{"id":11227,"date":"2022-05-03T09:01:58","date_gmt":"2022-05-03T13:01:58","guid":{"rendered":"https:\/\/www.cscdbs.com\/blog\/?p=11227"},"modified":"2025-10-15T11:02:12","modified_gmt":"2025-10-15T15:02:12","slug":"securing-weak-links-in-supply-chain-attacks","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/","title":{"rendered":"Securing Weak Links in Supply Chain Attacks"},"content":{"rendered":"\n<p>We\u2019ve all heard the term, \u201cyou\u2019re only as strong as your weakest link.\u201d Whether talking about a tug of war on the playground, a sports team, or a business, this rings as true as ever.<\/p>\n\n\n\n<p>Every business relies on a series of suppliers and vendors\u2014be it the dairy farm supplying milk to the multinational food manufacturer, or the payment systems that retailers use. These links form supply chains that every business, large and small, deal with. There is simply no way around it. With an increasingly complex series of vendors and workflows comes an increased risk.<\/p>\n\n\n\n<p><strong>What is a supply chain attack?<\/strong><\/p>\n\n\n\n<p>A supply chain attack is a cyber attack that occurs when a threat actor compromises your system through a third-party partner that has access to your systems and data. Typically, the vendor with the weakest cyber security is targeted.<\/p>\n\n\n\n<p>A survey by <a href=\"https:\/\/anchore.com\/blog\/2022-security-trends-software-supply-chain-survey\/\">Anchore<\/a> found that 3 out of 5 companies were exposed to a supply chain attack in 2021 due to the global nature of business and the amount of different technology and vendors used.<\/p>\n\n\n\n<p><strong>An attack on your provider affects you too<\/strong><\/p>\n\n\n\n<p>The last two years have seen a few notable supply chain attacks. In late 2020, SolarWinds, an IT software provider to many U.S. federal government agencies and private sector companies, experienced a security breach. Its IT inventory management product was laced with malware which led to a further compromise of at least 18,000 of its clients who found signs of the malware in their systems.<\/p>\n\n\n\n<p>Less than six months later, in May 2021, a major U.S. oil company, Colonial Pipeline, suffered a ransomware cyber attack; bad actors demanded millions in Bitcoin to restore the computerized systems that were compromised by the hackers. It was reported that an employee\u2019s virtual private network (VPN) account that didn\u2019t have multi-factor authentication had been breached, allowing the attackers access to the company\u2019s network. The attackers made away with 100 GBs of data, and encrypted IT systems in exchange for ransom. Fearing an attack on its operations technology that controls it fuel distribution, the company shut down its entire pipeline system. The company transports about 2.5 million barrels of fuel daily, and this sudden shutdown not only drastically reduced supplies, but news of it resulted in panic buying that exacerbated fuel shortages. Many sectors rely on fuel and the impact of this attack was unprecedented.<\/p>\n\n\n\n<p>And if that wasn\u2019t enough, in October 2021, Schreiber Foods, the U.S.\u2019 largest cream cheese manufacturer, was disrupted by a ransomware attack that impacted its ability to \u201creceive raw materials, ship product, and produce product.\u201d This is a perfect example of the impact of supply chain events due to timing\u2014it occurred at the height of the cream cheese season. On top of existing pandemic-driven challenges in manpower and logistics, the attack resulted in price spikes in cream cheese due to low production supply (and short shelf life of the cream cheese), and also has farther-reaching impact on retail and food service sectors.<\/p>\n\n\n\n<p><strong>Domain security as your first line of defense<\/strong><\/p>\n\n\n\n<p>As the above cases illustrate, common in the attacks were breaches due to malware and ransomware. Research shows that phishing and related malware attacks most commonly occur from a compromised or hijacked legitimate domain name, a maliciously registered and confusingly similar domain name, or via email spoofing. A cleverly social-engineered domain name could trick even the most discerning user into unwittingly clicking on a link that inadvertently installs malware or ransomware. By employing domain security controls to prevent the abuse of the domain name and domain name system (DNS), companies can reduce the risks of such breaches.<\/p>\n\n\n\n<p><strong><em>Domain security is a critical component to help mitigate cyberattacks in the early stages\u2014your first line of defense in your organization\u2019s Zero Trust model.<\/em><\/strong><\/p>\n\n\n\n<p><strong>Preventing a supply chain attack<\/strong><\/p>\n\n\n\n<p>All industries are susceptible to a supply chain attack, and there certainly are measures companies can take to mitigate the threat.<\/p>\n\n\n\n<ul class=\"wp-block-list\" style=\"font-size:18px\">\n<li><strong>Know your vendors.<\/strong> First and foremost, audit your supply chain vendor. Choose your vendors carefully, and only use those that are enterprise-class with robust security practices and policies.<\/li>\n\n\n\n<li><strong>Control access.<\/strong> Keep track of access to key third-party applications, as well as limit network access to third-party tools wherever possible. Understand the subcontractors your third-party vendors have that could potentially introduce a fourth-party risk.<\/li>\n\n\n\n<li><strong>Follow government advisories.<\/strong> The scale and severity of the recent incidents have prompted many government agencies and security firms to release frameworks and best practices to defend against such attacks. Follow the guidelines and ensure your vendors follow them too.<\/li>\n\n\n\n<li><strong>Train your employees.<\/strong> According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks\u2014including ransomware and business email compromise (BEC)\u2014begin with phishing. Train employees on security awareness to reduce this risk.