{"id":49778,"date":"2017-12-27T00:00:00","date_gmt":"2017-12-27T00:00:00","guid":{"rendered":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/"},"modified":"2018-02-07T13:55:12","modified_gmt":"2018-02-07T13:55:12","slug":"cybercrime-2018-the-enterprise-strikes-back","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100","title":{"rendered":"Cybercrime 2018: The Enterprise Strikes Back"},"content":{"rendered":"

2017 was a good year for cybercriminals<\/a>. From the WannaCry<\/a> ransomware<\/a> attack to the Equifax breach<\/a>, it seemed like little could be done to keep our cherished data secure.<\/p>\n

But if anything, last year was a wake-up call for the enterprise, which is now poised to come out swinging with new security practices backed by some of the most advanced technologies known to man.<\/p>\n

There is no question that the status quo is no longer tenable. Companies that cannot protect their customers’ data – let alone their own internal secrets – will not last long in the digital age. Microsoft, for one, estimates that the global cost of cybercrime<\/a> could soon top $500 billion<\/a>, with the average breach running as high as $3.8 million. Additional research from Juniper indicates that global costs could quadruple to $2 trillion by 2019, with the average cost exceeding a stunning $150 million. Clearly, the enterprise has more to gain by upping its investment into security than simply hoping the hammer will not fall on them in the near future. (Learn more about ransomware in The Ability to Combat Ransomware Just Got a Lot Tougher<\/a>.)<\/p>\n

Secure, But Open?<\/span><\/h2>\n

While the goal of tighter security is clear, the path to get there is anything but. With cyberattacks<\/a> growing more sophisticated by the day, how can the enterprise maintain a secure environment without hampering the openness and flexibility that emerging data ecosystems require? According to The Maine Biz’ Laurie Schreiber<\/a>, one of the key strategies going forward is to think beyond the standard “fortress enterprise” approach that stresses firewalls<\/a> and anti-virus<\/a> measures, to a more layered solution in which security inhabits a range of physical, virtual, application and even data-level architectures. Through tools like continuous monitoring and backup<\/a>, coupled with policy-based data and device protection, the enterprise will not be able to prevent all breaches but will have the tools to more effectively contain the damage when they do occur.<\/p>\n

Some developers are also turning to emerging open systems like the blockchain<\/a> distributed digital ledger as a means to bolster data security<\/a>. As Forbes’ Roger Aitken<\/a> points out, start-ups like Gladius and Confideal are working on ways to enable smart contract<\/a> management and secure transaction processing<\/a> by leveraging blockchain’s ability to protect data by copying it to multiple secure servers<\/a> around the world. For example, Gladius has devised a way to share bandwidth<\/a> for applications like content delivery<\/a> and DDoS<\/a> mitigation, which makes them vastly more difficult to attack because the infrastructure hosting these services is no longer confined to one data center<\/a> or even one cloud<\/a>. (Find out more about blockchain in An Introduction to Blockchain Technology<\/a>.)<\/p>\n

The Three A's for Smarter Security<\/span><\/h2>\n

Security can also be significantly improved using the “three A’s”: automation<\/a>, analytics<\/a> and artificial intelligence<\/a> (AI). Enterprise Innovation’s Gigi Onag<\/a> points out that through robust automation the enterprise can introduce “adaptive security” that is capable of responding to the changing nature of cyberattacks. By taking on all of the routine tasks, automation helps free up security specialists’ time to focus on preemptive measures and combat the most challenging intrusions. At the same time, advanced behavioral analytics<\/a> can reduce the time to detection (TTD) from months down to mere hours by creating profiles of what normal data activity looks like and triggering a warning should that activity deviate beyond a set parameter. For some time now, cybercriminals have been using automated software to penetrate secure systems and subtly retrieve critical data – it’s only right for the enterprise to adopt these same techniques for their own defense.<\/p>\n

As for AI, imagine having an army of super-smart, all-seeing security experts on the job 24\/7. Not only can such a system spontaneously circumvent the most leading-edge attacks, but it can continuously monitor a worldwide data store<\/a> containing up-to-date information on existing software threats as they mutate into ever more potent weapons. A recent report in Business Times<\/a> highlights some of the many ways in which public and private entities are laying the foundation for massive AI-based security solutions, including IBM’s X-Force Exchange and various efforts by Singapore’s Computer Emergency Response Team<\/a> (SingCERT) and Info-communications Media Development Authority (IMDA).<\/p>\n

