{"id":77,"date":"2025-07-28T20:02:17","date_gmt":"2025-07-28T20:02:17","guid":{"rendered":"https:\/\/lthcybersecurity.com\/blog\/?p=77"},"modified":"2025-07-28T20:02:17","modified_gmt":"2025-07-28T20:02:17","slug":"protecting-indigenous-futures-the-role-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/lthcybersecurity.com\/blog\/protecting-indigenous-futures-the-role-of-cybersecurity\/","title":{"rendered":"Protecting Indigenous Futures: The Role Of Cybersecurity"},"content":{"rendered":"<p aria-level=\"1\"><span data-contrast=\"none\">Protecting Indigenous Futures: The Role Of Cybersecurity<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:80}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The digital presence of Indigenous people is increasing, in the form of language preservation applications, digital governance spaces, and digital Aboriginal archives. Such tools can lead to interconnection and autonomy.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2666557321000069#bib0041:~:text=Indigenous%20participants%20believed,%5B37%5D.\"><span data-contrast=\"none\">According to a study<\/span><\/a><span data-contrast=\"none\">, Indigenous participants viewed digital storytelling and PSA narratives as effective in building multiliteracies, Indigenous knowledge, and essential school\/work skills, while also enhancing their wellbeing and empowering their cultural identity.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">However, they also bring new risks.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Cyber threats make no differentiation between a state agency and a locally operated data server. Whether it is a phishing scam or ransomware, the Indigenous digital spaces are equally at risk and, in most cases, less secure.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">It is not merely compromised files. The consequences run even deeper when the Indigenous knowledge, records or identities are revealed or stolen, since it jeopardises sovereignty, trust, and cultural continuity.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">That\u2019s where cybersecurity comes in.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Sophisticated digital security may be more than breach prevention. It can enforce Indigenous data sovereignty, advocate self-governance, and guarantee that the rewards of technology do not come at the expense of protection.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This text explores why cybersecurity is becoming increasingly essential in safeguarding Indigenous futures and why it should not be taken lightly in today\u2019s world.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-contrast=\"none\">The Growing Threat to Indigenous Websites<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Aboriginal groups throughout Canada, including those in rural and remote areas, have made significant progress with digitalization over the last decade. A majority of First Nations now maintain functional <\/span><b><span data-contrast=\"none\">Indigenous websites<\/span><\/b><span data-contrast=\"none\"> that deliver crucial knowledge to their communities, act as a center of learning, and become an avenue of interaction. They are not merely information websites; they are business-critical websites that manage finances, procedures, and communications.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">However, with these sites becoming more useful, they\u2019ve also been prime targets for cyberattacks. First Nations band offices, which monitor financial management and act as an administrative unit of Indigenous communities, usually work with large amounts of financial data and confidential personal information.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Sadly, the majority of band websites and their resident servers are still at risk from cyberattacks because they use outdated software, lack encryption, or have limited IT knowledge. These vulnerabilities expose the citizens to numerous problems, such as data breaches, theft of finances, identity theft, and interference with essential community services.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">One of the foremost causes of this cyber-exposure is the lack of cybersecurity funds. The majority of the First Nations communities have no budget to incorporate advanced <\/span><b><span data-contrast=\"none\">cybersecurity<\/span><\/b><span data-contrast=\"none\"> measures, purchase new technologies or even employ skilled IT personnel.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www150.statcan.gc.ca\/n1\/daily-quotidien\/250117\/dq250117b-eng.htm\"><span data-contrast=\"none\">A study reported<\/span><\/a><span data-contrast=\"none\"> that approximately half of First Nations people (45%) living off reserve more than half of Inuit (54%), and and M\u00e9tis (44%) reported that it was challenging to meet their financial needs in terms of transportation, housing, food, clothing, and other necessary daily expenses.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Without specific funding for cybersecurity, the danger increases, and the communities continue to stay exposed.