{"id":9620,"date":"2019-07-19T16:13:58","date_gmt":"2019-07-19T08:13:58","guid":{"rendered":"https:\/\/nxtmag.tech\/?p=9620"},"modified":"2019-07-19T16:13:58","modified_gmt":"2019-07-19T08:13:58","slug":"managing-cybersecurity-risk-in-smart-buildings","status":"publish","type":"post","link":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/","title":{"rendered":"Managing Cybersecurity Risk in Smart Buildings"},"content":{"rendered":"<p>We live in an era of disruption that is constantly reshaped by global forces in the form of new technologies, digital innovations and fast-changing social norms. From augmented intelligence applications, surging Internet of Things (IoT) deployments to pervasive mobility, the lives we live today would scarcely be recognised by someone from just a few decades ago.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9622\" src=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks.jpg\" alt=\"Abstract art depicting Network of Cybersecurity\" width=\"900\" height=\"600\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks.jpg 900w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-300x200.jpg 300w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-768x512.jpg 768w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-696x464.jpg 696w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-630x420.jpg 630w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<h3><strong>The Rise of Smart Buildings<\/strong><\/h3>\n<p>Slowly, but surely, an evolution in <a href=\"https:\/\/nxtmag.tech\/2019\/06\/28\/the-evolution-of-smart-buildings\/\">smart buildings<\/a> is taking place as more people move to cities than ever before. New buildings are equipped with a host of digital-centric amenities and capabilities designed to offer greater conveniences than ever, while older facilities are similarly upgraded.<\/p>\n<p>The changes range from designs that allow them to be more user-friendly and energy efficient, to enhanced data-gathering capability that offers far better space management and data insights to reduce energy use. And smart buildings in the Asia Pacific are coming online at an extraordinary clip, in tandem with the rapid construction pace in the region.<\/p>\n<p>While there is no question that smarter buildings offer ample benefits, inherent to this opportunity are real security risks, writes Annick Villeneuve of Schneider Electric in a recent <a href=\"https:\/\/blog.se.com\/cyber-security\/2019\/05\/07\/real-estate-how-to-manage-cybersecurity-risk-in-smart-buildings\/\">blog post<\/a>. Far too often, new technologies are deployed without adequate consideration into how to protect them from increasingly sophisticated hackers and malware.<\/p>\n<h3><strong>Security Considerations<\/strong><\/h3>\n<p>The risks are obvious in hindsight. <a href=\"https:\/\/www.se.com\/sg\/en\/work\/products\/building-automation-and-control\/\">Building management systems<\/a> of yesteryear tend to have limited roles, typically revolving around core systems such as fire and safety, and air conditioning. On the other hand, demand for smarter buildings means that a smorgasbord of advanced systems ranging from access control systems, IP cameras, lighting systems and even door locks \u2013 among others \u2013 are being added to the mix.<\/p>\n<p>These systems are being hooked up to traditional IT networks for ease of management and uniformity. On the flip side, this prevalent practice places them a short network hop away from the Internet, potentially exposing them to takeover attempts by malicious parties.<\/p>\n<p>And for organisations mulling if they should reduce technology use to minimize risks, Josh Herrenkohl from Ernst &amp; Young <a href=\"https:\/\/www.ey.com\/en_gl\/real-estate-hospitality-construction\/eight-findings-prove-cybersecurity-is-a-concern-for-real-estate-companies\">says<\/a> that this won\u2019t work given the extensive digitalisation of businesses today. Instead, he notes that organisations would be better served with a \u201cwell-planned, all-encompassing cyber strategy\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9621\" src=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2.jpg\" alt=\"Hand operating the digital image of security padlock with gesture interface technology.\" width=\"900\" height=\"600\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2.jpg 900w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2-300x200.jpg 300w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2-768x512.jpg 768w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2-696x464.jpg 696w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2-630x420.jpg 630w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<h3><strong>Addressing the Topic<\/strong><\/h3>\n<p>So how can organisations ensure that their smart buildings are adequately defended against cybersecurity threats? \u201cLike many challenging issues, the first step in addressing these risks begins with a conversation,\u201d explained Villeneuve.<\/p>\n<p>Though getting the specialists who manage the building control system to talk with those in charge of IT security might be daunting, it represents a crucial first step that will eventually pay off. Among the topics they need to discuss are the steps to access and protect legacy \u201c<a href=\"https:\/\/www.se.com\/sg\/en\/download\/document\/998-2095-09-26-14BR0_EN\/\">Operational Technology<\/a>\u201d or OT systems, and how they might be <a href=\"https:\/\/www.se.com\/sg\/en\/product-range\/65214-ecostruxure%E2%84%A2-security-expert\/?subNodeId=10404636904en_SG\">bridged<\/a> through an IT Security Monitoring Zone for enhanced protection.<\/p>\n<p>Where external expertise might be desired, trained cybersecurity consulting specialists who are experienced in securing commercial buildings can be engaged to facilitate or lead these conversations, and to offer expert advice.