operation on par with the cybersecurity standards needed to protect this country and its digital assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Role of Cybersecurity in Safeguarding the United States\" \/>\n<meta property=\"og:description\" content=\"Create systems that put your operation on par with the cybersecurity standards needed to protect this country and its digital assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/\" \/>\n<meta property=\"og:site_name\" content=\"i-Link Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-30T13:52:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-09T13:44:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Role of Cybersecurity in Safeguarding the United States\" \/>\n<meta name=\"twitter:description\" content=\"Connect with our team at i-Link Solutions today.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/a39ce4a68ef63a9d47b0d0568410e1ab\"},\"headline\":\"The Role of Cybersecurity in Safeguarding the United States\",\"datePublished\":\"2022-08-30T13:52:09+00:00\",\"dateModified\":\"2024-06-09T13:44:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/\"},\"wordCount\":9,\"publisher\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg\",\"articleSection\":[\"Insights\",\"Software Testing\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/\",\"name\":\"Cybersecurity - i-Link Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg\",\"datePublished\":\"2022-08-30T13:52:09+00:00\",\"dateModified\":\"2024-06-09T13:44:25+00:00\",\"description\":\"Create systems that put your operation on par with the cybersecurity standards needed to protect this country and its digital assets.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#primaryimage\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg\",\"width\":1440,\"height\":450,\"caption\":\"Background image of a Cybersecurity specialist\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ilinksolutions.com\/post\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Role of Cybersecurity in Safeguarding the United States\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#website\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/\",\"name\":\"i-Link Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ilinksolutions.com\/post\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#organization\",\"name\":\"i-Link Solutions\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2020\/04\/logo.png\",\"contentUrl\":\"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2020\/04\/logo.png\",\"width\":228,\"height\":80,\"caption\":\"i-Link Solutions\"},\"image\":{\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/a39ce4a68ef63a9d47b0d0568410e1ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/172a84a56feea1d4e81535eaa9fdfbc1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/172a84a56feea1d4e81535eaa9fdfbc1?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.ilinksolutions.com\/post\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity - i-Link Solutions","description":"Create systems that put your operation on par with the cybersecurity standards needed to protect this country and its digital assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/","og_locale":"en_US","og_type":"article","og_title":"The Role of Cybersecurity in Safeguarding the United States","og_description":"Create systems that put your operation on par with the cybersecurity standards needed to protect this country and its digital assets.","og_url":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/","og_site_name":"i-Link Solutions","article_published_time":"2022-08-30T13:52:09+00:00","article_modified_time":"2024-06-09T13:44:25+00:00","og_image":[{"width":1440,"height":450,"url":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"The Role of Cybersecurity in Safeguarding the United States","twitter_description":"Connect with our team at i-Link Solutions today.","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#article","isPartOf":{"@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/"},"author":{"name":"admin","@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/a39ce4a68ef63a9d47b0d0568410e1ab"},"headline":"The Role of Cybersecurity in Safeguarding the United States","datePublished":"2022-08-30T13:52:09+00:00","dateModified":"2024-06-09T13:44:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/"},"wordCount":9,"publisher":{"@id":"https:\/\/www.ilinksolutions.com\/post\/#organization"},"image":{"@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg","articleSection":["Insights","Software Testing"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/","url":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/","name":"Cybersecurity - i-Link Solutions","isPartOf":{"@id":"https:\/\/www.ilinksolutions.com\/post\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#primaryimage"},"image":{"@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg","datePublished":"2022-08-30T13:52:09+00:00","dateModified":"2024-06-09T13:44:25+00:00","description":"Create systems that put your operation on par with the cybersecurity standards needed to protect this country and its digital assets.","breadcrumb":{"@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#primaryimage","url":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg","contentUrl":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2022\/08\/Hero-Cybersecurity.jpg","width":1440,"height":450,"caption":"Background image of a Cybersecurity specialist"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ilinksolutions.com\/post\/role-of-cybersecurity-in-safeguarding-the-united-states\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ilinksolutions.com\/post\/"},{"@type":"ListItem","position":2,"name":"The Role of Cybersecurity in Safeguarding the United States"}]},{"@type":"WebSite","@id":"https:\/\/www.ilinksolutions.com\/post\/#website","url":"https:\/\/www.ilinksolutions.com\/post\/","name":"i-Link Solutions","description":"","publisher":{"@id":"https:\/\/www.ilinksolutions.com\/post\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ilinksolutions.com\/post\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.ilinksolutions.com\/post\/#organization","name":"i-Link Solutions","url":"https:\/\/www.ilinksolutions.com\/post\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/logo\/image\/","url":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2020\/04\/logo.png","contentUrl":"https:\/\/www.ilinksolutions.com\/post\/wp-content\/uploads\/2020\/04\/logo.png","width":228,"height":80,"caption":"i-Link Solutions"},"image":{"@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/a39ce4a68ef63a9d47b0d0568410e1ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.ilinksolutions.com\/post\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/172a84a56feea1d4e81535eaa9fdfbc1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/172a84a56feea1d4e81535eaa9fdfbc1?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.ilinksolutions.com\/post\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/posts\/1777"}],"collection":[{"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/comments?post=1777"}],"version-history":[{"count":12,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/posts\/1777\/revisions"}],"predecessor-version":[{"id":3645,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/posts\/1777\/revisions\/3645"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/media\/1792"}],"wp:attachment":[{"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/media?parent=1777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/categories?post=1777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ilinksolutions.com\/post\/wp-json\/wp\/v2\/tags?post=1777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}