{"id":38374,"date":"2023-10-18T08:52:54","date_gmt":"2023-10-18T07:52:54","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=38374"},"modified":"2023-10-18T08:56:32","modified_gmt":"2023-10-18T07:56:32","slug":"navigating-turbulent-waters-modern-cyber-security-threats","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/","title":{"rendered":"Navigating the turbulent waters of modern cyber security threats"},"content":{"rendered":"

Kamal Srinivasan, SVP of Product and Program Management at Parallels (part of Alludo), explains that technological advances require new approaches to dealing with cyber security threats.<\/h2>\n

\u201cThe only constant in life is change.\u201d I\u2019m very sure that when Heraclitus said this, he was not referring to the ever-changing cyber security<\/a> landscape. But had he been, he would have been spot on. In the rapidly evolving technological realm of cyber security, the conventional approach to addressing cyber security threats that businesses face is no longer sufficient.<\/p>\n

With the increased reliance upon technology to help businesses meet their internal and external goals, there is a necessity for a more robust and adaptive approach towards cyber security.<\/p>\n

According to a recent survey by Alludo – in partnership with Qualtrics, featuring nearly 500 IT professionals, eight out of ten respondents stated that security is a top priority. Even still, with this increased importance placed upon cyber security, there were more than 79 million breached records in August alone<\/a>.<\/p>\n

It’s clear to see that the desire is there from companies to attack cyber security threats head-on, yet still, it wouldn\u2019t be out of the ordinary to wonder why many cyber security breaches take place.<\/p>\n

Technology is evolving faster than ever before<\/h3>\n

From cloud computing to Artificial Intelligence<\/a>, the recent developments made in technology have led businesses from numerous sectors to implement new technologies to improve all aspects of business operations and customer satisfaction.<\/p>\n

However, whilst doing this, reaping the benefits and capabilities of these technological advancements, they also at times inadvertently leave themselves exposed to cyber security threats.<\/p>\n

An increased demand from both customers and employees for a more contactless on-demand experience has led businesses to invest in technology to meet both parties’ desires. At an ever-growing rate, cloud computing is being adopted to make data more readily available when customers and employees desire it.<\/p>\n

41.4% of IT leaders reported that they were increasing their use of the cloud<\/a>. A further 32.8% announced they were migrating on-premises workloads to the cloud<\/a>.<\/p>\n

This sudden shift to the cloud has undeniably improved operations for businesses from a productivity, flexibility, and collaborative standpoint.<\/p>\n

Nevertheless, it has also left behind traditional security enterprise controls, rooted in the firewall-centric approach, making it increasingly more apparent that such and often used cyber security approaches can\u2019t keep up with the new dynamic landscape.<\/p>\n

\"\"
\u00a9 shutterstock\/husjur02<\/figcaption><\/figure>\n

There is no denying that in the future, the cloud will become more prominent in the way that businesses operate. Although IT decision-makers from businesses may be reluctant to do so, it is time to let go of the old and outdated cyber security measures and put in place newer approaches such as the Zero-Trust Architecture (ZTA). This approach operates under the principles that all entities are untrusted by default, least privileged access is enforced, and comprehensive security monitoring is implemented as is a core foundational requirement of secure remote access.<\/p>\n

A ZTA approach challenges traditional thought processes and ways of working by assuming \u2018trust in good, but control is better.\u2019 This means that no user or system should be inherently trusted, no matter their location within or outside the network. Addressing the limitations of traditional enterprise controls and extending protective measures beyond the typical boundaries.<\/p>\n

Double trouble: Tackling dual cyber security threats in a connected world<\/h3>\n

If the last few years have shown business leaders and IT decision-makers anything it\u2019s that the future is unpredictable. Take the most conventional form of working now. No one would have thought that 47% of all workers would be hybrid<\/a> and a further 11% were fully remote<\/a> before the pandemic. But that\u2019s where we currently find ourselves today.<\/p>\n

The increase in employees working from both a hybrid and remote capacity though has had positives, it has also increased the chances of businesses falling victim to cyber security threats from a dual perspective. It shouldn\u2019t be a surprise that with all the potential security threats out there such as phishing attacks, organisations plan to increase their security expenditures. 78% of IT leaders reported that they planned to up their security budgets<\/a> either moderately or significantly in the coming year.<\/p>\n

As all professional sectors increasingly become interconnected and work no longer has to be confined specifically to one place, it wouldn\u2019t be a surprise if mobile devices and cloud computing become integral components of business operations. If they\u2019re not already.<\/p>\n

Bearing all of this in mind, businesses must invest in the necessary technologies such as remote application servers and remote browser isolation to deal with both external cyber security threats whilst employees work away from home.<\/p>\n

In tandem with implementing the necessary technology, businesses should also implement a culture where all decisions by employees relating to data take into consideration the cyber security risks. Having principles as such whilst leveraging the right technology, gives businesses the best chance of not falling victim to cyber attacks.<\/p>\n

The battle in the landscape will be continuous<\/h3>\n

According to IT professionals, the top three external threats to sensitive data in their organisations were malware and ransomware attacks (64%), cloud vulnerabilities (42%), and phishing attacks (38%).<\/a> This isn\u2019t a surprise considering the fact the dependability that has been placed on certain technologies such as the cloud.<\/p>\n

But with the increased developments in other areas within the technological landscape, such as in AI, it wouldn\u2019t be surprising if new avenues and loopholes arise for cyber attacks to take place.<\/p>\n

