{"id":34273,"date":"2023-06-28T13:44:01","date_gmt":"2023-06-28T12:44:01","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=34273"},"modified":"2023-06-28T13:44:01","modified_gmt":"2023-06-28T12:44:01","slug":"what-are-cybersecurity-pitfalls-trying-protect-remote-workers","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/","title":{"rendered":"What are the cybersecurity pitfalls when trying to protect remote workers?"},"content":{"rendered":"

Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, discusses the five common pitfalls companies fall into when trying to protect remote workers from cybersecurity threats.<\/h2>\n

Trying to protect remote workers has never been so complex or fraught with risk.<\/p>\n

Working from home, hybrid working, SaaS, cloud migration, secure remote access, ransomware<\/a>, phishing attacks, social engineering, credential theft, BYOD \u2013 the list goes on and on.<\/p>\n

But the old methods of protecting remote workers are no longer fit for purpose.<\/p>\n

VPNs are notoriously insecure and don\u2019t scale. Backhauling Internet traffic to a secure data centre increases latency and can impact performance. Blacklisting shuts off entire sections of the dynamic Internet, preventing users from getting work done.<\/p>\n

Yet, organisations continue to tackle new security problems with old technologies. Security strategies need to evolve to meet the needs of today\u2019s business \u2013 where users can log on and access corporate resources from anywhere and anytime, no matter what device they are using. Users should expect to be protected from today\u2019s highly sophisticated threats without impacting performance.<\/p>\n

But old habits die hard. These are five pitfalls that organisations fall into when trying to protect remote workers:<\/p>\n

1. Don\u2019t <\/span>ignore<\/span> unmanaged devices<\/span><\/p>\n

It\u2019s easy to put your head in the sand and pretend that users are not accessing company systems on their personal devices. With corporate policies in place, people understand the security risks they are taking by using their phone, tablet, or laptop when logging in.<\/p>\n

But they do it anyway. Unmanaged devices and networks (such as home or remote WiFi) pose a major security risk to the organisation.<\/p>\n

The consumerisation of the cloud has also made it easier than ever for users to use a credit card to use own systems or create an infrastructure without following corporate policies or letting IT know.<\/p>\n

It takes one click to give threat actors access to a device and then spread throughout the network. Businesses need to make sure they can secure the connection between unmanaged devices and corporate systems.<\/p>\n

Isolation technology, for example, can create a virtual air gap between users and web content, stopping ransomware, drive-by attacks, and malware before they can access end devices. This is a user-centric rather than device-centric approach, ensuring that even unmanaged devices and infrastructure (that IT is not aware of) are protected.<\/p>\n

2. Fail to plan, plan to fail<\/span><\/p>\n

Malicious actors are becoming more sophisticated and adaptive in their methods.<\/p>\n

Cybersecurity is a constant battle between threat actors and security teams. As soon as a new security control is developed, attackers quickly find a way around it. The gap is then plugged by a new tool, and attackers identify another way in.<\/p>\n

\"cybersecurity\"
\u00a9 shutterstock\/Thapana_Studio<\/figcaption><\/figure>\n

What works today will not necessarily work tomorrow.<\/p>\n

Today\u2019s\u00a0Highly Evasive Adaptive Threats (HEAT)\u00a0target web browsers and employ techniques to evade multiple layers of detection in current security stacks, including firewalls, sandbox analysis, and phishing detection.<\/p>\n

HEAT attacks can be used as the initial access point to deliver malware or to compromise credentials, which in many cases leads to ransomware and other attacks.<\/p>\n

Knowledge is power when trying to protect remote workers, and even more so when it comes to emerging threats like HEAT attacks.<\/p>\n

3. Relying on VPNs<\/span><\/p>\n

VPN appliances are not scalable enough to meet the needs of digital, agile organisations where users need to access applications quickly and reliably wherever they are.<\/p>\n

Once credentials are compromised through social engineering, fake login forms, or phishing, threat actors have unrestricted access to the network with little to no east-west security controls in place.<\/p>\n

Even when they do work, VPNs sap bandwidth and increase latency by backhauling Internet traffic to a secure data centre.<\/p>\n

Organisations should look at alternative methods of secure remote access, such as cloud-based application isolation, providing connections to applications with a layer of threat prevention.<\/p>\n

This offers enhanced Zero Trust access and maximises security posture without impacting the end user experience.<\/p>\n

4. Over-consolidating security solutions<\/span><\/p>\n

According to\u00a0Anomali<\/a>, organisations rely on an average of 50 to 80 security tools, which rises to 120 for large companies. This software sprawl can lead to higher capital and operating costs while causing integration and visibility issues.<\/p>\n

In 2022,\u00a0Gartner<\/a>\u00a0reported that 75% of global organisations plan to consolidate their security vendors over the next 12 months. But too much consolidation can result in a degradation of effectiveness.<\/p>\n

No vendor can deliver a best of breed security solution that protects remote workers across all threat vectors. Anyone who attempts to develop or bolt together a complete solution inevitably will have to compromise.<\/p>\n

While it makes sense to do some consolidation, relying on a single vendor introduces too much risk. Companies must be careful when trading simplicity for weaker protection.<\/p>\n

5. Reliance on detect and respond<\/span><\/p>\n

The trend in security over recent years has been to tell customers that breaches are inevitable and to focus on detecting malicious behaviour inside the network.<\/p>\n

East-west security is critical, but it should not come at the expense of protection.<\/p>\n

HEAT attacks bypass traditional detect-and-respond cybersecurity approaches by hiding in plain sight among seemingly innocuous technologies, such as JavaScript and VPNs.<\/p>\n

