{"id":9983,"date":"2019-08-16T15:21:05","date_gmt":"2019-08-16T07:21:05","guid":{"rendered":"https:\/\/nxtmag.tech\/?p=9983"},"modified":"2019-08-16T15:21:05","modified_gmt":"2019-08-16T07:21:05","slug":"understanding-cybersecurity-in-smart-buildings","status":"publish","type":"post","link":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/","title":{"rendered":"Understanding Cybersecurity in Smart Buildings"},"content":{"rendered":"<p>Around the world, smart buildings are gaining momentum due to a confluence of factors that include technological innovations, pervasive connectivity, and a greater focus on comfort and environmental friendliness.<\/p>\n<h3><strong>What is a Smart Building?<\/strong><\/h3>\n<p>Envisioned to change the way we live and work, <a href=\"https:\/\/nxtmag.tech\/2019\/06\/28\/the-evolution-of-smart-buildings\/\">smart buildings<\/a> essentially revolve around the use of technology to enhance efficiency and foster the well-being of their occupants. Where there is no actual definition of what constitutes a smart building, much has been written about their capabilities.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9984\" src=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2.jpg\" alt=\"Cybersecurity in Smart Buildings\" width=\"900\" height=\"600\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2.jpg 900w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2-300x200.jpg 300w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2-768x512.jpg 768w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2-696x464.jpg 696w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2-630x420.jpg 630w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<p>For instance, standalone systems can be connected via a common network that offers easier facilities management and more efficient utilisation. Equipped with a variety of sensors, a smart building could hence gather and track information about the structure&#8217;s energy usage and performance, ensuring optimal cooling and ventilation.<\/p>\n<p>The vast amount of data can also be leveraged to find signs of impending system failures or problems, allowing maintenance teams to stay one step ahead of an interrupt in essential services.<\/p>\n<p>Elsewhere, occupants entering a meeting room could have the environment automatically tailored to their preference. And instead of wasting time by calling a colleague to check their whereabouts, how about launching an app to quickly find them on a map of the building, or to find an available hot desk to work from? Smart office technology is becoming increasingly accessible through service providers like Schneider Electric, which offer <a href=\"https:\/\/www.se.com\/sg\/en\/work\/services\/field-services\/building-services\/workplace-advisor-smart-offices.jsp\">digital services for smart offices<\/a>.<\/p>\n<h3><strong>A Security Divide<\/strong><\/h3>\n<p>Yet even as buildings become more complex and the number of IoT devices and building systems wired to the cloud increase exponentially, scant attention is being paid to potential cybersecurity challenges. Indeed, buildings systems today often fall short of effectively managing any potential cyber intrusion, says Ram Venkat of Schneider Electric in a <a href=\"https:\/\/blog.se.com\/building-management\/2019\/05\/30\/understanding-cybersecurity-in-smart-buildings\/\">blog post<\/a>.<\/p>\n<p>According to Venkat, this stems from the inherent disconnect between the groups managing Information Technology (IT) systems and those tasked with taking charge of Operational Technology (OT). The former pertains to traditional IT systems, while the latter includes building management systems (BMS) which are deployed to manage building facilities.<\/p>\n<p>As you might expect, the BMS is not traditionally connected to the Internet and are hence secured more through obscurity and obscure protocols. With buildings increasingly being wired up to the Internet and the growing of hacker communities specialising in cyberattacks against smart buildings, it is imperative that these systems are secured.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9985\" src=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings.jpg\" alt=\"Cybersecurity in Smart Buildings\" width=\"900\" height=\"601\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings.jpg 900w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-300x200.jpg 300w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-768x513.jpg 768w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-696x465.jpg 696w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-629x420.jpg 629w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/p>\n<h3><strong>The Secure Smart Building<\/strong><\/h3>\n<p>While securing smart buildings is easier said than done, there are four key strategies that organisations can adopt to create a secure and operational smart building. For a start, they need to access, identify and protect legacy OT building control systems, ensuring that they are protected behind firewalls and not otherwise directly exposed to the Internet.<\/p>\n<p>When it comes to acquiring IoT devices, it is imperative that they go with vendors that follow a secure development lifecycle approach, and where security is incorporated at every stage of development, such as with Schneider Electric\u2019s <a href=\"https:\/\/www.se.com\/sg\/en\/product-range\/62111-ecostruxure%E2%84%A2-building-operation\/?parent-category-id=1200&amp;parent-subcategory-id=1210&amp;filter=business-2-building-automation-and-control\">EcoStruxure for buildings<\/a>.<\/p>\n<p>Finally, despite the temptation to intermingle OT and IT infrastructure, smart building owners should instead implement a system architecture that properly segregates their OT building control system. This should be bridged through a security monitoring zone that is actively monitored by relevant cybersecurity experts on the IT team.<\/p>\n<p>You can learn more about cybersecurity for smart buildings from Schneider Electric <a href=\"https:\/\/www.se.com\/sg\/en\/work\/solutions\/cybersecurity\/building-cybersecurity.jsp\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Around the world, smart buildings are gaining momentum due to a confluence of factors that include technological innovations, pervasive connectivity, and a greater focus on comfort and environmental friendliness. What is a Smart Building? Envisioned to change the way we live and work, smart buildings essentially revolve around the use of technology to enhance efficiency [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9984,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[19],"tags":[335,659,739],"class_list":{"0":"post-9983","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-cybersecurity","9":"tag-schneider","10":"tag-smart-buildings"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding Cybersecurity in Smart Buildings - NXT Malaysia<\/title>\n<meta name=\"description\" content=\"Around the world, smart buildings are gaining momentum due to a confluence of factors. How do you enhance cybersecurity in these buildings?