{"id":14648,"date":"2023-07-27T12:26:42","date_gmt":"2023-07-27T12:26:42","guid":{"rendered":"https:\/\/www.esds.co.in\/blog\/?p=14648"},"modified":"2023-07-27T12:26:46","modified_gmt":"2023-07-27T12:26:46","slug":"money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/","title":{"rendered":"Money Heist or Data Heist: Both are a Risk to Your Bank&#8217;s Cybersecurity"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/banner-image.jpg\" alt=\"Money Heist or Data Heist\" class=\"wp-image-14649\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/banner-image.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/banner-image-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/banner-image-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/banner-image-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">In the fast-paced world of finance, where cutting-edge technology and digital transactions reign supreme, a new breed of heist has emerged\u2014one that doesn&#8217;t involve masked criminals brandishing guns but rather unseen adversaries lurking in the shadows of <strong><em>cyberspace<\/em><\/strong>. Welcome to the era of data heists, where the stakes are as high as ever, and the threat is relentless. Did you know Around 236.1 million ransomware attacks occurred globally in the first half of 2022? (<strong>Source:\u00a0https:\/\/aag-it.com\/<\/strong>) In the face of such alarming statistics, banks and financial institutions must remain vigilant, understanding that safeguarding their data is no longer just a matter of compliance but a battle against a relentless wave of cyber adversaries.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#1_Understanding_the_Gravity_of_the_Threat\" >1. Understanding the Gravity of the Threat<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#2_Implementing_Strong_Authentication_Measures\" >2. Implementing Strong Authentication Measures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#3_Regular_Employee_Training_and_Awareness\" >3. Regular Employee Training and Awareness<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#4_Encryption_for_Data_Security\" >4. Encryption for Data Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#4_Regular_Security_Audits_and_Vulnerability_Assessments\" >4. Regular Security Audits and Vulnerability Assessments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#5_Network_Monitoring_and_Intrusion_Detection_Systems\" >5. Network Monitoring and Intrusion Detection Systems<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#6_Regular_Backups_and_Disaster_Recovery_Plans\" >6. Regular Backups and Disaster Recovery Plans<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#7_Collaborating_with_Cybersecurity_Experts\" >7. Collaborating with Cybersecurity Experts<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#8_Regular_Updates_and_Patch_Management\" >8. Regular Updates and Patch Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#9_Engaging_in_Ethical_Hacking\" >9. Engaging in Ethical Hacking<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/#Conclusion\" >Conclusion:<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p style=\"text-align: justify;\">In today&#8217;s digital age, where technology dominates every aspect of our lives, banks and financial institutions are faced with a critical challenge: ensuring the security of their data. With the rise of cyber threats and sophisticated hacking techniques, the risk of a data heist has become as alarming as a physical heist. In this article, we will delve into the thrilling world of <strong><em><a href=\"https:\/\/www.esds.co.in\/blog\/how-to-perform-a-cybersecurity-risk-assessment-in-your-organization\/\" title=\"\">cybersecurity<\/a><\/em><\/strong>, exploring the best ways to protect your bank&#8217;s data from the clutches of data heists and ensure the safety of your institution and its valued customers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Understanding_the_Gravity_of_the_Threat\"><\/span><strong>1.<\/strong> <strong>Understanding the Gravity of the Threat<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/understanding-the-gravity-of-threat.jpg\" alt=\"Understanding the gravity of threat\" class=\"wp-image-14650\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/understanding-the-gravity-of-threat.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/understanding-the-gravity-of-threat-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/understanding-the-gravity-of-threat-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/understanding-the-gravity-of-threat-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">Before delving into the protective measures, it is crucial to grasp the gravity of the threat posed by data heists. Like a traditional money heist, a data heist involves unauthorized individuals attempting to breach the bank&#8217;s systems to steal sensitive information. This may include customer data, financial records, transaction details, and intellectual property. The consequences of a successful data heist can be devastating, leading to financial losses and severe damage to the bank&#8217;s reputation and customer trust.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Implementing_Strong_Authentication_Measures\"><\/span><strong>2.