{"id":79240,"date":"2024-12-02T06:00:02","date_gmt":"2024-12-02T00:30:02","guid":{"rendered":"https:\/\/exigotech.co\/au\/blog\/auto-draft"},"modified":"2024-12-02T08:56:06","modified_gmt":"2024-12-02T03:26:06","slug":"cybersecurity-common-attacks-prevention","status":"publish","type":"post","link":"https:\/\/exigotech.co\/au\/blog\/cybersecurity-common-attacks-prevention","title":{"rendered":"Cybersecurity Essentials: 6 Common Cyberattacks and How to Prevent Them Effectively"},"content":{"rendered":"<p>Cyberattacks are happening every <a href=\"https:\/\/explodingtopics.com\/blog\/cybersecurity-stats#:~:text=Ransomware%20has%20become%20one%20of,were%20attempted%20throughout%20the%20year.\" rel=\"nofollow noopener\" target=\"_blank\"><strong>39 seconds<\/strong><\/a> worldwide and you could be the next target. With the rise of digital reliance, acting on cybersecurity today is not just wise; it&#8217;s imperative. The increasing reliance on digital platforms has made businesses more vulnerable to cyber threats. Cybercriminals are constantly evolving their tactics, targeting financial data, personal information, and even critical infrastructure.<\/p>\n<p>This blog will walk you through the types of cyberattacks you need to be aware of, the methods used by attackers, and practical strategies to safeguard your digital assets. Whether you are a small or medium business owner or a large enterprise, staying informed is the first step to staying secure.<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What are the most common types of cyberattacks?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"The most common types of cyberattacks include phishing, ransomware, Distributed Denial-of-Service (DDoS) attacks, Business Email Compromise (BEC), malware and spyware, and insider threats.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Why are phishing attacks dangerous?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Phishing scams can lead to financial losses, expose victims to identity theft, and compromise entire systems within organizations. A single click on a phishing email can have severe consequences.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is ransomware and why is it dangerous?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Ransomware is malicious software that encrypts a victim\u2019s data and demands a ransom for its release. It is dangerous because paying the ransom doesn\u2019t guarantee data recovery, and it often results in financial losses and reputational damage.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How can businesses prevent DDoS attacks?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Businesses can prevent DDoS attacks by deploying web application firewalls, using intrusion prevention systems, and leveraging managed DDoS protection services. Network monitoring and traffic analysis also help in mitigating these attacks.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What are insider threats and how can they be prevented?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Insider threats involve employees, contractors, or partners who misuse their access to systems. These threats can be prevented by implementing strict access controls, conducting regular audits, and providing employee cybersecurity training.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is Managed Security as a Service (MSaaS)?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Managed Security as a Service (MSaaS) is a comprehensive solution that integrates advanced security tools and managed detection and response (MDR) capabilities to provide real-time monitoring, threat detection, and incident response.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Why choose Exigo Tech for cybersecurity solutions?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Exigo Tech provides tailored cybersecurity solutions with proactive threat detection, expert oversight, and end-to-end protection. Their Managed Security as a Service (MSaaS) ensures businesses are protected from evolving threats, allowing them to focus on growth.\"\n      }\n    }\n  ]\n}\n<\/script><\/p>\n<h2><strong>The Landscape of Cyber Threats<\/strong><\/h2>\n<p>Cybercrime has reached unprecedented levels, with the global economy losing trillions of dollars annually to malicious activities, with damages predicted to reach <a href=\"https:\/\/www.business-standard.com\/finance\/personal-finance\/cybercrime-costs-to-hit-10-5-trn-by-2025-how-insurance-may-save-your-biz-124072400476_1.html\" rel=\"nofollow noopener\" target=\"_blank\"><strong>$10.5 trillion annually by 2025<\/strong><\/a>. In Australia, cybercrime reports have surged, with more than <a href=\"https:\/\/economictimes.indiatimes.com\/tech\/technology\/australia-says-cybercrime-surging-state-sponsored-groups-targeting-critical-infrastructure\/articleshow\/105226343.cms?from=mdr\" rel=\"nofollow noopener\" target=\"_blank\"><strong>94,000 incidents logged annually<\/strong><\/a>, impacting businesses, individuals, and critical sectors like healthcare and finance.