{"id":356,"date":"2020-12-23T23:09:00","date_gmt":"2020-12-23T23:09:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=356"},"modified":"2024-01-09T22:35:38","modified_gmt":"2024-01-09T22:35:38","slug":"map-your-attack-surface-to-comply-with-data-privacy-regulations","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/","title":{"rendered":"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge"},"content":{"rendered":"\n<p>Global online business practices changed significantly with the introduction of Europe\u2019s General Data Protection Regulation (GDPR) in 2018, considered the first&nbsp;data privacy&nbsp;regulation with any real teeth and the potential for significant fines. The effects aren\u2019t confined to Europe, of course, because they apply to anyone doing business with European natural citizens.<\/p>\n\n\n\n<p>Despite the potential for extremely stiff fines and reputation damage when it comes to data privacy non-compliance or exposures, most enterprises aren\u2019t able to fully comply with GDPR or similar data privacy regulations because they don\u2019t have a good handle on all the places where personally identifiable information (PII) is being collected, transmitted, stored or inadvertently exposed in their extended IT ecosystem.<\/p>\n\n\n\n<p>That makes mapping, monitoring and security-testing your extended IT ecosystem a prerequisite for identifying where GDPR-relevant data (or systems) may be exposed, and to pinpoint security issues related to those assets that could result in breaches of those systems or data. A particular challenge for GDPR is the \u201cunknowns,\u201d which CyCognito calls shadow risk. Research (described below) shows that organizations are ignoring much of that risk. To reduce the risk of violating GDPR and other data privacy regulations, it is critical that your enterprise continuously discover and test all of the assets in your entire\u00a0<a href=\"\/learn\/attack-surface-discovery.php\">attack surface<\/a>\u00a0with methods tuned to identify unknown, unmanaged and abandoned assets, whether they are on-premises, in the cloud or in subsidiary and third-party environments.<\/p>\n\n\n\n<p>To emphasize the criticality of this approach, let\u2019s take a look at what\u2019s happened since GDPR went into effect in May 2018:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The rate of GDPR non-compliance fines assessed and the size of penalties has been&nbsp;<br>steadily increasing with large corporations based in the U.S. as well as Europe among those facing hefty multimillion dollar penalties.&nbsp;<sup>1, 2&nbsp;<\/sup><\/li>\n\n\n\n<li>\u201cInsufficient technical and organizational measures to ensure information security\u201d is the second most common reason for being fined for a GDPR violation, behind \u201cInsufficient legal basis for data processing.\u201d<sup>3<\/sup><\/li>\n\n\n\n<li>Other regions around the globe have enacted or amended similar regulations:<br>For example, the California Consumer Privacy Act (CCPA)<sup>4<\/sup>&nbsp;went into effect in January 2020. Like GDPR, it gives consumers more control over the personal information that businesses collect about them:<br><ul><li><em>The right to know about the personal information a business collects about them and how it is used and shared;<\/em><\/li><li><em>The right to delete personal information collected from them (with some exceptions);<\/em><\/li><li><em>The right to opt-out of the sale of their personal information; and<\/em><\/li><li><em>The right to non-discrimination for exercising their CCPA rights.<\/em><br><\/li><\/ul>And 132 out of 194 countries have legislation to secure the protection of data and privacy according to the United Nations Conference on Trade and Development.<sup>5<\/sup>&nbsp;To name a few:\n<ul class=\"wp-block-list\">\n<li><em>Bundesdatenschutzgesetz (BDSG), the world\u2019s first data protection law, was updated in 2018 to incorporate GDPR.<sup>6<\/sup><\/em><\/li>\n\n\n\n<li><em>Canada\u2019s Personal Information Protection and Electronic Documents Act (PIPEDA) was updated in 2019.<sup>7<\/sup><\/em><\/li>\n\n\n\n<li><em>Essential segments of South Africa\u2019s Protection of Personal Information (POPI) Act went into effect in July of this year with more to follow in 2021.<sup>8<\/sup><\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>Most enterprises have also vastly expanded their IT ecosystem since 2018 with the adoption of cloud and digital transformation initiatives and don\u2019t have visibility to their entire attack surface, which makes it virtually impossible to be in compliance with data privacy regulations.