{"id":33230,"date":"2023-06-16T08:04:24","date_gmt":"2023-06-16T07:04:24","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=33230"},"modified":"2023-06-16T08:04:18","modified_gmt":"2023-06-16T07:04:18","slug":"how-can-we-protect-critical-national-infrastructure-from-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/","title":{"rendered":"How can we protect critical national infrastructure from cyber attacks?"},"content":{"rendered":"

At the Cyber UK event in Belfast in April, UK Minister Oliver Dowden warned of Russian-associated hacker attempts to disrupt or destroy critical UK infrastructure<\/a>, while the National Cyber Security Centre issued an official threat notice.<\/p>\n

Threats to critical national infrastructure (CNI) however are not new. We have already seen how the war in Ukraine has shaped the cyber security picture in Europe and driven a number of attacks against key infrastructure targets. For example, the attack against Viasat just an hour before Russian troops invaded Ukraine resulted in an immediate and significant loss of communication. It also had the secondary result of paralysing 9000 German wind turbines that rely on satellite communication for their operations.<\/p>\n

As the war continues, we have seen other international cyber-attacks as witnessed against Estonian, Latvian, Lithuanian, and Polish targets, as well as the EU Parliament in 2022.<\/p>\n

Why critical national infrastructure represents an attractive target for cyber attacks<\/h3>\n

Despite the high-profile nature of the Russian situation and the impact that it has had across Europe, it is not just Russian-linked hackers who seek to interfere with critical national infrastructure.<\/p>\n

Because critical systems underpin so many important services \u2013 from communications and energy supply to healthcare, education, and transport \u2013 they are a prime target for bad actors looking for ways to be harmful<\/a>. Political or ideological reasoning is not the only trigger. Financial gain can also be a key motivation for ransomware or phishing attacks. But whether politically or financially motivated, attacks on CNI have the potential to inflict significant disruption to national economies and the lives of citizens.<\/p>\n

The financially-led Colonial Pipeline cyber attack on the largest US fuel pipeline in 2021 forced the company to shut down its pipeline network. This brought the oil delivery system to an almost complete standstill, resulting in a regional emergency declaration for 17 states and Washington D.C.<\/p>\n

Attacks on healthcare<\/a>, meanwhile, can mean life or death. A ransomware attack on a hospital in Germany in September 2020 caused emergency care to be disrupted. It resulted in a police investigation into whether the attack caused the death of a patient. Although the investigation found that the hackers were not directly responsible, the incident goes to show how high the stakes can be.<\/p>\n

CNI vulnerabilities<\/h3>\n

There are a number of reasons that critical national infrastructure can be vulnerable to cyber threats.<\/p>\n

Digital transformation, for example, has expanded the cyber footprint of all industries, exacerbating dependence on technology and connectivity and widening the opportunity for attacks. But despite digital advancement in several areas, the continued use of legacy systems designed before cyber security was even an issue also contributes to susceptibility.<\/p>\n

Complexity of operations, including supply chains and the large number of stakeholders involved also increases vulnerability.\u00a0 Different equipment suppliers, software vendors, and third-party contractors can mean that control over third-party products and services is often weak. The complexity of the systems is often such that nobody has the holistic and detailed view required, and companies rely on outsourced services.<\/p>\n

And as is often the case in cyber security, human error is always dangerous. Utility companies, financial institutions and healthcare providers to name but a few all employ thousands of workers who have access to sensitive systems and information. These workers can inadvertently introduce vulnerabilities through phishing attacks, weak passwords, and other security lapses.<\/p>\n

In order to protect the energy sector against cyber attacks, it is vital to take a systemic approach and weave cyber security into daily business activities.<\/p>\n

What can CNI organisations do to better protect themselves?<\/h3>\n

Although vulnerabilities proliferate, there are a number of things that CNI organisations can do in order to protect themselves and the services they provide.<\/p>\n

The first is to plan for a cybersecurity budget and invest in exercises that help leaders and employees prepare for cyber security attacks. Implementing a zero trust policy, for example, where inherent trust in the network is removed, the network is assumed hostile and each request is verified based on an access policy.<\/p>\n

