{"id":91741,"date":"2025-10-24T06:00:16","date_gmt":"2025-10-24T00:30:16","guid":{"rendered":"https:\/\/exigotech.co\/au\/blog\/auto-draft"},"modified":"2025-10-17T10:37:37","modified_gmt":"2025-10-17T05:07:37","slug":"nfps-ransomware-managed-it-services","status":"publish","type":"post","link":"https:\/\/exigotech.co\/sg\/blog\/nfps-ransomware-managed-it-services","title":{"rendered":"Australian NFPs Face a 59% Rise in Ransomware Threats &#8211; How Managed IT Services Protect Mission Impact"},"content":{"rendered":"<p><span data-contrast=\"auto\">Australia\u2019s not-for-profit (NFP) sector stands at a digital crossroads.<\/span><\/p>\n<p><span data-contrast=\"auto\">Recent data shows a <\/span><a href=\"https:\/\/www.cyberdaily.au\/security\/12686-australian-nfp-sector-faces-59-increase-in-ransomware-activity\" rel=\"nofollow noopener\" target=\"_blank\"><b><span data-contrast=\"none\">59% rise in ransomware activity<\/span><\/b><\/a><span data-contrast=\"auto\"> targeting NFPs nationwide. What once felt like a remote cyber risk has become a daily concern for community service providers, charities, and healthcare organisations alike.<\/span><\/p>\n<p><span data-contrast=\"auto\">For an NFP, a cyberattack is not only an IT failure, it\u2019s a disruption to its mission. When systems go down, donations stop, case files freeze, and essential services are delayed. For people who depend on NFP programs, that downtime can mean missed meals, delayed care, or interrupted support.<\/span><\/p>\n<p><span data-contrast=\"auto\">This blog explores why ransomware is growing in the NFP sector, what it costs in real terms, and how Exigo Tech\u2019s Managed IT Services can help NFPs protect their data, maintain continuity, and build resilience.<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Why are Australian NFPs increasingly targeted by ransomware?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"NFPs often have limited cybersecurity resources, outdated systems, and valuable data, making them attractive targets for cybercriminals.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What are the consequences of a ransomware attack on an NFP?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Ransomware can cause operational downtime, financial strain, reputational damage, legal risks, and staff burnout.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How can managed IT services help NFPs prevent ransomware?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Managed IT services offer continuous threat monitoring, zero-trust security, automated patching, backup resilience, and incident readiness.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is included in Exigo Tech\u2019s Managed Service Health Check?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"The health check assesses backup readiness, identity protection, endpoint compliance, email security, and policy alignment with privacy laws.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Can managed services improve NFP outcomes?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Yes, case studies show improved productivity, data security, and service delivery, enabling NFPs to focus on mission impact.\"\n      }\n    }\n  ]\n}\n<\/script><\/span><\/p>\n<div class=\"latest-blog\"><div class=\"latestblognpost\"><em><b>Read More: <\/b><\/em><a href=\"https:\/\/exigotech.co\/sg\/blog\/managed-it-services-for-manufacturing\">Managed IT Services for Manufacturing: Building Resilient, Efficient, and Scalable Operations<\/a><\/div><\/div>\n<h2><b><span data-contrast=\"auto\">The New Reality: Why NFPs Are Becoming Prime Targets<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Cybercriminals follow the same logic as most opportunists: they attack where defences are weakest. Unfortunately, many NFPs fit that profile.<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Valuable Data, Limited Protection<\/span><\/b><span data-contrast=\"auto\">: NFPs hold sensitive donor, patient, and volunteer data but often have outdated systems, making them easy targets.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Small Teams, Big Responsibilities<\/span><\/b><span data-contrast=\"auto\">: IT staff are few and stretched thin, limiting monitoring and threat response.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Rapid Digital Expansion<\/span><\/b><span data-contrast=\"auto\">: Cloud tools and remote work increase efficiency but also create more attack surfaces.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Human Error<\/span><\/b><span data-contrast=\"auto\">: Phishing is the main entry point; one wrong click can compromise entire systems.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Limited Security Awareness<\/span><\/b><span data-contrast=\"auto\">: Staff and volunteers often lack cybersecurity training, increasing the risk of mistakes.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Budget Constraints<\/span><\/b><span data-contrast=\"auto\">: Tight funding restricts investment in advanced security tools and professional support.<\/span><\/li>\n<\/ul>\n<h3><b><span data-contrast=\"auto\">What a Ransomware Attack Really Costs an NFP Organisation<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">The true cost of ransomware goes far beyond ransom payment. For NFPs, the consequences ripple across financial, operational, and reputational layers.