Threat actors can breach the network avoiding detection for days, weeks, or even months. The problem is that the speed at which they make their move after the initial breach.<\/p>\n

Despite what some security vendors say, protecting remote workers is not a losing battle \u2013 prevention works.<\/p>\n","protected":false},"excerpt":{"rendered":"

Discover the top five common pitfalls companies fall into when trying to protect remote workers from cybersecurity threats.\u00a0<\/p>\n","protected":false},"author":18,"featured_media":34287,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[830],"tags":[530],"acf":[],"yoast_head":"\nWhat are the cybersecurity pitfalls when trying to protect remote workers?<\/title>\n<meta name=\"description\" content=\"Discover the top five common pitfalls companies fall into when trying to protect remote workers from cybersecurity threats.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the cybersecurity pitfalls when trying to protect remote workers?\" \/>\n<meta property=\"og:description\" content=\"Discover the top five common pitfalls companies fall into when trying to protect remote workers from cybersecurity threats.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation News Network\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InnoNewsNetwork\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-28T12:44:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Potts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:site\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Potts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/\"},\"author\":{\"name\":\"Emily Potts\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\"},\"headline\":\"What are the cybersecurity pitfalls when trying to protect remote workers?\",\"datePublished\":\"2023-06-28T12:44:01+00:00\",\"dateModified\":\"2023-06-28T12:44:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/\"},\"wordCount\":913,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#respond\"]}],\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/\",\"name\":\"What are the cybersecurity pitfalls when trying to protect remote workers?\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg\",\"datePublished\":\"2023-06-28T12:44:01+00:00\",\"dateModified\":\"2023-06-28T12:44:01+00:00\",\"description\":\"Discover the top five common pitfalls companies fall into when trying to protect remote workers from cybersecurity threats.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#primaryimage\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"\u00a9 shutterstock\/Roman Samborskyi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.innovationnewsnetwork.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the cybersecurity pitfalls when trying to protect remote workers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"name\":\"Innovation News Network\",\"description\":\"Science, Research & Innovation News\",\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\",\"name\":\"Innovation News Network\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Innovation News Network\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InnoNewsNetwork\",\"https:\/\/x.com\/InnoNewsNetwork\",\"https:\/\/www.linkedin.com\/company\/innovation-news-network\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\",\"name\":\"Emily Potts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"caption\":\"Emily Potts\"},\"sameAs\":[\"https:\/\/www.innovationnewsnetwork.com\"],\"url\":\"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/\"}]}<\/script>\n","yoast_head_json":{"title":"What are the cybersecurity pitfalls when trying to protect remote workers?","description":"Discover the top five common pitfalls companies fall into when trying to protect remote workers from cybersecurity threats.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/","og_locale":"en_GB","og_type":"article","og_title":"What are the cybersecurity pitfalls when trying to protect remote workers?","og_description":"Discover the top five common pitfalls companies fall into when trying to protect remote workers from cybersecurity threats.\u00a0","og_url":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/","og_site_name":"Innovation News Network","article_publisher":"https:\/\/www.facebook.com\/InnoNewsNetwork","article_published_time":"2023-06-28T12:44:01+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg","type":"image\/jpeg"}],"author":"Emily Potts","twitter_card":"summary_large_image","twitter_creator":"@InnoNewsNetwork","twitter_site":"@InnoNewsNetwork","twitter_misc":{"Written by":"Emily Potts","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#article","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/"},"author":{"name":"Emily Potts","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef"},"headline":"What are the cybersecurity pitfalls when trying to protect remote workers?","datePublished":"2023-06-28T12:44:01+00:00","dateModified":"2023-06-28T12:44:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/"},"wordCount":913,"commentCount":0,"publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg","keywords":["Cybersecurity"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#respond"]}],"copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/","url":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/","name":"What are the cybersecurity pitfalls when trying to protect remote workers?","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#primaryimage"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg","datePublished":"2023-06-28T12:44:01+00:00","dateModified":"2023-06-28T12:44:01+00:00","description":"Discover the top five common pitfalls companies fall into when trying to protect remote workers from cybersecurity threats.\u00a0","breadcrumb":{"@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#primaryimage","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/06\/shutterstockRoman-Samborskyi_2148238949.jpg","width":1920,"height":1080,"caption":"\u00a9 shutterstock\/Roman Samborskyi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.innovationnewsnetwork.com\/what-are-cybersecurity-pitfalls-trying-protect-remote-workers\/34273\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.innovationnewsnetwork.com\/"},{"@type":"ListItem","position":2,"name":"What are the cybersecurity pitfalls when trying to protect remote workers?"}]},{"@type":"WebSite","@id":"https:\/\/www.innovationnewsnetwork.com\/#website","url":"https:\/\/www.innovationnewsnetwork.com\/","name":"Innovation News Network","description":"Science, Research & Innovation News","publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.innovationnewsnetwork.com\/#organization","name":"Innovation News Network","url":"https:\/\/www.innovationnewsnetwork.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","width":1920,"height":1080,"caption":"Innovation News Network"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InnoNewsNetwork","https:\/\/x.com\/InnoNewsNetwork","https:\/\/www.linkedin.com\/company\/innovation-news-network\/"]},{"@type":"Person","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef","name":"Emily Potts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","caption":"Emily Potts"},"sameAs":["https:\/\/www.innovationnewsnetwork.com"],"url":"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2025-02-07 15:13:05","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/34273"}],"collection":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/comments?post=34273"}],"version-history":[{"count":3,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/34273\/revisions"}],"predecessor-version":[{"id":34292,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/34273\/revisions\/34292"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media\/34287"}],"wp:attachment":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media?parent=34273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/categories?post=34273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/tags?post=34273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}