{"id":1560,"date":"2025-02-24T13:41:52","date_gmt":"2025-02-24T13:41:52","guid":{"rendered":"https:\/\/develop.paloaltonetworks.com\/perspectives\/?p=1560"},"modified":"2025-03-12T05:45:00","modified_gmt":"2025-03-12T05:45:00","slug":"mastering-the-basics-cyber-hygiene-and-risk-management","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/","title":{"rendered":"Mastering the Basics: Cyber Hygiene and Risk Management"},"content":{"rendered":"\n<p>Cybersecurity is a journey, not a destination. This mantra has defined much of my career and guides how I approach the challenges of protecting people and organizations in an increasingly digital world. Cybersecurity continues to evolve \u2014&nbsp;I\u2019ve watched the immense transformation over the years \u2014&nbsp;and there has always remained one constant: the basics matter.<\/p>\n\n\n\n<p>When I first entered this field, the threats seemed more localized. Early on, I was captivated by the technical intricacies of securing systems and understanding how they could be broken. But during my time with Homeland Security, my perspective shifted. Cybersecurity became more than a technical challenge, and the stakes were no longer hypothetical or small in scale. Threats became global, and the risks became devastating. It was clear to me then, as it is now, that a solid foundation in cyber hygiene is critical for building resilience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Cyber Hygiene Means to Me<\/strong><\/h2>\n\n\n\n<p>Think of cyber hygiene the way you think of personal hygiene. Each day, you follow a routine: brushing your teeth, taking a shower, using deodorant \u2014&nbsp;basic but essential tasks to ensure your health and well-being. Cyber hygiene is no different. It\u2019s about the routine practices and habits that protect your digital assets and identity. For individuals, this might mean using strong passwords or enabling <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-multi-factor-authentication\">multifactor authentication<\/a> (MFA). For organizations, it\u2019s about maintaining system updates, managing access controls, and having clear protocols in place.<br>At <a href=\"https:\/\/www.jovia.org\/\">Jovia<\/a>, we\u2019ve embraced the idea that financial literacy and cyber literacy are two sides of the same coin. In today\u2019s world, your assets aren\u2019t just in a wallet; they\u2019re in digital transactions, Venmo payments, and Zelle transfers. Unfortunately, these conveniences come with risks, and I\u2019ve seen far too many people lose their life savings because they didn\u2019t understand the basics of protecting themselves online. Educating our members \u2014&nbsp;and the communities we serve \u2014&nbsp;on cyber hygiene is one of the most impactful ways we can make a difference.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Building Resilience Through Cyber Hygiene<\/strong><\/h2>\n\n\n\n<p>When it comes to organizations, effective cyber hygiene boils down to a few key principles:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Adopt Multifactor Authentication Everywhere<\/strong><strong><br><\/strong>MFA is one of the simplest and most effective defenses against unauthorized access. Yet, I\u2019m constantly amazed by how often it\u2019s overlooked. If MFA is available, use it \u2014\u00a0whether for personal accounts like Facebook or for critical systems at your organization.<\/li>\n\n\n\n<li><strong>Use Password Managers<\/strong><strong><br><\/strong>Strong, unique passwords for every account are non-negotiable in today\u2019s threat landscape. A password manager not only simplifies this task but ensures you\u2019re not reusing credentials \u2014\u00a0a common vulnerability that attackers exploit.<\/li>\n\n\n\n<li><strong>Tighten Email Security<\/strong><strong><br><\/strong>Emails remain one of the primary entry points for attackers. Web gateways and link-checking tools can help, but the goal should be to eliminate risky links from ever reaching users. Teaching employees to avoid clicking on email links isn\u2019t enough; organizations need systems that proactively mitigate these risks.<\/li>\n<\/ol>\n\n\n\n<p><strong>Emphasize Routine Maintenance<\/strong><strong><br><\/strong>Just as you wouldn\u2019t skip a doctor\u2019s appointment, you shouldn\u2019t ignore regular system updates. Vulnerabilities are patched constantly, and staying up to date is essential for keeping adversaries at bay.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Facing the Inevitable<\/strong><\/h2>\n\n\n\n<p>Despite our best efforts, breaches happen. I\u2019ve said for years the question isn\u2019t whether your organization will be attacked but how quickly you can detect and contain it. It can take several days to detect and respond to an intrusion, sometimes weeks. That\u2019s unacceptable. At Jovia, we aim to identify threats in hours \u2014&nbsp;not weeks or months \u2014&nbsp;and contain them before they escalate.<\/p>\n\n\n\n<p>This proactive mindset stems from what I call \u201cchanging the rules\u201d of cybersecurity. In the same way Captain Kirk refused to accept the unwinnable Kobayashi Maru scenario, cybersecurity teams must redefine success. It\u2019s not about preventing every attack \u2014&nbsp;that\u2019s impossible. It\u2019s about minimizing the impact, reducing the time to detection, and responding decisively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A Call for Greater Transparency<\/strong><\/h2>\n\n\n\n<p>One of my biggest frustrations in this field is the lack of transparency when breaches occur. Too often, organizations handle incidents quietly, under the shadow of legal concerns, which means we, as an industry, fail to learn from these events. Imagine if every breach were treated like an airline crash, with thorough investigations and published findings. The lessons we\u2019d gain could help prevent future incidents. Instead, the same mistakes are repeated because we\u2019re too hesitant to share what went wrong.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cybersecurity as a Shared Responsibility<\/strong><\/h2>\n\n\n\n<p>Ultimately, cybersecurity is about collaboration. It\u2019s about organizations, vendors, and even customers working together to create a safer digital ecosystem. At Jovia, we integrate third-party risk monitoring and threat intelligence to ensure our vendors meet our security standards. But it\u2019s more than that; it\u2019s about partnerships. When we hear through our intelligence channels that a vendor is being targeted, we act immediately. We reach out to understand the risks and to support mitigation efforts. That\u2019s the kind of proactive, collaborative approach we need across the board.