{"id":39212,"date":"2023-11-03T09:02:11","date_gmt":"2023-11-03T09:02:11","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=39212"},"modified":"2023-11-03T09:02:11","modified_gmt":"2023-11-03T09:02:11","slug":"domain-protection-protocols-how-to-intercept-a-cyber-attack","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/","title":{"rendered":"Domain protection protocols: How to intercept a cyber attack"},"content":{"rendered":"

Brian Lonergan, Vice President of Product Strategy at Identity Digital, outlines key domain protection protocols businesses can employ to mitigate attacks.<\/h2>\n

The manner in which the world has adapted to technology over the past few years is remarkable. In fact, it was not too long ago that we experienced a digital transformation that was thought to arrive a decade from now.<\/p>\n

Unfortunately, however, cyber criminals have adapted to the times as well – finding newer and more intricate ways to infiltrate the market.<\/p>\n

Today, one of the most infamously practiced forms of cyber crimes is that of phishing. With phishing now being so prolific, we too need to be more tactical in our defenses against such cyber attacks.<\/p>\n

For domain phishing in particular, there are three methods cyber criminals tend to use when wishing to lure their prey.<\/p>\n

Below, we discuss them and some key ways businesses can employ domain protection protocols to protect themselves, their customers, and employees in our modern economy.<\/p>\n

Homographic attacks<\/h3>\n

One of the most common forms of phishing includes homographic spoofing, which is done by swapping out the characters of a professional company\u2019s web address so as to impersonate that respected business. An example of how a cybercriminal can execute this type of attack is by switching the letters ‘oe’ with the letter ‘\u0153’ for all appropriate domain names.<\/p>\n

To avoid such attacks from occurring, an efficient domain protection method is an investment in homographic blocking. Built-in homographic blocking is a tool offered by some registries that instantly protects permutations of your domain names – preventing any potential spoofers who wish to disguise themselves as your company.<\/p>\n

As an employee or customer, a way to spot such tricksters online, day-to-day, is by keeping your browser productivity tools updated. As creatures of habit, how we access and navigate our applications can affect our ability to spot homographic attacks, making us vulnerable to their ruse.<\/p>\n

Impede their next move with a Domain Protected Marks List<\/h3>\n

If cyber criminals cannot spoof your brand\u2019s keyword through character swaps, they will often attempt to utilise alternate top level domains. For example, if your domain name is ‘austin.coffee’, cyber criminals will impersonate your site with the web address ‘austincoffee.shop’ or ‘austincoffee.cafe’.<\/p>\n

The Domain Protected Marks List (DPML) is a valuable service trademark holders can leverage to mitigate this type of attack. Once purchased, domain names matching your trademarked brand name are helpfully enlisted and reserved within the domain portfolio. This unique function only permits the trademarked holder to register those domain names in future, ensuring both the domain and brand\u2019s protection from phishing.<\/p>\n

Domain protection tools of this nature help bring peace of mind to their respective owners due to their benefits for both the technology and marketing sectors. It’s, therefore, worth shopping around to see which domain providers can deliver the right security measures for your business.<\/p>\n

\"phishing\"
\u00a9 shutterstock\/TippaPatt<\/figcaption><\/figure>\n

In order to spot websites impersonating respected companies, it\u2019s important to look out for the telling signs of a spoofed domain. Cyber criminals are usually spotted through their use of language (poor grammar and spelling), communication tactics (tone of voice not in line with the real company), and branding designs (fonts and colours inaccurate to the brand).<\/p>\n

It\u2019s also best to think twice before providing any newly requested credentials. In fact, calling the appropriate department at your company for extra assurance ahead of sharing new data. This helps verify the legitimacy of the request.<\/p>\n

Protect your domain with Registry Lock<\/h3>\n

Oftentimes, once you have blocked the common routes of phishing, cyber criminals can choose to steal your domain name altogether as another option. In the world of cyber crime, this type of attack is often termed domain hijacking.<\/p>\n

Domain hijacking is done by tricking the rightful owners of websites into providing access to their domains.<\/p>\n

As a result, the ownership of the domain is transferred to the cyber criminal, blocking the legitimate owner from having administrative access and control to their domain(s). Once the cybercriminal hijacks the domain, they can change the site\u2019s content and use it for phishing and other nefarious purposes.<\/p>\n

To avoid such cases from occurring within your business, it\u2019s recommended to invest in a Registry Lock. A Registry Lock is a service that locks access to your domain at the registry level, with a multi-step authentication process required in order to make modifications. This process helps block unwanted transfers, deletions, and modifications to your domain.<\/p>\n

The best part? The authentication process can only be requested through your registrar, ensuring its safety from cyber criminals.<\/p>\n

Efficient domain protection methods are vital<\/h3>\n

Since cybercriminals have been around for such a significant amount of time, we are used to their antics and can spot their ploys when vigilant. Therefore, by creating the right strategy and using the right tools, we can combat the phishing tactics sent our way.<\/p>\n

Implementing the right cyber security<\/a> measures within your organisation not only defends it from cyber criminals, but in turn, protects your company from reputational damage or asset loss. Cyber criminals may have gotten smarter in their schemes, but with our wisdom, we can remain a step ahead of their next move.<\/p>\n","protected":false},"excerpt":{"rendered":"