So even though 59% of IT leaders have not experienced a security breach<\/a>, organisations should not rest on their laurels. In today\u2019s reality of hybrid and remote work, along with technological developments means that organisations must be forever alert and take a holistic approach to cyber security to adapt to the ever-changing landscape.<\/p>\n","protected":false},"excerpt":{"rendered":"

Learn why technological advances and hybrid and remote work require new approaches to dealing with cyber security threats.<\/p>\n","protected":false},"author":18,"featured_media":38384,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[830],"tags":[530],"acf":[],"yoast_head":"\nNavigating the turbulent waters of modern cyber security threats<\/title>\n<meta name=\"description\" content=\"Learn why technological advances and hybrid and remote work require new approaches to dealing with cyber security threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating the turbulent waters of modern cyber security threats\" \/>\n<meta property=\"og:description\" content=\"Learn why technological advances and hybrid and remote work require new approaches to dealing with cyber security threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation News Network\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InnoNewsNetwork\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-18T07:52:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-18T07:56:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Potts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:site\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Potts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/\"},\"author\":{\"name\":\"Emily Potts\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\"},\"headline\":\"Navigating the turbulent waters of modern cyber security threats\",\"datePublished\":\"2023-10-18T07:52:54+00:00\",\"dateModified\":\"2023-10-18T07:56:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/\"},\"wordCount\":970,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#respond\"]}],\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/\",\"name\":\"Navigating the turbulent waters of modern cyber security threats\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg\",\"datePublished\":\"2023-10-18T07:52:54+00:00\",\"dateModified\":\"2023-10-18T07:56:32+00:00\",\"description\":\"Learn why technological advances and hybrid and remote work require new approaches to dealing with cyber security threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#primaryimage\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"\u00a9 shutterstock\/Gorodenkoff\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.innovationnewsnetwork.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating the turbulent waters of modern cyber security threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"name\":\"Innovation News Network\",\"description\":\"Science, Research & Innovation News\",\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\",\"name\":\"Innovation News Network\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Innovation News Network\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InnoNewsNetwork\",\"https:\/\/x.com\/InnoNewsNetwork\",\"https:\/\/www.linkedin.com\/company\/innovation-news-network\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\",\"name\":\"Emily Potts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"caption\":\"Emily Potts\"},\"sameAs\":[\"https:\/\/www.innovationnewsnetwork.com\"],\"url\":\"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/\"}]}<\/script>\n","yoast_head_json":{"title":"Navigating the turbulent waters of modern cyber security threats","description":"Learn why technological advances and hybrid and remote work require new approaches to dealing with cyber security threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/","og_locale":"en_GB","og_type":"article","og_title":"Navigating the turbulent waters of modern cyber security threats","og_description":"Learn why technological advances and hybrid and remote work require new approaches to dealing with cyber security threats.","og_url":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/","og_site_name":"Innovation News Network","article_publisher":"https:\/\/www.facebook.com\/InnoNewsNetwork","article_published_time":"2023-10-18T07:52:54+00:00","article_modified_time":"2023-10-18T07:56:32+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg","type":"image\/jpeg"}],"author":"Emily Potts","twitter_card":"summary_large_image","twitter_creator":"@InnoNewsNetwork","twitter_site":"@InnoNewsNetwork","twitter_misc":{"Written by":"Emily Potts","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#article","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/"},"author":{"name":"Emily Potts","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef"},"headline":"Navigating the turbulent waters of modern cyber security threats","datePublished":"2023-10-18T07:52:54+00:00","dateModified":"2023-10-18T07:56:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/"},"wordCount":970,"commentCount":0,"publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg","keywords":["Cybersecurity"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#respond"]}],"copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/","url":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/","name":"Navigating the turbulent waters of modern cyber security threats","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#primaryimage"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg","datePublished":"2023-10-18T07:52:54+00:00","dateModified":"2023-10-18T07:56:32+00:00","description":"Learn why technological advances and hybrid and remote work require new approaches to dealing with cyber security threats.","breadcrumb":{"@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#primaryimage","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/10\/shutterstockGorodenkoff_2136788157.jpg","width":1920,"height":1080,"caption":"\u00a9 shutterstock\/Gorodenkoff"},{"@type":"BreadcrumbList","@id":"https:\/\/www.innovationnewsnetwork.com\/navigating-turbulent-waters-modern-cyber-security-threats\/38374\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.innovationnewsnetwork.com\/"},{"@type":"ListItem","position":2,"name":"Navigating the turbulent waters of modern cyber security threats"}]},{"@type":"WebSite","@id":"https:\/\/www.innovationnewsnetwork.com\/#website","url":"https:\/\/www.innovationnewsnetwork.com\/","name":"Innovation News Network","description":"Science, Research & Innovation News","publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.innovationnewsnetwork.com\/#organization","name":"Innovation News Network","url":"https:\/\/www.innovationnewsnetwork.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","width":1920,"height":1080,"caption":"Innovation News Network"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InnoNewsNetwork","https:\/\/x.com\/InnoNewsNetwork","https:\/\/www.linkedin.com\/company\/innovation-news-network\/"]},{"@type":"Person","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef","name":"Emily Potts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","caption":"Emily Potts"},"sameAs":["https:\/\/www.innovationnewsnetwork.com"],"url":"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2025-02-08 09:41:25","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/38374"}],"collection":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/comments?post=38374"}],"version-history":[{"count":3,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/38374\/revisions"}],"predecessor-version":[{"id":38387,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/38374\/revisions\/38387"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media\/38384"}],"wp:attachment":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media?parent=38374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/categories?post=38374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/tags?post=38374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}