<\/strong> <strong>Implementing Strong Authentication Measures<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">One of the primary ways to safeguard a bank&#8217;s data is to implement robust authentication measures. This involves utilizing <strong><em>multi-factor authentication (MFA)<\/em><\/strong> protocols to ensure that access to sensitive information is granted only to authorized personnel. MFA typically combines something the user knows (like a password), something the user has (like a smart card or token), and something the user is (like fingerprint or facial recognition). By integrating these factors, banks can significantly reduce the risk of unauthorized access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Regular_Employee_Training_and_Awareness\"><\/span><strong>3.<\/strong> <strong>Regular Employee Training and Awareness<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">Human error is often a significant contributor to data breaches. Therefore, regular employee training and awareness programs are paramount. Bank staff must be educated about the latest <strong><em>cybersecurity threats<\/em><\/strong> and best practices for <strong><a href=\"https:\/\/www.esds.co.in\/blog\/data-privacy-or-data-security-which-one-is-important-for-you\/\" title=\"\">data protection<\/a><\/strong>. They should also be aware of hackers&#8217; common social engineering tactics to gain unauthorized access. Banks can create a strong defense against potential data heists by empowering employees with knowledge.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Encryption_for_Data_Security\"><\/span><strong>4.<\/strong> <strong>Encryption for Data Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/encryption-for-data-security.jpg\" alt=\"Encryption for data security\" class=\"wp-image-14651\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/encryption-for-data-security.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/encryption-for-data-security-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/encryption-for-data-security-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/encryption-for-data-security-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\"><strong><em><a href=\"https:\/\/www.esds.co.in\/blog\/data-encryption-a-powerful-and-an-approachable-technology\/\" title=\"\">Data encryption<\/a><\/em><\/strong> is an essential technique for protecting sensitive information from unauthorized access. By converting data into code that can only be deciphered with a specific key, even if the data is intercepted, it remains incomprehensible to unauthorized individuals. Implementing robust encryption methods across all data storage and communication channels ensures that the data remains secure even if hackers manage to infiltrate the system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span class=\"ez-toc-section\" id=\"4_Regular_Security_Audits_and_Vulnerability_Assessments\"><\/span><strong>4.<\/strong> <strong>Regular Security Audits and Vulnerability Assessments<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">Proactively identifying and addressing potential weaknesses in a bank&#8217;s security infrastructure is crucial. Regular security audits and vulnerability assessments can uncover any potential entry points that hackers might exploit. By identifying these vulnerabilities, banks can promptly take action to fortify their defenses and prevent data heists before they occur.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span class=\"ez-toc-section\" id=\"5_Network_Monitoring_and_Intrusion_Detection_Systems\"><\/span><strong>5.<\/strong> <strong>Network Monitoring and Intrusion Detection Systems<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/network-monitoring-and-IDS.jpg\" alt=\"Network Monitoring and Intrusion Detection Syatems\" class=\"wp-image-14652\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/network-monitoring-and-IDS.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/network-monitoring-and-IDS-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/network-monitoring-and-IDS-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/network-monitoring-and-IDS-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">Monitoring the bank&#8217;s network in real-time is essential for detecting suspicious activities or potential intrusions. <strong>Intrusion Detection Systems (IDS)<\/strong> and <strong>Intrusion Prevention Systems (IPS<\/strong>) are vital in identifying and blocking unauthorized network access attempts. By continuously monitoring the network, banks can quickly respond to potential threats and prevent data heists in their early stages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Regular_Backups_and_Disaster_Recovery_Plans\"><\/span><strong>6.<\/strong> <strong>Regular Backups and Disaster Recovery Plans<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">Having reliable backups and robust <strong><em><a href=\"https:\/\/www.esds.co.in\/kb\/what-is-a-disaster-recovery-plan\/\" title=\"\">disaster recovery plans<\/a><\/em><\/strong> is crucial in a data breach or cyber attack. Regularly backing up critical data ensures that a clean and secure copy can be restored even if the primary data is compromised. An effective disaster recovery plan outlines the steps to be taken in case of a data heist, minimizing downtime and ensuring business continuity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Collaborating_with_Cybersecurity_Experts\"><\/span><strong>7.