<\/p>\n\n\n\n<p>For example, as we know from our work with leading enterprises, it is not uncommon for assets from acquired subsidiaries to be unknown and\u00a0unmanaged even by the subsidiaries\u00a0themselves, much less the central IT and security teams\u2026 and you can be fined for non-compliance for breaches that occurred even before you acquired the company.\u00a0<\/p>\n\n\n\n<p>Despite the fact that not being aware of all the assets in their attack surfaces can have significant consequences, most enterprises don\u2019t take a broad enough view of their attack surfaces and their related exposures for effective digital risk management. A\u00a0<a href=\"\/resources\/reports\/esg-security-hygiene-and-posture-management\/\">recent survey by CyCognito and the Enterprise Strategy Group (ESG)<\/a>\u00a0of cybersecurity and IT professionals revealed that more than 45% of respondents do not include SaaS applications, public cloud workloads, and partners\/affiliates in their definition of &#8220;attack surface.&#8221; For example, an abandoned marketing landing page in the cloud could collect PII or credentials and store them in an unmanaged database; similarly, other unknown, unmanaged or abandoned assets could provide a pathway into customer information in an internal network via remote servers or external databases.\u00a0\u00a0<\/p>\n\n\n\n<p>What are the implications of all of the above?<\/p>\n\n\n\n<p>Knowing where all the PII you\u2019ve collected is in order to comply with data privacy regulations around the globe, including GDPR, requires that:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>You know where the PII is in order to share it back or delete it promptly should the data owner request it.&nbsp;<\/li>\n\n\n\n<li>You know where it might be exposed so that you can comply with post-breach reporting requirements, which can result in substantial fines if defined breach disclosure procedures are not conducted within specified timeframes.&nbsp;<\/li>\n\n\n\n<li>And it goes without saying, you must protect the PII you\u2019ve captured to avoid the breach in the first place, maintain customer trust and protect your brand.<\/li>\n<\/ol>\n\n\n\n<p><strong>But you can\u2019t protect data you can\u2019t see<\/strong>; nor can you assure customers\/citizens and regulatory bodies that your organization is complying with applicable data security laws if you haven\u2019t examined the hidden recesses of your unmanaged, unknown extended attack surface for all the places that PII is being collected, transmitted, stored or inadvertently exposed.&nbsp;<\/p>\n\n\n\n<p>Obvious locations are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>main websites, corporate and subsidiary&nbsp;<\/li>\n\n\n\n<li>known landing pages and marketing microsites<\/li>\n<\/ul>\n\n\n\n<p>But what about:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>shadow IT assets<\/li>\n\n\n\n<li>unsanctioned cloud deployments&nbsp;<\/li>\n\n\n\n<li>microsites created for you by third-party vendors<\/li>\n\n\n\n<li>abandoned servers<\/li>\n\n\n\n<li>unknown subsidiary assets&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Regulatory compliance is crucial from a business reputation and a bottom-line perspective. At the best practices level, compliance is a beneficial by-product of effective security processes. The\u00a0<a href=\"\/platform\/\">CyCognito platform<\/a>\u00a0offers pioneering capabilities so that you can reduce your digital risk and better comply with data privacy regulations. It identifies hidden assets and attack vectors \u2014 including locating assets where PII could be inadvertently exposed \u2014 across your entire attack surface.<\/p>\n\n\n\n<p><a href=\"\/contact\/\">Talk to us<\/a>\u00a0to learn more about how we can improve the quality of your security and streamline and improve your compliance initiatives.\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/carrefour-handed-37-million-gdpr\/\">1. https:\/\/www.infosecurity-magazine.com\/news\/carrefour-handed-37-million-gdpr\/<\/a><br><a href=\"https:\/\/www.nytimes.com\/2019\/01\/21\/technology\/google-europe-gdpr-fine.html\">2. https:\/\/www.nytimes.com\/2019\/01\/21\/technology\/google-europe-gdpr-fine.html<\/a>&nbsp;<br><a href=\"https:\/\/www.enforcementtracker.com\/?insights\">3. https:\/\/www.enforcementtracker.com\/?insights<\/a><br><a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\">4. https:\/\/oag.ca.gov\/privacy\/ccpa<\/a><br><a href=\"https:\/\/unctad.org\/page\/data-protection-and-privacy-legislation-worldwide\">5. https:\/\/unctad.org\/page\/data-protection-and-privacy-legislation-worldwide<\/a><br><a href=\"https:\/\/en.wikipedia.org\/wiki\/Bundesdatenschutzgesetz\">6. https:\/\/en.wikipedia.org\/wiki\/Bundesdatenschutzgesetz<\/a><br><a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/pipeda_brief\/\">7. https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/pipeda_brief\/<\/a><br><a href=\"https:\/\/www.saica.co.za\/Portals\/0\/Technical\/LegalAndGovernance\/ms_20200622_POPIA_Sections_Commencement.pdf\">8. https:\/\/www.saica.co.za\/Portals\/0\/Technical\/LegalAndGovernance\/ms_20200622_POPIA_Sections_Commencement.