<\/li>\n\n\n\n<li><strong>Enhance your domain security posture.<\/strong> Use a <a href=\"https:\/\/www.cscglobal.com\/cscglobal\/pdfs\/DBS\/Domain-Security-Checklist_EN.pdf\">Domain Security Checklist<\/a> based on a defense-in-depth approach to enhance your security posture.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve all heard the term, \u201cyou\u2019re only as strong as your weakest link.\u201d Whether talking about a tug of war on the playground, a sports team, or a business, this rings as true as ever. Every business relies on a series of suppliers and vendors\u2014be it the dairy farm supplying milk to the multinational food [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":10473,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[548,521],"tags":[],"class_list":["post-11227","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing Weak Links in Supply Chain Attacks | CSC<\/title>\n<meta name=\"description\" content=\"We\u2019ve all heard the term, \u201cyou\u2019re only as strong as your weakest link.\u201d Whether talking about a tug of war on the playground, a sports team, or a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Weak Links in Supply Chain Attacks | CSC\" \/>\n<meta property=\"og:description\" content=\"We\u2019ve all heard the term, \u201cyou\u2019re only as strong as your weakest link.\u201d Whether talking about a tug of war on the playground, a sports team, or a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-03T13:01:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-15T15:02:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55052.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arielle Wallace\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arielle Wallace\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/\"},\"author\":{\"name\":\"Arielle Wallace\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\"},\"headline\":\"Securing Weak Links in Supply Chain Attacks\",\"datePublished\":\"2022-05-03T13:01:58+00:00\",\"dateModified\":\"2025-10-15T15:02:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/\"},\"wordCount\":819,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55052.jpg\",\"articleSection\":[\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/\",\"name\":\"Securing Weak Links in Supply Chain Attacks | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55052.jpg\",\"datePublished\":\"2022-05-03T13:01:58+00:00\",\"dateModified\":\"2025-10-15T15:02:12+00:00\",\"description\":\"We\u2019ve all heard the term, \u201cyou\u2019re only as strong as your weakest link.\u201d Whether talking about a tug of war on the playground, a sports team, or a\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55052.jpg\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2021\\\/11\\\/cscdbsblog_1000x55052.jpg\",\"width\":1000,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/securing-weak-links-in-supply-chain-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Weak Links in Supply Chain Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/9f28d3ffdbe4e71bc030903c8037afe8\",\"name\":\"Arielle Wallace\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Weak Links in Supply Chain Attacks | CSC","description":"We\u2019ve all heard the term, \u201cyou\u2019re only as strong as your weakest link.\u201d Whether talking about a tug of war on the playground, a sports team, or a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Securing Weak Links in Supply Chain Attacks | CSC","og_description":"We\u2019ve all heard the term, \u201cyou\u2019re only as strong as your weakest link.\u201d Whether talking about a tug of war on the playground, a sports team, or a","og_url":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2022-05-03T13:01:58+00:00","article_modified_time":"2025-10-15T15:02:12+00:00","og_image":[{"width":1000,"height":550,"url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55052.jpg","type":"image\/jpeg"}],"author":"Arielle Wallace","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Arielle Wallace","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/"},"author":{"name":"Arielle Wallace","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8"},"headline":"Securing Weak Links in Supply Chain Attacks","datePublished":"2022-05-03T13:01:58+00:00","dateModified":"2025-10-15T15:02:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/"},"wordCount":819,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55052.jpg","articleSection":["Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/","url":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/","name":"Securing Weak Links in Supply Chain Attacks | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55052.jpg","datePublished":"2022-05-03T13:01:58+00:00","dateModified":"2025-10-15T15:02:12+00:00","description":"We\u2019ve all heard the term, \u201cyou\u2019re only as strong as your weakest link.\u201d Whether talking about a tug of war on the playground, a sports team, or a","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/#primaryimage","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55052.jpg","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2021\/11\/cscdbsblog_1000x55052.jpg","width":1000,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/securing-weak-links-in-supply-chain-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Weak Links in Supply Chain Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/9f28d3ffdbe4e71bc030903c8037afe8","name":"Arielle Wallace"}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=11227"}],"version-history":[{"count":5,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11227\/revisions"}],"predecessor-version":[{"id":12924,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/11227\/revisions\/12924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media\/10473"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=11227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=11227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=11227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}