Learn more about the three key domain protection protocols that businesses can employ to protect themselves and their employees.<\/p>\n","protected":false},"author":18,"featured_media":39221,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[830],"tags":[530],"acf":[],"yoast_head":"\nDomain protection protocols: How to intercept a cyber attack<\/title>\n<meta name=\"description\" content=\"Learn more about the three key domain protection protocols that businesses can employ to protect themselves and their employees.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Domain protection protocols: How to intercept a cyber attack\" \/>\n<meta property=\"og:description\" content=\"Learn more about the three key domain protection protocols that businesses can employ to protect themselves and their employees.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation News Network\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InnoNewsNetwork\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-03T09:02:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Potts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:site\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Potts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/\"},\"author\":{\"name\":\"Emily Potts\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\"},\"headline\":\"Domain protection protocols: How to intercept a cyber attack\",\"datePublished\":\"2023-11-03T09:02:11+00:00\",\"dateModified\":\"2023-11-03T09:02:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/\"},\"wordCount\":887,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#respond\"]}],\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/\",\"name\":\"Domain protection protocols: How to intercept a cyber attack\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg\",\"datePublished\":\"2023-11-03T09:02:11+00:00\",\"dateModified\":\"2023-11-03T09:02:11+00:00\",\"description\":\"Learn more about the three key domain protection protocols that businesses can employ to protect themselves and their employees.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#primaryimage\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"\u00a9 shutterstock\/Sashkin\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.innovationnewsnetwork.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Domain protection protocols: How to intercept a cyber attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"name\":\"Innovation News Network\",\"description\":\"Science, Research & Innovation News\",\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\",\"name\":\"Innovation News Network\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Innovation News Network\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InnoNewsNetwork\",\"https:\/\/x.com\/InnoNewsNetwork\",\"https:\/\/www.linkedin.com\/company\/innovation-news-network\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\",\"name\":\"Emily Potts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"caption\":\"Emily Potts\"},\"sameAs\":[\"https:\/\/www.innovationnewsnetwork.com\"],\"url\":\"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/\"}]}<\/script>\n","yoast_head_json":{"title":"Domain protection protocols: How to intercept a cyber attack","description":"Learn more about the three key domain protection protocols that businesses can employ to protect themselves and their employees.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/","og_locale":"en_GB","og_type":"article","og_title":"Domain protection protocols: How to intercept a cyber attack","og_description":"Learn more about the three key domain protection protocols that businesses can employ to protect themselves and their employees.","og_url":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/","og_site_name":"Innovation News Network","article_publisher":"https:\/\/www.facebook.com\/InnoNewsNetwork","article_published_time":"2023-11-03T09:02:11+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg","type":"image\/jpeg"}],"author":"Emily Potts","twitter_card":"summary_large_image","twitter_creator":"@InnoNewsNetwork","twitter_site":"@InnoNewsNetwork","twitter_misc":{"Written by":"Emily Potts","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#article","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/"},"author":{"name":"Emily Potts","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef"},"headline":"Domain protection protocols: How to intercept a cyber attack","datePublished":"2023-11-03T09:02:11+00:00","dateModified":"2023-11-03T09:02:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/"},"wordCount":887,"commentCount":0,"publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg","keywords":["Cybersecurity"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#respond"]}],"copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/","url":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/","name":"Domain protection protocols: How to intercept a cyber attack","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#primaryimage"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg","datePublished":"2023-11-03T09:02:11+00:00","dateModified":"2023-11-03T09:02:11+00:00","description":"Learn more about the three key domain protection protocols that businesses can employ to protect themselves and their employees.","breadcrumb":{"@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#primaryimage","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/11\/\u00a9-shutterstockSashkin_428295184.jpg","width":1920,"height":1080,"caption":"\u00a9 shutterstock\/Sashkin"},{"@type":"BreadcrumbList","@id":"https:\/\/www.innovationnewsnetwork.com\/domain-protection-protocols-how-to-intercept-a-cyber-attack\/39212\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.innovationnewsnetwork.com\/"},{"@type":"ListItem","position":2,"name":"Domain protection protocols: How to intercept a cyber attack"}]},{"@type":"WebSite","@id":"https:\/\/www.innovationnewsnetwork.com\/#website","url":"https:\/\/www.innovationnewsnetwork.com\/","name":"Innovation News Network","description":"Science, Research & Innovation News","publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.innovationnewsnetwork.com\/#organization","name":"Innovation News Network","url":"https:\/\/www.innovationnewsnetwork.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","width":1920,"height":1080,"caption":"Innovation News Network"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InnoNewsNetwork","https:\/\/x.com\/InnoNewsNetwork","https:\/\/www.linkedin.com\/company\/innovation-news-network\/"]},{"@type":"Person","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef","name":"Emily Potts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","caption":"Emily Potts"},"sameAs":["https:\/\/www.innovationnewsnetwork.com"],"url":"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2025-02-06 22:20:35","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/39212"}],"collection":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/comments?post=39212"}],"version-history":[{"count":3,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/39212\/revisions"}],"predecessor-version":[{"id":39224,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/39212\/revisions\/39224"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media\/39221"}],"wp:attachment":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media?parent=39212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/categories?post=39212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/tags?post=39212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}