<\/p>\n<p>One of the most devastating forms of attack, ransomware, is predicted to <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031\/\" rel=\"nofollow noopener\" target=\"_blank\"><strong>cost organisations<\/strong><strong> $265 billion (USD) annually by 2031<\/strong><\/a>. From phishing scams impersonating trusted institutions to sophisticated malware networks, the methods used by cybercriminals are becoming harder to detect and prevent.<\/p>\n<p>The time to act is now &#8211; because cybercriminals aren\u2019t slowing down.<\/p>\n<div style=\"padding: 10px; border-radius: 10px; background: #4c48e3; color: #fff; margin-bottom: 20px; display: inline-block;\"><em><b>Read More: <\/b><\/em><a href=\"\/au\/blog\/managed-security-as-a-service-by-exigo-tech\" data-wpel-link=\"internal\"><span style=\"color: #fff;\">Managed Security as a Service (MSaaS): A Comprehensive Cybersecurity Solution<\/span><\/a><\/div>\n<h2><strong>6 Common Types of Cyberattacks<\/strong><\/h2>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-79260 size-medium\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/12\/1200-x-675px-6-Common-Types-of-Cyberattacks-122024-2-800x450.webp\" alt=\"Top 6-Common-Types-of-Cyberattacks\" width=\"800\" height=\"450\" \/><\/p>\n<p>Cybercriminals employ various tactics to exploit vulnerabilities, with these being some of the most frequent and damaging attacks faced by businesses:<\/p>\n<h3><strong>1. Phishing: The Most Common Cyberattack<\/strong><\/h3>\n<p>Phishing remains one of the most damaging tactics used by cybercriminals. These attacks rely on social engineering, where deceptive emails, text messages, or calls impersonate trusted organisations like banks, government institutions, etc. The goal is to trick individuals into revealing sensitive information, such as passwords, credit card details, or personal identifiers.<\/p>\n<div style=\"border: 3px solid #007bff; padding: 20px; background-color: #e9f5ff; border-radius: 10px; font-family: Arial, sans-serif; margin: 20px 0; color: #004085; padding-bottom: 0;\">\n<ul style=\"list-style-type: '\u2794 '; padding-left: 20px; font-size: 16px; line-height: 1.6;\">\n<li><strong>Why Phishing Attacks are Dangerous:<\/strong><br \/>\nPhishing scams not only lead to financial losses but can also expose victims to identity theft or deeper network breaches in organisations. A single click can compromise entire systems.<\/li>\n<\/ul>\n<\/div>\n<h3><strong>2. Ransomware: Holding Data Hostage<\/strong><\/h3>\n<p>Ransomware is one of the most disruptive forms of cyberattack, where malicious software encrypts a victim\u2019s data and demands a ransom for its release. These attacks cause significant financial and operational damage to businesses. Industries like healthcare, finance, and education are frequently hit, as their reliance on sensitive data makes them prime targets.<\/p>\n<div style=\"border: 3px solid #007bff; padding: 20px; background-color: #e9f5ff; border-radius: 10px; font-family: Arial, sans-serif; margin: 20px 0; color: #004085; padding-bottom: 0;\">\n<ul style=\"list-style-type: '\u2794 '; padding-left: 20px; font-size: 16px; line-height: 1.6;\">\n<li><strong>Why It\u2019s Dangerous:<\/strong><br \/>\nPaying the ransom doesn\u2019t guarantee recovery. In many cases, criminals either refuse to restore access or strike again. The loss of data, combined with reputational damage, can badly affect.<\/li>\n<\/ul>\n<\/div>\n<h3><strong>3. Distributed Denial-of-Service (DDoS) Attacks: Overwhelming Systems<\/strong><\/h3>\n<p>Distributed Denial-of-Service (DDoS) attacks overwhelm a network, server, or website with excessive traffic, rendering it inaccessible to legitimate users. These attacks disrupt operations, leading to significant financial losses and reputational harm. Industries such as online retail, gaming platforms, and financial institutions are prime targets, especially during peak business periods.<\/p>\n<div style=\"border: 3px solid #007bff; padding: 20px; background-color: #e9f5ff; border-radius: 10px; font-family: Arial, sans-serif; margin: 20px 0; color: #004085; padding-bottom: 0;\">\n<ul style=\"list-style-type: '\u2794 '; padding-left: 20px; font-size: 16px; line-height: 1.6;\">\n<li><strong>Why It\u2019s Dangerous:<\/strong><br \/>\nDDoS attacks can halt business operations for hours or even days, affecting customer trust and revenue. Additionally, they are sometimes used as a smokescreen to conceal more severe breaches.