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-contrast=\"none\">Why Cybersecurity is Essential for Indigenous Organizations<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-79\" src=\"https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003449-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1707\" srcset=\"https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003449-scaled.jpg 2560w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003449-300x200.jpg 300w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003449-1024x683.jpg 1024w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003449-768x512.jpg 768w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003449-1536x1024.jpg 1536w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003449-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<p><span data-contrast=\"none\">Indigenous cybersecurity is not only about guarding data but about securing the autonomy and integrity of indigenous people in the tech-enhanced world.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Some of the main reasons why <\/span><a href=\"https:\/\/lthcybersecurity.com\/\"><b><span data-contrast=\"none\">cybersecurity for Indigenous organizations<\/span><\/b><\/a><span data-contrast=\"none\"> in Canada is a must are mentioned below:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol>\n<li aria-level=\"3\"><span data-contrast=\"none\"> Protection of Financial Data<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Band offices are susceptible to dealing with significant amounts of public money that comes from federal and provincial governments. Funds are directed into community development, building construction, schools, health care, among others. Cybercrime may lead to <\/span><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417421017164\"><span data-contrast=\"none\">financial theft<\/span><\/a><span data-contrast=\"none\">, diversion of funds, or interference with core operations. Effective cybersecurity shields financial transactions and information from illegitimate use.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol start=\"2\">\n<li aria-level=\"3\"><span data-contrast=\"none\"> Preserving Community Trust<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Websites and online platforms are usually the major lines of communication between band offices and citizens. Whether to disseminate critical information, administer health services, or distribute learning materials, such platforms are major sources of integrity and trust.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A successful cyberattack that breaches the integrity of such platforms can heavily destroy the bond between a band office and the involved community.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol start=\"3\">\n<li aria-level=\"3\"><span data-contrast=\"none\"> Protecting Personal Data<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In addition to financial information, band offices manage significant personal information, including health information, housing applications, and educational information. This type of information is much <\/span><a href=\"https:\/\/lthcybersecurity.com\/blog\/what-is-dark-web-monitoring-and-why-it-matters-for-saskatchewan-businesses\/\"><span data-contrast=\"none\">in demand by cybercriminals<\/span><\/a><span data-contrast=\"none\">, and its disclosure might result in identity theft or even human trafficking.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Outfitting the community with strong cybersecurity measures will protect the privacy of the residents and render it difficult for malicious actors to exploit personal information.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol start=\"4\">\n<li aria-level=\"3\"><span data-contrast=\"none\"> Preserving Cultural Heritage\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Indigenous communities are increasingly utilizing digital media as a means of transferring cultural heritage, language, and history to future generations. Cybersecurity is then of utmost importance in safeguarding such precious cultural heritage from theft or desecration. Preserving the digital infrastructure is, in a sense, keeping Indigenous identity alive in the contemporary world.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol start=\"5\">\n<li aria-level=\"3\"><span data-contrast=\"none\"> Ensuring Business Continuity:\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Aboriginal populations, like any organization, need business continuity. Whether making public health information available or funds for core services are passed on time, when major online platforms cannot work, it can have profound impacts. Cybersecurity is a part of business continuity planning that reduces the likelihood of website downtime or data loss as a result of a cyber attack.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-contrast=\"none\">Solutions: How Cybersecurity Can Safeguard Indigenous Futures<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.pexels.com\/photo\/portrait-of-three-men-in-traditional-native-american-clothes-playing-guitar-10003451\/\"><span data-contrast=\"none\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-78\" src=\"https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003451-scaled.jpg\" alt=\"\" width=\"2560\" height=\"1707\" srcset=\"https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003451-scaled.jpg 2560w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003451-300x200.jpg 300w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003451-1024x683.jpg 1024w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003451-768x512.jpg 768w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003451-1536x1024.jpg 1536w, https:\/\/lthcybersecurity.com\/blog\/wp-content\/uploads\/2025\/07\/pexels-sami-aksu-48867324-10003451-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/span><\/a><\/p>\n<ol>\n<li aria-level=\"3\"><span data-contrast=\"none\"> Government Support and Funding<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Both the federal and provincial governments should acknowledge that better security is required in terms of cybersecurity for Indigenous communities. Governments must offer specific investment in cybersecurity infrastructure and training to First Nations so they can develop resilient digital environments.