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_SG\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Cybersecurity in Smart Buildings - NXT Malaysia\" \/>\n<meta property=\"og:description\" content=\"Around the world, smart buildings are gaining momentum due to a confluence of factors. How do you enhance cybersecurity in these buildings?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/\" \/>\n<meta property=\"og:site_name\" content=\"NXT Malaysia\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-16T07:21:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NXT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NXT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/\"},\"author\":{\"name\":\"NXT\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\"},\"headline\":\"Understanding Cybersecurity in Smart Buildings\",\"datePublished\":\"2019-08-16T07:21:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/\"},\"wordCount\":560,\"image\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cybersecurity-smart-buildings-2.jpg\",\"keywords\":[\"cybersecurity\",\"schneider\",\"smart buildings\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/\",\"name\":\"Understanding Cybersecurity in Smart Buildings - NXT Malaysia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cybersecurity-smart-buildings-2.jpg\",\"datePublished\":\"2019-08-16T07:21:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\"},\"description\":\"Around the world, smart buildings are gaining momentum due to a confluence of factors. How do you enhance cybersecurity in these buildings?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cybersecurity-smart-buildings-2.jpg\",\"contentUrl\":\"https:\\\/\\\/nxtmag.tech\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/cybersecurity-smart-buildings-2.jpg\",\"width\":900,\"height\":600,\"caption\":\"Cybersecurity in Smart Buildings\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/2019\\\/08\\\/16\\\/understanding-cybersecurity-in-smart-buildings\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nxtmag.tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Cybersecurity in Smart Buildings\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#website\",\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/\",\"name\":\"NXT Malaysia\",\"description\":\"Gear, Gadget, Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/#\\\/schema\\\/person\\\/c426122b1dd58a57f52a773b80de3852\",\"name\":\"NXT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"caption\":\"NXT\"},\"url\":\"https:\\\/\\\/nxtmag.tech\\\/my\\\/author\\\/lawrence\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Cybersecurity in Smart Buildings - NXT Malaysia","description":"Around the world, smart buildings are gaining momentum due to a confluence of factors. How do you enhance cybersecurity in these buildings?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Cybersecurity in Smart Buildings - NXT Malaysia","og_description":"Around the world, smart buildings are gaining momentum due to a confluence of factors. How do you enhance cybersecurity in these buildings?","og_url":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/","og_site_name":"NXT Malaysia","article_published_time":"2019-08-16T07:21:05+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2.jpg","type":"image\/jpeg"}],"author":"NXT","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NXT","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/#article","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/"},"author":{"name":"NXT","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"headline":"Understanding Cybersecurity in Smart Buildings","datePublished":"2019-08-16T07:21:05+00:00","mainEntityOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/"},"wordCount":560,"image":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2.jpg","keywords":["cybersecurity","schneider","smart buildings"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/","url":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/","name":"Understanding Cybersecurity in Smart Buildings - NXT Malaysia","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/#primaryimage"},"image":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2.jpg","datePublished":"2019-08-16T07:21:05+00:00","author":{"@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"description":"Around the world, smart buildings are gaining momentum due to a confluence of factors. How do you enhance cybersecurity in these buildings?","breadcrumb":{"@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/#primaryimage","url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2.jpg","contentUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2019\/08\/cybersecurity-smart-buildings-2.jpg","width":900,"height":600,"caption":"Cybersecurity in Smart Buildings"},{"@type":"BreadcrumbList","@id":"https:\/\/nxtmag.tech\/my\/2019\/08\/16\/understanding-cybersecurity-in-smart-buildings\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nxtmag.tech\/"},{"@type":"ListItem","position":2,"name":"Understanding Cybersecurity in Smart Buildings"}]},{"@type":"WebSite","@id":"https:\/\/nxtmag.tech\/my\/#website","url":"https:\/\/nxtmag.tech\/my\/","name":"NXT Malaysia","description":"Gear, Gadget, Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nxtmag.tech\/my\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852","name":"NXT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","caption":"NXT"},"url":"https:\/\/nxtmag.tech\/my\/author\/lawrence\/"}]}},"_links":{"self":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/9983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/comments?post=9983"}],"version-history":[{"count":1,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/9983\/revisions"}],"predecessor-version":[{"id":9986,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/9983\/revisions\/9986"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media\/9984"}],"wp:attachment":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media?parent=9983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/categories?post=9983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/tags?post=9983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}