<\/p>\n<p>For now, you can learn more about Schneider Electric\u2019s extensive range of Real Estate solutions <a href=\"https:\/\/www.se.com\/sg\/en\/work\/solutions\/for-business\/real-estate\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We live in an era of disruption that is constantly reshaped by global forces in the form of new technologies, digital innovations and fast-changing social norms. From augmented intelligence applications, surging Internet of Things (IoT) deployments to pervasive mobility, the lives we live today would scarcely be recognised by someone from just a few decades [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9621,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[19,523],"tags":[335,659],"class_list":{"0":"post-9620","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-guru","9":"tag-cybersecurity","10":"tag-schneider"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managing Cybersecurity Risk in Smart Buildings - NXT Malaysia<\/title>\n<meta name=\"description\" content=\"So how can organisations ensure that their smart buildings are defended and managing cybersecurity risks? Read this article by Schneider to learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_SG\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing Cybersecurity Risk in Smart Buildings - NXT Malaysia\" \/>\n<meta property=\"og:description\" content=\"So how can organisations ensure that their smart buildings are defended and managing cybersecurity risks? Read this article by Schneider to learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/\" \/>\n<meta property=\"og:site_name\" content=\"NXT Malaysia\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-19T08:13:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NXT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NXT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/\"},\"author\":{\"name\":\"NXT\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\"},\"headline\":\"Managing Cybersecurity Risk in Smart Buildings\",\"datePublished\":\"2019-07-19T08:13:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/\"},\"wordCount\":526,\"image\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/smart-buildings-managing-cybersecurity-risks-2.jpg\",\"keywords\":[\"cybersecurity\",\"schneider\"],\"articleSection\":[\"News\",\"Guru\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/\",\"name\":\"Managing Cybersecurity Risk in Smart Buildings - NXT Malaysia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/smart-buildings-managing-cybersecurity-risks-2.jpg\",\"datePublished\":\"2019-07-19T08:13:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\"},\"description\":\"So how can organisations ensure that their smart buildings are defended and managing cybersecurity risks? Read this article by Schneider to learn more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/smart-buildings-managing-cybersecurity-risks-2.jpg\",\"contentUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/smart-buildings-managing-cybersecurity-risks-2.jpg\",\"width\":900,\"height\":600,\"caption\":\"Hand operating the digital image of security padlock with gesture interface technology.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/07\\\/19\\\/managing-cybersecurity-risk-in-smart-buildings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nxtmag.tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing Cybersecurity Risk in Smart Buildings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#website\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/\",\"name\":\"NXT Malaysia\",\"description\":\"Gear, Gadget, Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\",\"name\":\"NXT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"caption\":\"NXT\"},\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/author\\\/lawrence\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managing Cybersecurity Risk in Smart Buildings - NXT Malaysia","description":"So how can organisations ensure that their smart buildings are defended and managing cybersecurity risks? Read this article by Schneider to learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/","og_locale":"en_US","og_type":"article","og_title":"Managing Cybersecurity Risk in Smart Buildings - NXT Malaysia","og_description":"So how can organisations ensure that their smart buildings are defended and managing cybersecurity risks? Read this article by Schneider to learn more.","og_url":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/","og_site_name":"NXT Malaysia","article_published_time":"2019-07-19T08:13:58+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2.jpg","type":"image\/jpeg"}],"author":"NXT","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NXT","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/#article","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/"},"author":{"name":"NXT","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"headline":"Managing Cybersecurity Risk in Smart Buildings","datePublished":"2019-07-19T08:13:58+00:00","mainEntityOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/"},"wordCount":526,"image":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2.jpg","keywords":["cybersecurity","schneider"],"articleSection":["News","Guru"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/","url":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/","name":"Managing Cybersecurity Risk in Smart Buildings - NXT Malaysia","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/#primaryimage"},"image":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2.jpg","datePublished":"2019-07-19T08:13:58+00:00","author":{"@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"description":"So how can organisations ensure that their smart buildings are defended and managing cybersecurity risks? Read this article by Schneider to learn more.","breadcrumb":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/#primaryimage","url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2.jpg","contentUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/07\/smart-buildings-managing-cybersecurity-risks-2.jpg","width":900,"height":600,"caption":"Hand operating the digital image of security padlock with gesture interface technology."},{"@type":"BreadcrumbList","@id":"https:\/\/nxtmag.tech\/my\/2019\/07\/19\/managing-cybersecurity-risk-in-smart-buildings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nxtmag.tech\/"},{"@type":"ListItem","position":2,"name":"Managing Cybersecurity Risk in Smart Buildings"}]},{"@type":"WebSite","@id":"https:\/\/nxtmag.tech\/my\/#website","url":"https:\/\/nxtmag.tech\/my\/","name":"NXT Malaysia","description":"Gear, Gadget, Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nxtmag.tech\/my\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852","name":"NXT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","caption":"NXT"},"url":"https:\/\/nxtmag.tech\/my\/author\/lawrence\/"}]}},"_links":{"self":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/9620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/comments?post=9620"}],"version-history":[{"count":1,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/9620\/revisions"}],"predecessor-version":[{"id":9623,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/9620\/revisions\/9623"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media\/9621"}],"wp:attachment":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media?parent=9620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/categories?post=9620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/tags?post=9620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}