{"id":6927,"date":"2022-12-19T10:39:48","date_gmt":"2022-12-19T09:39:48","guid":{"rendered":"https:\/\/sodapl.com\/?p=6927"},"modified":"2022-12-19T11:07:58","modified_gmt":"2022-12-19T10:07:58","slug":"the-rise-of-ransomware-steps-to-increase-your-cybersecurity","status":"publish","type":"post","link":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/","title":{"rendered":"The rise of ransomware: steps to increase your cybersecurity"},"content":{"rendered":"\n<p>Critical cybersecurity threats nowadays are ransomware and supply chain compromises, writes Tomasz Wojciechowski, CISO and Head of Cybersecurity at Spyrosoft, a member of SoDA Poland.<\/p>\n\n\n\n<p>The reason behind these trends is straightforward \u2013 money.&nbsp;<a href=\"https:\/\/www.bcs.org\/articles-opinion-and-research\/your-money-or-your-data\/\" rel=\"sponsored nofollow\">Criminal groups want to earn money<\/a>&nbsp;as easily as possible, considering the time and effort needed to prepare for such an attack. If an attacker wants to target a big company, they may face many issues and difficulties extending the time required to launch the attack.<\/p>\n\n\n\n<p>Attackers are clever. Therefore, they may try to hit the weakest link in the chain \u2013 a supplier of a big company, where cybersecurity may not be at a suitable level to tackle modern attacks. A good example of such a combination is the recent ransomware attack on the NHS where attackers targeted one of the suppliers.<\/p>\n\n\n\n<p>Fortunately, we are not helpless, and we can undertake specific actions to reduce the likelihood and impact of ransomware attacks \u2013 and take steps to take to improve your cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Prevention and detection<\/h2>\n\n\n\n<p>Prevention is mainly focused on both people and technology aspects. From the employees\u2019 perspective, it is crucial to improve awareness about modern threats and&nbsp;<a href=\"https:\/\/www.bcs.org\/articles-opinion-and-research\/the-colonial-pipeline-attack-that-revolutionised-ransomware-landscape\/\" rel=\"sponsored nofollow\">the consequences of a successful attack<\/a>&nbsp;on an organisation.<\/p>\n\n\n\n<p>A good approach is to guide and coach employees, teach them key cybersecurity principles, and encourage them to use common sense when using company equipment in daily tasks. It is also important to teach how to identify basic threats (e.g. phishing attempts) and report suspicious activities. It is vital to keep in mind that no matter how much awareness training an employee receives, it will not make them a cybersecurity expert. Therefore, other means must be put in place to&nbsp;<a href=\"https:\/\/www.bcs.org\/articles-opinion-and-research\/how-to-survive-a-ransomware-attack\/\" rel=\"sponsored nofollow\">battle ransomware attacks<\/a>.<\/p>\n\n\n\n<p>From a technology perspective, it is important to highlight key technologies like antivirus, EDR, firewall, sandbox, IDS\/IPS or mechanisms like browser isolation or even concepts like zero trust networking which are all valid defensive mechanisms to battle modern threats, including ransomware.<\/p>\n\n\n\n<p>It is also important to remember that although technology supports an organisation in many areas of cybersecurity, it is not a silver bullet solution which will eliminate the risk of a successful ransomware attack. The challenge is to design an overall security architecture which is scalable, resilient, and not overcomplicated for employees who are responsible for maintenance and security monitoring.<\/p>\n\n\n\n<p>Network segmentation should also be applied to limit any spread of ransomware. It will be much more manageable to contain the ransomware in one subnet than across the whole organisation.<\/p>\n\n\n\n<p>From a process perspective, it is crucial to have a backup policy and actual backups in place&nbsp;<a href=\"https:\/\/www.bcs.org\/articles-opinion-and-research\/ransomware-recovery\/\" target=\"_blank\" rel=\"noreferrer noopener sponsored nofollow\">ready to be able to recover systems<\/a>&nbsp;in case of a successful ransomware attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reaction<\/h2>\n\n\n\n<p>Reaction is the phase when an organisation must act after a successful attack by cybercriminals. It is essential to have a plan (playbook) detailing what to do in case of a ransomware attack. The plan&#8217;s goal is to ensure that there will not be any panic with ad-hoc actions taken, but that there\u2019s a structured approach with defined steps on how to deal with the attack.<\/p>\n\n\n\n<p>The plan should contain at least:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Defined roles and responsibilities for named individuals<\/li>\n\n\n\n<li>Defined communication path<\/li>\n\n\n\n<li>Defined technical process for incident handling, which should contain phases such as: identification, containment, remediation, recovery, lessons learned.<\/li>\n<\/ol>\n\n\n\n<p>Finally, the plan should be regularly tested to identify any gaps that should be addressed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">In summary<\/h2>\n\n\n\n<p>Unfortunately, it is expected that the volume of ransomware attacks will only increase. Therefore, organisations must ensure they are ready to deal with attacks efficiently.