<\/span><\/p>\n<ul>\n<li><b><span data-contrast=\"auto\">Operational Downtime<\/span><\/b><span data-contrast=\"auto\">: Locked systems halt services, affecting community impact.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Financial Drain<\/span><\/b><span data-contrast=\"auto\">: Recovery costs often exceed annual IT budgets, even without paying ransom.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Reputational Damage<\/span><\/b><span data-contrast=\"auto\">: Breaches break donor and sponsor trust.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Compliance &amp; Legal Risk<\/span><\/b><span data-contrast=\"auto\">: Notifiable Data Breach rules require reporting as non-compliance risks penalties and funding.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Staff Burnout &amp; Volunteer Impact<\/span><\/b><span data-contrast=\"auto\">: Crisis response strains staff and may reduce volunteer confidence.<\/span><\/li>\n<\/ul>\n<div class=\"latest-blog\"><div class=\"latestblognpost\"><em><b>Read More: <\/b><\/em><a href=\"https:\/\/exigotech.co\/sg\/blog\/managed-cloud-services-security-control-value\">Why Managed Cloud Services Are Important for Control, Security, and Long-Term Value<\/a><\/div><\/div>\n<h3><b><span data-contrast=\"auto\">Managed IT Services: The Strategic Shield for NFPs<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">For most NFPs, building an internal cybersecurity team is unrealistic. Managed Service Providers (MSPs) fill that gap by offering enterprise-level protection, monitoring, and expertise at a predictable cost.<\/span><\/p>\n<p><span data-contrast=\"auto\">Exigo Tech\u2019s Managed IT Services for NFPs focus on three pillars: resilience, security, and simplicity.<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">#1. Continuous Threat Monitoring and Response<\/span><\/b><\/h4>\n<p><span data-contrast=\"auto\">Ransomware rarely strikes without warning. Early signs like abnormal file access, login attempts, or data transfers often appear hours or days before encryption.<\/span><\/p>\n<p><span data-contrast=\"auto\">Our services monitor these indicators 24\/7. Alerts trigger immediate analysis, allowing us to isolate and remediate threats before they spread.<\/span><\/p>\n<h4><b><span data-contrast=\"auto\"># 2. Zero Trust Security Model<\/span><\/b><\/h4>\n<p><span data-contrast=\"auto\">Traditional \u201cperimeter security\u201d assumes everything inside the network is safe. Zero trust flips that idea: no one is trusted by default.<\/span><\/p>\n<p><span data-contrast=\"auto\">We implement identity protection, multi-factor authentication (MFA), device compliance checks, and conditional access to ensure that only verified users reach sensitive systems.<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">#3. Automated Patching and Backup Resilience<\/span><\/b><\/h4>\n<p><span data-contrast=\"auto\">Unpatched systems are one of the top entry points for ransomware. Our managed patching service keeps servers and endpoints up to date automatically.<\/span><\/p>\n<p><span data-contrast=\"auto\">We also run scheduled backups with offsite replication and regular restore tests, ensuring your organisation can recover data quickly and confidently.<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">#4. Rapid Recovery and Incident Readiness<\/span><\/b><\/h4>\n<p><span data-contrast=\"auto\">We simulate ransomware recovery drills so that if the worst happens, your organisation knows the exact steps to restore services as quickly as possible.<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">#5. Security Awareness and Policy Enforcement<\/span><\/b><\/h4>\n<p><span data-contrast=\"auto\">Technology alone cannot prevent all breaches. Staff and volunteers need simple, repeatable habits like reporting suspicious emails, using strong passwords, and recognising data-sharing risks.<\/span><\/p>\n<p><span data-contrast=\"auto\">We provide ongoing awareness sessions and ready-to-use digital policy templates designed for non-technical teams.<\/span><\/p>\n<p><a href=\"\/sg\/services\/managed-it-services\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-91748\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2025\/10\/cta-nfps-ransomware-blog-102025-01.webp\" alt=\"CTA - Explore Exigo Tech\u2019s Managed IT Services for NFPs\" width=\"891\" height=\"211\" srcset=\"https:\/\/exigotech.co\/wp-content\/uploads\/2025\/10\/cta-nfps-ransomware-blog-102025-01.webp 891w, https:\/\/exigotech.co\/wp-content\/uploads\/2025\/10\/cta-nfps-ransomware-blog-102025-01-480x114.webp 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 891px, 100vw\" \/><\/a><\/p>\n<h3><b><span data-contrast=\"auto\">Our Success Stories: How Managed Services Improve Outcomes for NFPs<\/span><\/b><\/h3>\n<h4><b><i><span data-contrast=\"auto\">Samaritans of Singapore (SOS)<\/span><\/i><\/b><\/h4>\n<p><span data-contrast=\"auto\">By moving to a secure omnichannel service platform, SOS reduced manual data handling and improved case response times. The upgrade contributed to an 8% reduction in suicide cases as part of a broader wellbeing initiative.