<\/strong> <strong>Collaborating with Cybersecurity Experts<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">While banks have in-house IT teams, collaborating with external cybersecurity experts can provide additional protection. <strong><em><a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\" title=\"\">Cybersecurity<\/a><\/em><\/strong> professionals possess specialized knowledge and experience in dealing with the latest threats and can offer valuable insights and advice on securing a bank&#8217;s data effectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"8_Regular_Updates_and_Patch_Management\"><\/span><strong>8.<\/strong> <strong>Regular Updates and Patch Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/regular-update-and-patch-management.jpg\" alt=\"Regular Updates &amp; Patch management\" class=\"wp-image-14653\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/regular-update-and-patch-management.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/regular-update-and-patch-management-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/regular-update-and-patch-management-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/07\/regular-update-and-patch-management-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">Keeping software and systems up to date is crucial to data security. Hackers often exploit known <strong><em>vulnerabilities<\/em><\/strong> in outdated software. Regular updates and patch management ensure that any identified security loopholes are closed, reducing the risk of successful data heists.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"9_Engaging_in_Ethical_Hacking\"><\/span><strong>9.<\/strong> <strong>Engaging in Ethical Hacking<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">Ethical hacking, or penetration testing, involves hiring professionals to simulate a cyber attack on the bank&#8217;s systems. The goal is to identify weaknesses and vulnerabilities in the system before malicious hackers can exploit them. Banks can proactively address potential security gaps and reinforce their <strong><em>cybersecurity<\/em><\/strong> measures by engaging in ethical hacking.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">In conclusion, safeguarding a bank&#8217;s data is paramount in today&#8217;s digital world. The risks posed by data heists are as significant as those of physical money heists. Banks can fortify their defenses and protect their valuable data from potential <strong><em>cyber threats<\/em><\/strong> by implementing strong authentication measures, providing regular employee training, employing encryption techniques, conducting security audits, and collaborating with cybersecurity experts. Regular updates, network monitoring, and ethical hacking further enhance the overall <strong>cybersecurity<\/strong> posture, ensuring that a bank&#8217;s data remains safe and secure, instilling confidence in customers and stakeholders alike. It is only through a comprehensive and proactive approach to cybersecurity that banks can effectively thwart data heists and uphold their reputation as trustworthy financial institutions in the digital era.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the fast-paced world of finance, where cutting-edge technology and digital transactions reign supreme, a new breed of heist has emerged\u2014one that doesn&#8217;t involve masked criminals brandishing guns but rather unseen adversaries lurking in the shadows of cyberspace. Welcome to the era of data heists, where the stakes are as high as ever, and the&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/money-heist-or-data-heist-both-are-a-risk-to-your-banks-cybersecurity\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":77,"featured_media":14654,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3421],"tags":[3435,3433,3114,1832,230,169,149,3437,3361,3432,3434,3436,2816],"class_list":["post-14648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-backups-and-disaster-recovery-plans","tag-banks-security-infrastructure","tag-cyber-threats","tag-cybersecurity","tag-data-protection","tag-data-security","tag-esds","tag-ethical-hacking","tag-intrusion-detection-systems","tag-multi-factor-authentication-mfa","tag-network-monitoring","tag-patch-management","tag-vulnerabilities"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/14648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=14648"}],"version-history":[{"count":3,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/14648\/revisions"}],"predecessor-version":[{"id":14657,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/14648\/revisions\/14657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/14654"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=14648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=14648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=14648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}