By hardening systems and investing in the human link by involving everyone to create a \u2018human firewall\u2019 it is possible to go some way towards preventing mistakes which lead to vulnerabilities, as well as ensuring planning and preparedness so that, should a cyber attack occur, it can be dealt with and contained as quickly and effectively as possible.<\/p>\n

Many examples of live exercises can be carried out that are enlightening for an organisation regarding their cyber security awareness and result in a whole set of measures to implement.<\/p>\n

Knowing how the internal network is built up for example, or how easy it is to cause lateral movement which allows a ransomware attack to really get to the heart of the company, and how it can be prevented.<\/p>\n

Moreover, it is crucial to:<\/p>\n

    \n
  • Decide who to call in a cyber attack;<\/li>\n
  • Define the management\u2019s role;<\/li>\n
  • Plan whether or not to inform customers;<\/li>\n
  • Know where to back up and how to back up; and<\/li>\n
  • How backups can be used after they have been decrypted.<\/li>\n<\/ul>\n

    Cyber range technology can provide a realistic simulation environment for training employees on cyber security best practices, including identifying and responding to cyber threats.<\/p>\n

    Cyber ranges can also be used to create simulations of cyber attacks on critical national infrastructure systems to help identify vulnerabilities, test cyber defences, and facilitate collaboration and coordination between different departments and stakeholders within a company. Being able to document the results of these simulation events also goes a long way towards the compliance required by many national regulators.<\/p>\n

    It\u2019s not possible to protect everything, however, so we recommend prioritising. This means understanding what and where the organisation\u2019s crown jewels are, defending those, and detaching critical core systems from business systems to do so.<\/p>\n

    Sadly it is the way of the world that if bad actors can pinpoint a way in which they can be harmful, causing data or financial loss, or reputation damage, then they will use it to their advantage.<\/p>\n

    We have seen the devastation that attacks against critical national infrastructure can cause. Because of the way in which it underpins so many important national services, it will remain a prime target. Arming individuals with the knowledge and training in cyber security will be crucial if we are to protect our critical national infrastructure, keep vital services up and running and instil trust in the end-user.<\/p>\n","protected":false},"excerpt":{"rendered":"