<\/li>\n<\/ul>\n<\/div>\n<h3><strong>4. Business Email Compromise (BEC): A Costly Deception<\/strong><\/h3>\n<p>Business Email Compromise (BEC) scams are a sophisticated form of cyberattack where fraudsters impersonate executives, vendors, or trusted partners. Their goal? To trick businesses into transferring funds or sharing sensitive information. These scams often rely on social engineering, exploiting trust and urgency to bypass traditional security measures.<\/p>\n<div style=\"border: 3px solid #007bff; padding: 20px; background-color: #e9f5ff; border-radius: 10px; font-family: Arial, sans-serif; margin: 20px 0; color: #004085; padding-bottom: 0;\">\n<ul style=\"list-style-type: '\u2794 '; padding-left: 20px; font-size: 16px; line-height: 1.6;\">\n<li><strong>Why It\u2019s Dangerous:<\/strong><br \/>\nBEC attacks are highly targeted, making them harder to detect. They can result in substantial financial losses, data breaches, and even regulatory penalties for mishandling sensitive information.<\/li>\n<\/ul>\n<\/div>\n<h3><strong>5. Malware and Spyware: Silent Threats to Your Security<\/strong><\/h3>\n<p>Malware attacks systems through infected downloads, compromised websites, or deceptive email attachments. Once inside, it can steal sensitive data, corrupt files, or disrupt operations. Spyware, a specific type of malware collects personal or financial information without the victim\u2019s knowledge.<\/p>\n<div style=\"border: 3px solid #007bff; padding: 20px; background-color: #e9f5ff; border-radius: 10px; font-family: Arial, sans-serif; margin: 20px 0; color: #004085; padding-bottom: 0;\">\n<ul style=\"list-style-type: '\u2794 '; padding-left: 20px; font-size: 16px; line-height: 1.6;\">\n<li><strong>Why It\u2019s Dangerous:<\/strong><br \/>\nMalware and spyware can lead to identity theft, financial fraud, and even long-term reputational damage for businesses. The covert nature of spyware makes it particularly difficult to detect, often allowing it to collect information over extended periods.<\/li>\n<\/ul>\n<\/div>\n<h3><strong>6. Insider Threats: The Danger Within<\/strong><\/h3>\n<p>Insider threats pose a unique cybersecurity challenge, arising from employees, contractors, or business partners who have legitimate access to systems. These threats can be intentional, such as data theft or sabotage, or accidental, caused by negligence or lack of awareness. Insider threats are often overlooked but account for a significant portion of data breaches.<\/p>\n<div style=\"border: 3px solid #007bff; padding: 20px; background-color: #e9f5ff; border-radius: 10px; font-family: Arial, sans-serif; margin: 20px 0; color: #004085; padding-bottom: 0;\">\n<ul style=\"list-style-type: '\u2794 '; padding-left: 20px; font-size: 16px; line-height: 1.6;\">\n<li><strong>Why It\u2019s Dangerous:<\/strong><br \/>\nInsiders already have access to sensitive information, making their actions harder to detect. Weak internal policies and insufficient monitoring can amplify the risks, resulting in data leaks, financial losses, and compliance issues.<\/li>\n<\/ul>\n<\/div>\n<div class=\"blogbox-area\">\n<div class=\"blogbox-img\" style=\"margin-right: 25px;\"><img decoding=\"async\" class=\"alignnone wp-image-73333\" title=\"managed security as a service blog - CTA - Exigo tech\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/08\/avd-blog-cta-1.webp\" alt=\"managed security as a service blog end CTA\" width=\"300\" height=\"145\" \/><\/div>\n<div class=\"blogbox-content\">\n<h3>Be Secure, Be Aware, Be Agile<\/h3>\n<p>Protect your business from cyberattacks with our Managed Security as a Service offering.<\/p>\n<p><a class=\"cta-white\" href=\"https:\/\/exigotech.co\/au\/managed-security-as-a-service-msaas\">Learn More Here<\/a><\/p>\n<\/div>\n<\/div>\n<h2><strong>Methods Used by Cybercriminals to Attack<\/strong><\/h2>\n<p>Cybercriminals use a variety of sophisticated techniques to breach systems, steal data, and disrupt operations. Understanding their tactics is the first step in defending against them. Here are the most common methods employed by attackers:<\/p>\n<ul>\n<li>\n<h4><strong><em> Social Engineering: Exploiting Human Vulnerabilities<\/em><\/strong><\/h4>\n<\/li>\n<\/ul>\n<p>Social engineering involves manipulating individuals into revealing sensitive information or granting access to systems. Cybercriminals often use deception, urgency, or trust to trick their targets.