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This assistance may involve funding, hacker-defensive courses, and collaborations with technology firms to enhance online security capacity.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol start=\"2\">\n<li aria-level=\"3\"><span data-contrast=\"none\"> Collaboration with Cybersecurity Experts\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Indigenous communities should <\/span><a href=\"https:\/\/lthcybersecurity.com\/blog\/cybersecurity-in-saskatchewan\/\"><span data-contrast=\"none\">collaborate with cybersecurity experts<\/span><\/a><span data-contrast=\"none\"> who can assist in defining risks, setting protective systems, and creating custom cybersecurity strategies.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">Such specialists should work closely with Indigenous organizations to make the identified solutions as culturally appropriate, accessible, and responsive to the unique needs of each group.<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol start=\"3\">\n<li aria-level=\"3\"><span data-contrast=\"none\"> Ongoing Cybersecurity Training and Education<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The constant education of staff on cybersecurity can help Indigenous organizations develop long-term cybersecurity resilience. This may include the provision of training services in areas such as data protection training, phishing awareness, and information handling of sensitive data.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">An effective culture of cybersecurity in the organization can largely mitigate the risk of cyberattacks.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol start=\"4\">\n<li aria-level=\"3\"><span data-contrast=\"none\"> Adopting Cybersecurity Frameworks and Standards<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Established cybersecurity frameworks, such as the <\/span><a href=\"https:\/\/www.researchgate.net\/publication\/368410151_CYBER_SECURITY_FRAMEWORK_SELECTION_COMPARISION_OF_NIST_AND_ISO27001\"><span data-contrast=\"none\">ISO\/IEC 27001 or the NIST Cybersecurity Framework<\/span><\/a><span data-contrast=\"none\">, may provide a solid basis for constructing a secure digital space. First Nations can consider implementing such frameworks to ensure the proper evaluation of their cybersecurity requirements and safeguard their digital assets.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol start=\"5\">\n<li aria-level=\"3\"><span data-contrast=\"none\"> Encryption and Regular Software Updates\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Among the most basic and effective measures for cybersecurity is keeping the latest security patches on all software and platforms. Moreover, sensitive data needs to be encrypted, both during transmission and at rest. Such simple measures largely minimize exposure points for hackers to attack.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-contrast=\"none\">Cybersecurity as a Path to Digital Sovereignty<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The future of the Indigenous people in Canada lies partially in their adaptation to the digital era. For the First Nations, this involves both adopting technology and securing their assets in the digital world.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The idea that cybersecurity is a defensive tool is a misconception; it is, in fact, the enabler of development, autonomy, and self-determination in the connected world. The investment in cybersecurity will help Indigenous organizations secure their financial resources, protect personal information, and preserve their culture.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Ultimately, cybersecurity is not only about mitigating cyberattacks on Indigenous people; it is about leveraging the power of the internet so that Indigenous people can self-determine their existence and prosper well into the future to the fullest.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Protecting Indigenous Futures: The Role Of Cybersecurity\u00a0 \u00a0 The digital presence of Indigenous people is increasing, in the form of language preservation applications, digital governance spaces, and digital Aboriginal archives. Such tools can lead to interconnection and autonomy.\u00a0 According to a study, Indigenous participants viewed digital storytelling and PSA narratives as effective in building multiliteracies, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":80,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-77","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-category-1"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/posts\/77","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=77"}],"version-history":[{"count":1,"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/posts\/77\/revisions"}],"predecessor-version":[{"id":81,"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/posts\/77\/revisions\/81"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/media\/80"}],"wp:attachment":[{"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=77"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=77"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lthcybersecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=77"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}