<\/span><\/p>\n<div style=\"margin-top:20px; margin-bottom:20px; text-align: center;\" class=\"custblgbtn\">\r\n                <a href=\"\/sg\/case-study\/sos\" class=\"blogbutton\" target=\"_blank\">Read More<\/a>\r\n            <\/div>\n<h4><b><i><span data-contrast=\"auto\">SEWA Rural<\/span><\/i><\/b><\/h4>\n<p><span data-contrast=\"auto\">After a managed infrastructure uplift, the organisation achieved a 30% boost in productivity and smoother coordination between clinical and admin teams.<\/span><\/p>\n<div style=\"margin-top:20px; margin-bottom:20px; text-align: center;\" class=\"custblgbtn\">\r\n                <a href=\"\/sg\/case-study\/sewa-rural\" class=\"blogbutton\" target=\"_blank\">Read More<\/a>\r\n            <\/div>\n<h4><b><i><span data-contrast=\"auto\">Palmera<\/span><\/i><\/b><\/h4>\n<p><span data-contrast=\"auto\">With workflow automation and secure data management on Microsoft Power Platform, Palmera reached a 99% food security outcome in vulnerable communities.<\/span><\/p>\n<div style=\"margin-top:20px; margin-bottom:20px; text-align: center;\" class=\"custblgbtn\">\r\n                <a href=\"\/sg\/case-study\/palmera\" class=\"blogbutton\" target=\"_blank\">Read More<\/a>\r\n            <\/div>\n<p><span data-contrast=\"auto\">These outcomes show that cybersecurity and service delivery are connected. When systems run smoothly and data stays safe, NFP teams can focus on impact, not recovery.<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">The Common Gaps We Find in NFP IT Environments<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Through our NFP health checks, our team repeatedly identifies five recurring issues:<\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"auto\">Outdated Backups<\/span><\/b><span data-contrast=\"auto\">: Data recovery points are weeks old or stored on the same network as live systems.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Unmanaged Endpoints<\/span><\/b><span data-contrast=\"auto\">: Laptops and mobile devices lack encryption or endpoint protection.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Weak Identity Management<\/span><\/b><span data-contrast=\"auto\">: Shared logins and poor MFA adoption increase exposure.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Email Security Gaps<\/span><\/b><span data-contrast=\"auto\">: Legacy filters miss modern phishing and impersonation attempts.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Limited Incident Response Planning<\/span><\/b><span data-contrast=\"auto\">: No clear workflow for detection, communication, and escalation.<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Each of these gaps can be fixed quickly with the right managed service partnership.<\/span><\/p>\n<div class=\"latest-blog\"><div class=\"latestblognpost\"><em><b>Read More: <\/b><\/em><a href=\"https:\/\/exigotech.co\/sg\/blog\/it-health-check-hidden-risks-2026\">Is Your IT Environment Hiding Risks? Why an IT Health Check Should Be Your First Priority in 2026<\/a><\/div><\/div>\n<h3><b><span data-contrast=\"auto\">Building Cyber Resilience: Exigo Tech\u2019s Practical Framework for NFPs<\/span><\/b><\/h3>\n<ol>\n<li><b><span data-contrast=\"auto\">Stabilise:<\/span><\/b><span data-contrast=\"auto\"> We secure the essentials firs, like identity, email, and endpoint protection. We close high-risk vulnerabilities and verify backup integrity.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Connect<\/span><\/b><span data-contrast=\"auto\">: We unify CRM, donation platforms, and finance systems to ensure clean data and streamlined workflows. This reduces duplicate records and security inconsistencies.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Scale Securely: <\/span><\/b><span data-contrast=\"auto\">Once the foundation is strong, we introduce automation, dashboards, and advanced governance controls. Policies evolve as your programs expand.<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">This step-by-step approach avoids disruption and delivers measurable improvement within the first few months.<\/span><\/p>\n<p><span data-contrast=\"auto\">Of course, this is just the standard model. We understand that every NFP organisation might have unique requirements. Rest assured, we customise this approach based on your needs.<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">The Managed Service Health Check: Your First Step to Safer IT<\/span><\/b><\/h4>\n<p><span data-contrast=\"auto\">Our IT health check reviews your environment across key areas:<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Backup and disaster recovery readiness<\/span><\/li>\n<li><span data-contrast=\"auto\">MFA and identity protection<\/span><\/li>\n<li><span data-contrast=\"auto\">Endpoint and patch compliance<\/span><\/li>\n<li><span data-contrast=\"auto\">Email and collaboration security<\/span><\/li>\n<li><span data-contrast=\"auto\">Policy alignment with privacy obligations<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">    <div class=\"award-section\">\n                    <h2 class=\"award-section-title\">Why Choose Us? Recognitions That Reflect Trust<\/h2>\n                <div class=\"award-card-wrapper\">\n            <br \/>\n    <div class=\"award-card\">\n                    <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-microsoft-nonprofit-finalist\" target=\"_blank\" rel=\"noopener\">\n                <img decoding=\"async\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/08\/microsoft-partner-of-the-year-blog-image-1-1-800x450.jpeg\" alt=\"Award Image\">\n            <\/a>\n                <div class=\"award-content\">\n            <h3>\n                Finalist            <\/h3>\n            <p>\n                <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-microsoft-nonprofit-finalist\" target=\"_blank\" rel=\"noopener\">\n                    Microsoft Partner of the Year 2024 (Nonprofit Industry)                <\/a>\n            <\/p>\n        <\/div>\n    <\/div>\n    <br \/>\n    <div class=\"award-card\">\n                    <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-wsabe-awards-2025-finalist\" target=\"_blank\" rel=\"noopener\">\n                <img decoding=\"async\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2025\/08\/1200-x-675px-wsabe-2025-award-082025-800x450.webp\" alt=\"Award Image\">\n            <\/a>\n                <div class=\"award-content\">\n            <h3>\n                Finalist            <\/h3>\n            <p>\n                <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-wsabe-awards-2025-finalist\" target=\"_blank\" rel=\"noopener\">\n                    WSABE 2025 (two categories)                <\/a>\n            <\/p>\n        <\/div>\n    <\/div>\n    <br \/>\n    <div class=\"award-card\">\n                    <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-arn-2024-security-award\" target=\"_blank\" rel=\"noopener\">\n                <img decoding=\"async\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2024\/11\/1200-x-675px-ARN-Blog-copy-800x450.webp\" alt=\"Award Image\">\n            <\/a>\n                <div class=\"award-content\">\n            <h3>\n                Winner            <\/h3>\n            <p>\n                <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-arn-2024-security-award\" target=\"_blank\" rel=\"noopener\">\n                    ARN Innovation Awards 2024 (Security Partner)                <\/a>\n            <\/p>\n        <\/div>\n    <\/div>\n    <br \/>\n    <div class=\"award-card\">\n                    <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-australian-cyber-awards-2025\" target=\"_blank\" rel=\"noopener\">\n                <img decoding=\"async\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2025\/03\/1200-x-675px-cyber-awards-2025-022025-800x450.webp\" alt=\"Award Image\">\n            <\/a>\n                <div class=\"award-content\">\n            <h3>\n                Finalist            <\/h3>\n            <p>\n                <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-australian-cyber-awards-2025\" target=\"_blank\" rel=\"noopener\">\n                    Australian Cyber Awards 2025 (Cloud Service Provider)                <\/a>\n            <\/p>\n        <\/div>\n    <\/div>\n    <br \/>\n    <div class=\"award-card\">\n                    <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-azure-migration-specialisation\" target=\"_blank\" rel=\"noopener\">\n                <img decoding=\"async\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2025\/02\/1200-x-675px-specialisation-blog-022025-800x450.webp\" alt=\"Award Image\">\n            <\/a>\n                <div class=\"award-content\">\n            <h3>\n                Microsoft Specialisations            <\/h3>\n            <p>\n                <a href=\"https:\/\/exigotech.co\/sg\/blog\/exigo-tech-azure-migration-specialisation\" target=\"_blank\" rel=\"noopener\">\n                    Azure Infra, Database Migration, Virtual Desktop, Cybersecurity                <\/a>\n            <\/p>\n        <\/div>\n    <\/div>\n    <br \/>\n        <\/div>\n    <\/div>\n    <\/span><\/p>\n<p><a href=\"https:\/\/exigotech.co\/lp\/managed-services-health-check\/\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-91756\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2025\/10\/cta-nfps-ransomware-blog-102025-02.webp\" alt=\"CTA - Book a Free IT Health Check\" width=\"891\" height=\"211\" srcset=\"https:\/\/exigotech.co\/wp-content\/uploads\/2025\/10\/cta-nfps-ransomware-blog-102025-02.webp 891w, https:\/\/exigotech.co\/wp-content\/uploads\/2025\/10\/cta-nfps-ransomware-blog-102025-02-480x114.webp 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 891px, 100vw\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Australia\u2019s not-for-profit (NFP) sector stands at a digital crossroads. Recent data shows a 59% rise in ransomware activity targeting NFPs&#8230;<\/p>\n","protected":false},"author":7,"featured_media":91744,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[58,437],"tags":[],"class_list":["post-91741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-managed-it-services"],"acf":[],"_links":{"self":[{"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/posts\/91741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/comments?post=91741"}],"version-history":[{"count":3,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/posts\/91741\/revisions"}],"predecessor-version":[{"id":91762,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/posts\/91741\/revisions\/91762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/media\/91744"}],"wp:attachment":[{"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/media?parent=91741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/categories?post=91741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/tags?post=91741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}