<\/p>\n<ul>\n<li>\n<h4><strong><em> Exploiting Software Vulnerabilities: The Backdoor Entry<\/em><\/strong><\/h4>\n<\/li>\n<\/ul>\n<p>Outdated or unpatched software is a common target for cybercriminals. By exploiting known vulnerabilities, attackers can infiltrate systems without requiring user interaction.<\/p>\n<ul>\n<li>\n<h4><strong><em> Credential Stuffing: The Power of Stolen Passwords<\/em><\/strong><\/h4>\n<\/li>\n<\/ul>\n<p>Credential stuffing involves using previously stolen usernames and passwords to gain unauthorised access to accounts. This method is especially effective when people use the same passwords across multiple platforms.<\/p>\n<ul>\n<li>\n<h4><strong><em> Advanced Persistent Threats (APTs): The Silent Intruders<\/em><\/strong><\/h4>\n<\/li>\n<\/ul>\n<p>APTs are long-term, targeted attacks aimed at high-value organisations or critical infrastructure. These attacks often involve a combination of methods, including malware, phishing, and exploiting vulnerabilities.<\/p>\n<div style=\"padding: 10px; border-radius: 10px; background: #4c48e3; color: #fff; margin-bottom: 20px; display: inline-block;\"><em><b>Read More: <\/b><\/em><a href=\"\/au\/blog\/stay-ahead-cybersecurity-exigo-tech-esentire\" data-wpel-link=\"internal\"><span style=\"color: #fff;\">Warning: Your Business\u2019s Cybersecurity Strategy is Already Playing Catch-Up \u2013 Here\u2019s Why<br \/>\n<\/span><\/a><\/div>\n<h2><strong>Top 6 Strategies to Prevent Cyberattacks<\/strong><\/h2>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-79264 size-medium\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/12\/1200-x-675px-Top-6-Strategies-to-Prevent-Cyberattacks-122024-3-800x450.webp\" alt=\"Top 6 Strategies to Prevent Cyberattacks\" width=\"800\" height=\"450\" \/><\/p>\n<p>Protecting against cyberattacks requires a proactive approach, tailored to the unique needs of businesses. Here&#8217;s how businesses can create a robust defence.<\/p>\n<h3><strong>Invest in Comprehensive Cybersecurity Training<\/strong><\/h3>\n<p>Educating employees is the first line of defence. Regularly conduct training programs to help staff recognise phishing attempts, social engineering tactics, and other threats. This ensures they can act as vigilant gatekeepers for your organisation\u2019s digital assets.<\/p>\n<p><strong><em>Tip<\/em><\/strong><em>: Simulate phishing campaigns to test and enhance employee awareness.<\/em><\/p>\n<h3><strong>Implement Strong Access Controls and Authentication<\/strong><\/h3>\n<p>Limit access to sensitive systems and data based on roles and responsibilities. Use multi-factor authentication (MFA) to ensure only authorised users can access critical systems.<\/p>\n<p><strong><em>Tip:<\/em><\/strong><em> Periodically review and update access privileges to reflect personnel changes.<\/em><\/p>\n<h3><strong>Maintain Regular Software Updates and Patch Management<\/strong><\/h3>\n<p>Cybercriminals often exploit outdated software to gain access to systems. Ensure that all operating systems, applications, and devices are updated with the latest security patches.<\/p>\n<p><strong><em>Tip:<\/em><\/strong><em> Automate updates wherever possible to minimise human oversight.<\/em><\/p>\n<h3><strong>Deploy Advanced Threat Detection and Monitoring Systems<\/strong><\/h3>\n<p>Use intrusion detection systems (IDS), firewalls, and endpoint protection tools to monitor and respond to threats in real time. Consider employing artificial intelligence-based solutions for proactive threat hunting.<\/p>\n<p><strong><em>Tip:<\/em><\/strong><em> Partner with a managed security service provider to enhance your threat detection capabilities.<\/em><\/p>\n<h3><strong>Develop a Robust Incident Response Plan<\/strong><\/h3>\n<p>Be prepared for the worst-case scenario with a detailed incident response plan. Define the steps to identify, contain, and recover from cyberattacks. Regularly test and update the plan to ensure its effectiveness.<\/p>\n<p><strong><em>Tip:<\/em><\/strong><em> Include communication protocols to inform stakeholders and regulators promptly in case of a breach.<\/em><\/p>\n<h3><strong>Secure Your Network with Segmentation and Encryption<\/strong><\/h3>\n<p>Segment your network to limit the spread of potential breaches and encrypt sensitive data both in transit and at rest. This ensures that even if attackers gain access, the damage is minimised.<\/p>\n<p><strong><em>Tip:<\/em><\/strong><em> Use Virtual Private Networks (VPNs) for remote access and web-based communications.