Through these and other measures, we can expect to see cybersecurity<\/a> evolve from a strict react-and-respond function to a more holistic health-and-wellness approach, one that mimics the human body’s ability to defend itself against unwanted intruders.<\/p>\n

It should be noted, however, that emerging technologies are available to all, which means that the bad guys will be able to leverage all of these advancements for their own ends as well. But through the right combination of approaches, it is still highly conceivable that next-generation cybersecurity will not only make it much more difficult to obtain data, but that the value of that data will be greatly diminished by the time it falls into the wrong hands.<\/p>\n","protected":false},"excerpt":{"rendered":"

2017 was a good year for cybercriminals. From the WannaCry ransomware attack to the Equifax breach, it seemed like little could be done to keep our cherished data secure. But if anything, last year was a wake-up call for the enterprise, which is now poised to come out swinging with new security practices backed by […]<\/p>\n","protected":false},"author":7705,"featured_media":49779,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[585,548,557,586,575],"tags":[],"category_partsoff":[],"class_list":["post-49778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-threats","category-cybersecurity","category-data-management","category-emerging-technology","category-internet"],"acf":[],"yoast_head":"\nCybercrime 2018: The Enterprise Strikes Back - Techopedia<\/title>\n<meta name=\"description\" content=\"The enterprise was hit hard with cybercrime in 2017, but in 2018 new tools and techniques will help defend against hackers.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime 2018: The Enterprise Strikes Back\" \/>\n<meta property=\"og:description\" content=\"The enterprise was hit hard with cybercrime in 2017, but in 2018 new tools and techniques will help defend against hackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100\" \/>\n<meta property=\"og:site_name\" content=\"Techopedia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techopedia\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-27T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-07T13:55:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arthur Cole\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@techopedia\" \/>\n<meta name=\"twitter:site\" content=\"@techopedia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arthur Cole\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100\"},\"author\":{\"name\":\"Arthur Cole\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/6669f3b3c85078b5c70233faf283b39a\"},\"headline\":\"Cybercrime 2018: The Enterprise Strikes Back\",\"datePublished\":\"2017-12-27T00:00:00+00:00\",\"dateModified\":\"2018-02-07T13:55:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100\"},\"wordCount\":830,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg\",\"articleSection\":\"\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#respond\"]}],\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100\",\"url\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100\",\"name\":\"Cybercrime 2018: The Enterprise Strikes Back - Techopedia\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg\",\"datePublished\":\"2017-12-27T00:00:00+00:00\",\"dateModified\":\"2018-02-07T13:55:12+00:00\",\"description\":\"The enterprise was hit hard with cybercrime in 2017, but in 2018 new tools and techniques will help defend against hackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#primaryimage\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg\",\"caption\":\"JulyVelchev\/iStockphoto\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techopedia.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Management\",\"item\":\"https:\/\/www.techopedia.com\/topic\/20\/data-management\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybercrime 2018: The Enterprise Strikes Back\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techopedia.com\/#website\",\"url\":\"https:\/\/www.techopedia.com\/\",\"name\":\"Techopedia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techopedia.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techopedia.com\/#organization\",\"name\":\"Techopedia\",\"url\":\"https:\/\/www.techopedia.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg\",\"caption\":\"Techopedia\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techopedia\/\",\"https:\/\/x.com\/techopedia\",\"https:\/\/www.linkedin.com\/company\/techopedia\/\",\"https:\/\/www.youtube.com\/c\/Techopedia\"],\"publishingPrinciples\":\"https:\/\/www.techopedia.com\/about\/editorial-policy\",\"ownershipFundingInfo\":\"https:\/\/www.techopedia.com\/about\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/6669f3b3c85078b5c70233faf283b39a\",\"name\":\"Arthur Cole\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/human-people-person-face-portrait-clothing-coat-overcoat-suit-300x300.jpg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/human-people-person-face-portrait-clothing-coat-overcoat-suit-300x300.jpg\",\"caption\":\"Arthur Cole\"},\"description\":\"Arthur Cole is a freelance technology journalist who has been covering IT and enterprise developments for more than 20 years. He contributes to a wide variety of leading technology web sites, including IT Business Edge, Enterprise Networking Planet, Point B and Beyond and multiple vendor services.