    Discover how industries must protect themselves against the growing threat of cyber attacks on critical national infrastructure.<\/p>\n","protected":false},"author":22,"featured_media":33237,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[830],"tags":[530,885],"acf":[],"yoast_head":"\nHow can we protect critical national infrastructure from cyber attacks?<\/title>\n<meta name=\"description\" content=\"Discover how industries must protect themselves against the growing threat of cyber attacks on critical national infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How can we protect critical national infrastructure from cyber attacks?\" \/>\n<meta property=\"og:description\" content=\"Discover how industries must protect themselves against the growing threat of cyber attacks on critical national infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation News Network\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InnoNewsNetwork\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-16T07:04:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-16T07:04:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Megan Traviss\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:site\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Megan Traviss\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/\"},\"author\":{\"name\":\"Megan Traviss\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/357211ccc313d0c608f22a2017c87d87\"},\"headline\":\"How can we protect critical national infrastructure from cyber attacks?\",\"datePublished\":\"2023-06-16T07:04:24+00:00\",\"dateModified\":\"2023-06-16T07:04:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/\"},\"wordCount\":1069,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg\",\"keywords\":[\"Cybersecurity\",\"Digital Infrastructure\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#respond\"]}],\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/\",\"name\":\"How can we protect critical national infrastructure from cyber attacks?\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg\",\"datePublished\":\"2023-06-16T07:04:24+00:00\",\"dateModified\":\"2023-06-16T07:04:18+00:00\",\"description\":\"Discover how industries must protect themselves against the growing threat of cyber attacks on critical national infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#primaryimage\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Detective spotting cyber threat to critical national infrastructure\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.innovationnewsnetwork.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How can we protect critical national infrastructure from cyber attacks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"name\":\"Innovation News Network\",\"description\":\"Science, Research & Innovation News\",\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\",\"name\":\"Innovation News Network\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Innovation News Network\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InnoNewsNetwork\",\"https:\/\/x.com\/InnoNewsNetwork\",\"https:\/\/www.linkedin.com\/company\/innovation-news-network\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/357211ccc313d0c608f22a2017c87d87\",\"name\":\"Megan Traviss\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/73297bad56a7550ffe7b7c582ef5e889?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/73297bad56a7550ffe7b7c582ef5e889?s=96&d=mm&r=g\",\"caption\":\"Megan Traviss\"},\"sameAs\":[\"https:\/\/www.innovationnewsnetwork.com\",\"https:\/\/www.linkedin.com\/in\/megantraviss\/\"],\"url\":\"https:\/\/www.innovationnewsnetwork.com\/author\/megantraviss\/\"}]}<\/script>\n","yoast_head_json":{"title":"How can we protect critical national infrastructure from cyber attacks?","description":"Discover how industries must protect themselves against the growing threat of cyber attacks on critical national infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/","og_locale":"en_GB","og_type":"article","og_title":"How can we protect critical national infrastructure from cyber attacks?","og_description":"Discover how industries must protect themselves against the growing threat of cyber attacks on critical national infrastructure.","og_url":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/","og_site_name":"Innovation News Network","article_publisher":"https:\/\/www.facebook.com\/InnoNewsNetwork","article_published_time":"2023-06-16T07:04:24+00:00","article_modified_time":"2023-06-16T07:04:18+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg","type":"image\/jpeg"}],"author":"Megan Traviss","twitter_card":"summary_large_image","twitter_creator":"@InnoNewsNetwork","twitter_site":"@InnoNewsNetwork","twitter_misc":{"Written by":"Megan Traviss","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#article","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/"},"author":{"name":"Megan Traviss","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/357211ccc313d0c608f22a2017c87d87"},"headline":"How can we protect critical national infrastructure from cyber attacks?","datePublished":"2023-06-16T07:04:24+00:00","dateModified":"2023-06-16T07:04:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/"},"wordCount":1069,"commentCount":0,"publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg","keywords":["Cybersecurity","Digital Infrastructure"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#respond"]}],"copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/","url":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/","name":"How can we protect critical national infrastructure from cyber attacks?","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#primaryimage"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg","datePublished":"2023-06-16T07:04:24+00:00","dateModified":"2023-06-16T07:04:18+00:00","description":"Discover how industries must protect themselves against the growing threat of cyber attacks on critical national infrastructure.","breadcrumb":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#primaryimage","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/05\/shutterstockLeoWolfert_1197767476.jpg","width":1920,"height":1080,"caption":"Detective spotting cyber threat to critical national infrastructure"},{"@type":"BreadcrumbList","@id":"https:\/\/www.innovationnewsnetwork.com\/how-can-we-protect-critical-national-infrastructure-from-cyber-attacks\/33230\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.innovationnewsnetwork.com\/"},{"@type":"ListItem","position":2,"name":"How can we protect critical national infrastructure from cyber attacks?"}]},{"@type":"WebSite","@id":"https:\/\/www.innovationnewsnetwork.com\/#website","url":"https:\/\/www.innovationnewsnetwork.com\/","name":"Innovation News Network","description":"Science, Research & Innovation News","publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.innovationnewsnetwork.com\/#organization","name":"Innovation News Network","url":"https:\/\/www.innovationnewsnetwork.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","width":1920,"height":1080,"caption":"Innovation News Network"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InnoNewsNetwork","https:\/\/x.com\/InnoNewsNetwork","https:\/\/www.linkedin.com\/company\/innovation-news-network\/"]},{"@type":"Person","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/357211ccc313d0c608f22a2017c87d87","name":"Megan Traviss","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/73297bad56a7550ffe7b7c582ef5e889?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/73297bad56a7550ffe7b7c582ef5e889?s=96&d=mm&r=g","caption":"Megan Traviss"},"sameAs":["https:\/\/www.innovationnewsnetwork.com","https:\/\/www.linkedin.com\/in\/megantraviss\/"],"url":"https:\/\/www.innovationnewsnetwork.com\/author\/megantraviss\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2025-02-07 14:50:50","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/33230"}],"collection":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/comments?post=33230"}],"version-history":[{"count":3,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/33230\/revisions"}],"predecessor-version":[{"id":33245,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/33230\/revisions\/33245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media\/33237"}],"wp:attachment":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media?parent=33230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/categories?post=33230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/tags?post=33230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}