<\/p>\n\n\n\n<p>The battle against cyberthreats can feel overwhelming, but we\u2019re not powerless. By mastering the basics of cyber hygiene and adopting a proactive mindset, we can turn the tide. It starts with curiosity \u2014&nbsp;asking questions, challenging assumptions, and staying ahead of adversaries. It grows through collaboration \u2014&nbsp;within organizations, with partners, and across industries. And it\u2019s sustained by a commitment to resilience to being better tomorrow than we are today. Cybersecurity may be a journey without a final destination, but it\u2019s a journey worth taking.<br>Want to hear the <a href=\"https:\/\/www.paloaltonetworks.com\/podcasts\/threat-vector\">Threat Vector Podcast<\/a> featuring Dan? You can listen to it <a href=\"https:\/\/live.paloaltonetworks.com\/t5\/threat-vector\/threat-vector-mastering-the-basics-cyber-hygiene-and-risk\/ta-p\/1000073\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Routine practices and habits that protect your digital assets and identity.<\/p>\n","protected":false},"author":2,"featured_media":2348,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,19],"tags":[],"coauthors":[103],"class_list":["post-1560","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-transformation","category-third-party-risk-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mastering the Basics: Cyber Hygiene and Risk Management - Perspectives<\/title>\n<meta name=\"description\" content=\"Routine practices and habits that protect your digital assets and identity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mastering the Basics: Cyber Hygiene and Risk Management - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Routine practices and habits that protect your digital assets and identity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-24T13:41:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-12T05:45:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Ford\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/\"},\"author\":{\"name\":\"Avinash\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7\"},\"headline\":\"Mastering the Basics: Cyber Hygiene and Risk Management\",\"datePublished\":\"2025-02-24T13:41:52+00:00\",\"dateModified\":\"2025-03-12T05:45:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/\"},\"wordCount\":946,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg\",\"articleSection\":[\"Business Transformation\",\"Third Party Risk Assessment\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/\",\"name\":\"Mastering the Basics: Cyber Hygiene and Risk Management - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg\",\"datePublished\":\"2025-02-24T13:41:52+00:00\",\"dateModified\":\"2025-03-12T05:45:00+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7\"},\"description\":\"Routine practices and habits that protect your digital assets and identity.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg\",\"width\":1920,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mastering the Basics: Cyber Hygiene and Risk Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7\",\"name\":\"Avinash\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/image\/0058eff42c16830fc0b2a884d693ea44\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"Avinash\"},\"description\":\"Lorem Ipsum is simply dummy text of the printing and typesetting industry.\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/author\/akonangi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mastering the Basics: Cyber Hygiene and Risk Management - Perspectives","description":"Routine practices and habits that protect your digital assets and identity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/","og_locale":"en_US","og_type":"article","og_title":"Mastering the Basics: Cyber Hygiene and Risk Management - Perspectives","og_description":"Routine practices and habits that protect your digital assets and identity.","og_url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/","og_site_name":"Perspectives","article_published_time":"2025-02-24T13:41:52+00:00","article_modified_time":"2025-03-12T05:45:00+00:00","og_image":[{"width":1920,"height":840,"url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg","type":"image\/jpeg"}],"author":"Dan Ford","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/"},"author":{"name":"Avinash","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7"},"headline":"Mastering the Basics: Cyber Hygiene and Risk Management","datePublished":"2025-02-24T13:41:52+00:00","dateModified":"2025-03-12T05:45:00+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/"},"wordCount":946,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg","articleSection":["Business Transformation","Third Party Risk Assessment"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/","name":"Mastering the Basics: Cyber Hygiene and Risk Management - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg","datePublished":"2025-02-24T13:41:52+00:00","dateModified":"2025-03-12T05:45:00+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7"},"description":"Routine practices and habits that protect your digital assets and identity.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/mastering-the-basics-cyber-hygiene-and-risk-management-1920-1.jpg","width":1920,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/mastering-the-basics-cyber-hygiene-and-risk-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Mastering the Basics: Cyber Hygiene and Risk Management"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7","name":"Avinash","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/image\/0058eff42c16830fc0b2a884d693ea44","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"Avinash"},"description":"Lorem Ipsum is simply dummy text of the printing and typesetting industry.","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/author\/akonangi\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/1560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/comments?post=1560"}],"version-history":[{"count":5,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/1560\/revisions"}],"predecessor-version":[{"id":2200,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/1560\/revisions\/2200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/media\/2348"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/media?parent=1560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/categories?post=1560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/tags?post=1560"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/coauthors?post=1560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}