\",\"sameAs\":[\"https:\/\/acole602.wordpress.com\/\",\"https:\/\/www.linkedin.com\/in\/arthur-cole-72a86018\"],\"knowsAbout\":[\"Technology Writer\"],\"url\":\"https:\/\/www.techopedia.com\/contributors\/arthur-cole\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybercrime 2018: The Enterprise Strikes Back - Techopedia","description":"The enterprise was hit hard with cybercrime in 2017, but in 2018 new tools and techniques will help defend against hackers.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Cybercrime 2018: The Enterprise Strikes Back","og_description":"The enterprise was hit hard with cybercrime in 2017, but in 2018 new tools and techniques will help defend against hackers.","og_url":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100","og_site_name":"Techopedia","article_publisher":"https:\/\/www.facebook.com\/techopedia\/","article_published_time":"2017-12-27T00:00:00+00:00","article_modified_time":"2018-02-07T13:55:12+00:00","og_image":[{"url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg","width":1,"height":1,"type":"image\/jpeg"}],"author":"Arthur Cole","twitter_card":"summary_large_image","twitter_creator":"@techopedia","twitter_site":"@techopedia","twitter_misc":{"Written by":"Arthur Cole","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#article","isPartOf":{"@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100"},"author":{"name":"Arthur Cole","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/6669f3b3c85078b5c70233faf283b39a"},"headline":"Cybercrime 2018: The Enterprise Strikes Back","datePublished":"2017-12-27T00:00:00+00:00","dateModified":"2018-02-07T13:55:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100"},"wordCount":830,"commentCount":0,"publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"image":{"@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#primaryimage"},"thumbnailUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg","articleSection":"","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#respond"]}],"copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/www.techopedia.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100","url":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100","name":"Cybercrime 2018: The Enterprise Strikes Back - Techopedia","isPartOf":{"@id":"https:\/\/www.techopedia.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#primaryimage"},"image":{"@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#primaryimage"},"thumbnailUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg","datePublished":"2017-12-27T00:00:00+00:00","dateModified":"2018-02-07T13:55:12+00:00","description":"The enterprise was hit hard with cybercrime in 2017, but in 2018 new tools and techniques will help defend against hackers.","breadcrumb":{"@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#primaryimage","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/computer-hardware-electronics-hardware-text-emblem-1.jpg","caption":"JulyVelchev\/iStockphoto"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techopedia.com\/cybercrime-2018-the-enterprise-strikes-back\/2\/33100#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techopedia.com\/"},{"@type":"ListItem","position":2,"name":"Data Management","item":"https:\/\/www.techopedia.com\/topic\/20\/data-management"},{"@type":"ListItem","position":3,"name":"Cybercrime 2018: The Enterprise Strikes Back"}]},{"@type":"WebSite","@id":"https:\/\/www.techopedia.com\/#website","url":"https:\/\/www.techopedia.com\/","name":"Techopedia","description":"","publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techopedia.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techopedia.com\/#organization","name":"Techopedia","url":"https:\/\/www.techopedia.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg","caption":"Techopedia"},"image":{"@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techopedia\/","https:\/\/x.com\/techopedia","https:\/\/www.linkedin.com\/company\/techopedia\/","https:\/\/www.youtube.com\/c\/Techopedia"],"publishingPrinciples":"https:\/\/www.techopedia.com\/about\/editorial-policy","ownershipFundingInfo":"https:\/\/www.techopedia.com\/about"},{"@type":"Person","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/6669f3b3c85078b5c70233faf283b39a","name":"Arthur Cole","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/human-people-person-face-portrait-clothing-coat-overcoat-suit-300x300.jpg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/human-people-person-face-portrait-clothing-coat-overcoat-suit-300x300.jpg","caption":"Arthur Cole"},"description":"Arthur Cole is a freelance technology journalist who has been covering IT and enterprise developments for more than 20 years. He contributes to a wide variety of leading technology web sites, including IT Business Edge, Enterprise Networking Planet, Point B and Beyond and multiple vendor services.","sameAs":["https:\/\/acole602.wordpress.com\/","https:\/\/www.linkedin.com\/in\/arthur-cole-72a86018"],"knowsAbout":["Technology Writer"],"url":"https:\/\/www.techopedia.com\/contributors\/arthur-cole"}]}},"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts\/49778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/users\/7705"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/comments?post=49778"}],"version-history":[{"count":0,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/posts\/49778\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media\/49779"}],"wp:attachment":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media?parent=49778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/categories?post=49778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/tags?post=49778"},{"taxonomy":"category_partsoff","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/category_partsoff?post=49778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}