<\/p>\n\n\n\n<p>It is worth remembering that there is no one-size-fits-all solution in cybersecurity and the processes, procedures and tools should be tailored to an organisation\u2019s business model, risk profile and other specific requirements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About the author<\/h2>\n\n\n\n<p><a href=\"https:\/\/linkedin.com\/in\/towojciechowski\" rel=\"nofollow\">Tomasz Wojciechowski<\/a>&nbsp;is CISO and Head of Cybersecurity at&nbsp;<a href=\"https:\/\/spyro-soft.com\/\" rel=\"nofollow\">SpyroSoft<\/a>, a software engineering company and one of the fastest growing technology companies in Europe, according to the Financial Times.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Critical cybersecurity threats nowadays are ransomware and supply chain compromises, writes Tomasz Wojciechowski, CISO and Head of Cybersecurity at Spyrosoft, a member of SoDA Poland.<\/p>\n","protected":false},"author":4,"featured_media":6931,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[928],"tags":[],"class_list":["post-6927","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineered-in-poland"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The rise of ransomware: steps to increase your cybersecurity - SoDA<\/title>\n<meta name=\"description\" content=\"Critical cybersecurity threats nowadays are ransomware and supply chain compromises, writes Tomasz Wojciechowski, CISO and Head of Cybersecurity at Spyrosoft, a member of SoDA Poland.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The rise of ransomware: steps to increase your cybersecurity - SoDA\" \/>\n<meta property=\"og:description\" content=\"Critical cybersecurity threats nowadays are ransomware and supply chain compromises, writes Tomasz Wojciechowski, CISO and Head of Cybersecurity at Spyrosoft, a member of SoDA Poland.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"SoDA\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-19T09:39:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-19T10:07:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1760\" \/>\n\t<meta property=\"og:image:height\" content=\"990\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"SoDA - Software Development Association Poland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SoDA - Software Development Association Poland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/\"},\"author\":{\"name\":\"SoDA - Software Development Association Poland\",\"@id\":\"https:\/\/sodapl.com\/en\/#\/schema\/person\/24bd4593e4e505895bb0e9d50e3ecd6c\"},\"headline\":\"The rise of ransomware: steps to increase your cybersecurity\",\"datePublished\":\"2022-12-19T09:39:48+00:00\",\"dateModified\":\"2022-12-19T10:07:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/\"},\"wordCount\":675,\"publisher\":{\"@id\":\"https:\/\/sodapl.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png\",\"articleSection\":[\"Engineered in Poland\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/\",\"url\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/\",\"name\":\"The rise of ransomware: steps to increase your cybersecurity - SoDA\",\"isPartOf\":{\"@id\":\"https:\/\/sodapl.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png\",\"datePublished\":\"2022-12-19T09:39:48+00:00\",\"dateModified\":\"2022-12-19T10:07:58+00:00\",\"description\":\"Critical cybersecurity threats nowadays are ransomware and supply chain compromises, writes Tomasz Wojciechowski, CISO and Head of Cybersecurity at Spyrosoft, a member of SoDA Poland.\",\"breadcrumb\":{\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png\",\"contentUrl\":\"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png\",\"width\":1760,\"height\":990},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/sodapl.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The rise of ransomware: steps to increase your cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sodapl.com\/en\/#website\",\"url\":\"https:\/\/sodapl.com\/en\/\",\"name\":\"SoDA\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sodapl.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sodapl.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sodapl.com\/en\/#organization\",\"name\":\"SoDA\",\"url\":\"https:\/\/sodapl.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sodapl.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/09\/SoDA_LOGO_FULL_COLOR-cropped.svg\",\"contentUrl\":\"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/09\/SoDA_LOGO_FULL_COLOR-cropped.svg\",\"width\":230,\"height\":68,\"caption\":\"SoDA\"},\"image\":{\"@id\":\"https:\/\/sodapl.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pl.linkedin.com\/company\/sodapl-software-development-association-poland\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sodapl.com\/en\/#\/schema\/person\/24bd4593e4e505895bb0e9d50e3ecd6c\",\"name\":\"SoDA - Software Development Association Poland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sodapl.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/26a67384662be5624fab13e98ba31ac325fdbeca7bc4949613667870e70cfe65?