<\/em><\/p>\n<div style=\"padding: 10px; border-radius: 10px; background: #4c48e3; color: #fff; margin-bottom: 20px; display: inline-block;\"><em><b>Read More: <\/b><\/em><a href=\"\/au\/blog\/managed-security-as-a-service-cybersecurity\" data-wpel-link=\"internal\"><span style=\"color: #fff;\">Strengthen Your Cybersecurity with Managed Security as a Service Offering: Powered by Microsoft and eSentire, Delivered by Exigo Tech<\/span><\/a><\/div>\n<h2><strong>Managed Security as a Service: A Powerful Solution by Exigo Tech<\/strong><\/h2>\n<p>Exigo Tech offers Managed Security as a Service (MSaaS) offering, powered by leading technologies from Microsoft and eSentire. It provides businesses with 24\/7 protection and peace of mind. This service is designed to ensure your organisation stays ahead of threats while allowing you to focus on what matters most\u2014your business growth.<\/p>\n<h3><strong>How Exigo Tech\u2019s MSaaS Works<\/strong><\/h3>\n<p>At the core of Exigo Tech\u2019s MSaaS is a seamless integration of Microsoft\u2019s advanced security tools and eSentire\u2019s Managed Detection and Response (MDR) capabilities. Together, they deliver real-time monitoring, threat detection, and rapid response to secure your organisation from every angle. Whether it\u2019s safeguarding endpoints, networks, or cloud environments, Exigo Tech\u2019s solution is tailored to meet your business needs.<\/p>\n<h3><strong>Why Choose Exigo Tech for Your Cybersecurity Needs?<\/strong><\/h3>\n<p>Exigo Tech\u2019s Managed Security as a Service stands out for its advanced capabilities and holistic approach to cybersecurity:<\/p>\n<ul>\n<li><strong>Proactive Threat Detection:<\/strong> Leverages Microsoft\u2019s AI-driven tools and eSentire\u2019s 24\/7 monitoring to identify and respond to threats in real-time.<\/li>\n<li><strong>Tailored Protection:<\/strong> Customised solutions designed to secure your organisation\u2019s unique infrastructure, including hybrid and cloud environments.<\/li>\n<li><strong>Expert Oversight:<\/strong> Cybersecurity professionals provide continuous monitoring, analysis, and incident resolution.<\/li>\n<li><strong>End-to-End Coverage:<\/strong> Secures your endpoints, networks, and cloud systems seamlessly.<\/li>\n<li><strong>Incident Response Plans:<\/strong> Robust strategies to handle potential breaches swiftly and minimise operational downtime.<\/li>\n<\/ul>\n<p>With Exigo Tech\u2019s MSaaS, you can focus on innovation and growth while leaving cybersecurity to our trusted professionals. This level of comprehensive protection is no longer optional in today\u2019s digital world &#8211; it\u2019s essential.<\/p>\n<p>Contact us at <a href=\"mailto:contact@exigotech.com.au\"><strong>contact@exigotech.com.au<\/strong><\/a> or call us at <a href=\"tel:1300%20394%20468\"><strong>1300 EXIGOTECH (394 468)<\/strong><\/a> to build a secure, resilient future for your digital operations.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"blogbox-area\">\n<div class=\"blogbox-img\" style=\"margin-right: 25px;\"><img decoding=\"async\" class=\"alignnone wp-image-73337\" title=\"Strengthen Your Cyber Defence - CTA - Exigo tech\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/08\/avd-blog-cta-2.webp\" alt=\"managed security as a service blog end CTA\" width=\"300\" height=\"200\" \/><\/div>\n<div class=\"blogbox-content\">\n<h3>Don\u2019t Wait for A Breach to Happen<\/h3>\n<p>Start implementing effective cybersecurity strategies today and protect your business.<\/p>\n<p><a class=\"cta-white\" href=\"\/au\/contact\">Book a Free Consultation<\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks are happening every 39 seconds worldwide and you could be the next target. With the rise of digital reliance,&#8230;<\/p>\n","protected":false},"author":7,"featured_media":79252,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[58,15,16],"tags":[55],"class_list":["post-79240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-phishing","category-security","tag-cybersecurity"],"acf":[],"_links":{"self":[{"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/posts\/79240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/comments?post=79240"}],"version-history":[{"count":12,"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/posts\/79240\/revisions"}],"predecessor-version":[{"id":79268,"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/posts\/79240\/revisions\/79268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/media\/79252"}],"wp:attachment":[{"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/media?parent=79240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/categories?post=79240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exigotech.co\/au\/wp-json\/wp\/v2\/tags?post=79240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}