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how effective digital risk management solutions can help you to comply with data privacy regulations including GDPR by mapping your attack surface.<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[105,9,113,112],"class_list":["post-356","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-cloud-security","tag-cybersecurity","tag-gdpr","tag-pii"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how effective digital risk management solutions can help you to comply with data privacy regulations including GDPR by mapping your attack surface.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-23T23:09:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-09T22:35:38+00:00\" \/>\n<meta name=\"author\" content=\"CyCognito Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CyCognito Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/\"},\"author\":{\"name\":\"CyCognito Staff\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/e1e418d7d4a6d3abf5de7ef65d04da91\"},\"headline\":\"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge\",\"datePublished\":\"2020-12-23T23:09:00+00:00\",\"dateModified\":\"2024-01-09T22:35:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/\"},\"wordCount\":1105,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Cloud Security\",\"Cybersecurity\",\"GDPR\",\"PII\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/\",\"name\":\"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2020-12-23T23:09:00+00:00\",\"dateModified\":\"2024-01-09T22:35:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/e1e418d7d4a6d3abf5de7ef65d04da91\",\"name\":\"CyCognito Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dc81941cde3349893dfc090c431e4dc0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dc81941cde3349893dfc090c431e4dc0?s=96&d=mm&r=g\",\"caption\":\"CyCognito Staff\"},\"description\":\"Rule Your Risk\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/cycognito\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/","og_locale":"en_US","og_type":"article","og_title":"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge | CyCognito Blog","og_description":"Learn how effective digital risk management solutions can help you to comply with data privacy regulations including GDPR by mapping your attack surface.","og_url":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/","og_site_name":"CyCognito Blog","article_published_time":"2020-12-23T23:09:00+00:00","article_modified_time":"2024-01-09T22:35:38+00:00","author":"CyCognito Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CyCognito Staff","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/"},"author":{"name":"CyCognito Staff","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/e1e418d7d4a6d3abf5de7ef65d04da91"},"headline":"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge","datePublished":"2020-12-23T23:09:00+00:00","dateModified":"2024-01-09T22:35:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/"},"wordCount":1105,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Cloud Security","Cybersecurity","GDPR","PII"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/","url":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/","name":"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2020-12-23T23:09:00+00:00","dateModified":"2024-01-09T22:35:38+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/map-your-attack-surface-to-comply-with-data-privacy-regulations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Despite Tough Regulations, Tracking PII Remains an Ongoing Challenge"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/e1e418d7d4a6d3abf5de7ef65d04da91","name":"CyCognito Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dc81941cde3349893dfc090c431e4dc0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dc81941cde3349893dfc090c431e4dc0?s=96&d=mm&r=g","caption":"CyCognito Staff"},"description":"Rule Your Risk","url":"https:\/\/www.cycognito.com\/blog\/author\/cycognito\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":3,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/356\/revisions"}],"predecessor-version":[{"id":576,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/356\/revisions\/576"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}