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/26a67384662be5624fab13e98ba31ac325fdbeca7bc4949613667870e70cfe65?s=96&d=mm&r=g\",\"caption\":\"SoDA - Software Development Association Poland\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The rise of ransomware: steps to increase your cybersecurity - SoDA","description":"Critical cybersecurity threats nowadays are ransomware and supply chain compromises, writes Tomasz Wojciechowski, CISO and Head of Cybersecurity at Spyrosoft, a member of SoDA Poland.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The rise of ransomware: steps to increase your cybersecurity - SoDA","og_description":"Critical cybersecurity threats nowadays are ransomware and supply chain compromises, writes Tomasz Wojciechowski, CISO and Head of Cybersecurity at Spyrosoft, a member of SoDA Poland.","og_url":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/","og_site_name":"SoDA","article_published_time":"2022-12-19T09:39:48+00:00","article_modified_time":"2022-12-19T10:07:58+00:00","og_image":[{"width":1760,"height":990,"url":"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png","type":"image\/png"}],"author":"SoDA - Software Development Association Poland","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SoDA - Software Development Association Poland","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/"},"author":{"name":"SoDA - Software Development Association Poland","@id":"https:\/\/sodapl.com\/en\/#\/schema\/person\/24bd4593e4e505895bb0e9d50e3ecd6c"},"headline":"The rise of ransomware: steps to increase your cybersecurity","datePublished":"2022-12-19T09:39:48+00:00","dateModified":"2022-12-19T10:07:58+00:00","mainEntityOfPage":{"@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/"},"wordCount":675,"publisher":{"@id":"https:\/\/sodapl.com\/en\/#organization"},"image":{"@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png","articleSection":["Engineered in Poland"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/","url":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/","name":"The rise of ransomware: steps to increase your cybersecurity - SoDA","isPartOf":{"@id":"https:\/\/sodapl.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png","datePublished":"2022-12-19T09:39:48+00:00","dateModified":"2022-12-19T10:07:58+00:00","description":"Critical cybersecurity threats nowadays are ransomware and supply chain compromises, writes Tomasz Wojciechowski, CISO and Head of Cybersecurity at Spyrosoft, a member of SoDA Poland.","breadcrumb":{"@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#primaryimage","url":"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png","contentUrl":"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/12\/Covery-www-2.png","width":1760,"height":990},{"@type":"BreadcrumbList","@id":"https:\/\/sodapl.com\/en\/the-rise-of-ransomware-steps-to-increase-your-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/sodapl.com\/en\/"},{"@type":"ListItem","position":2,"name":"The rise of ransomware: steps to increase your cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/sodapl.com\/en\/#website","url":"https:\/\/sodapl.com\/en\/","name":"SoDA","description":"","publisher":{"@id":"https:\/\/sodapl.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sodapl.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sodapl.com\/en\/#organization","name":"SoDA","url":"https:\/\/sodapl.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sodapl.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/09\/SoDA_LOGO_FULL_COLOR-cropped.svg","contentUrl":"https:\/\/sodapl.com\/wp-content\/uploads\/2022\/09\/SoDA_LOGO_FULL_COLOR-cropped.svg","width":230,"height":68,"caption":"SoDA"},"image":{"@id":"https:\/\/sodapl.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/sodapl-software-development-association-poland"]},{"@type":"Person","@id":"https:\/\/sodapl.com\/en\/#\/schema\/person\/24bd4593e4e505895bb0e9d50e3ecd6c","name":"SoDA - Software Development Association Poland","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sodapl.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26a67384662be5624fab13e98ba31ac325fdbeca7bc4949613667870e70cfe65?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26a67384662be5624fab13e98ba31ac325fdbeca7bc4949613667870e70cfe65?s=96&d=mm&r=g","caption":"SoDA - Software Development Association Poland"}}]}},"_links":{"self":[{"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/posts\/6927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/comments?post=6927"}],"version-history":[{"count":2,"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/posts\/6927\/revisions"}],"predecessor-version":[{"id":6934,"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/posts\/6927\/revisions\/6934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/media\/6931"}],"wp:attachment":[{"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/media?parent=6927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/categories?post=6927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sodapl.com\/en\/wp-json\/wp\/v2\/tags?post=6927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}