{"id":2394,"date":"2017-10-02T21:46:03","date_gmt":"2017-10-02T21:46:03","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2394"},"modified":"2020-05-06T10:27:56","modified_gmt":"2020-05-06T17:27:56","slug":"why-are-financial-institutions-a-sweet-target-for-hackers-let-s","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/","title":{"rendered":"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk"},"content":{"rendered":"<p>The Equifax breach got me thinking about the whole subject of change control and change risk.\u00a0 What makes this event significant is that Equifax suffered an IT related issue caused by not doing something; in a word: delaying an upgrade.<\/p>\n<h3 id=\"toc-hId-1154199953\">If they can\u2019t manage their risk, how can they manage ours?<\/h3>\n<p>I have spent most of my IT career (&gt; 30 years) working in or for large financial institutions.\u00a0 Lately, two of the UK banks I have worked with have been in the news for customer affecting system failures that have followed upgrades or system configuration changes. This has made already conservative cultures even more risk-averse.\u00a0\u00a0<strong>What outsiders see are companies whose Unique Selling Proposition\u00a0<\/strong><strong>and role in the marketplace are to manage others&#8217; risk, but are unable to manage their own IT risk.\u00a0<\/strong>\u00a0In financial planning the \u201cdo nothing option\u201d carries with it a risk weighting. How much money will I lose if I don\u2019t switch my investments?\u00a0\u00a0<strong>In IT change control systems, the \u201cdo nothing\u201d status quo has no measured risk.\u00a0<\/strong>\u00a0This might have been true for systems that were isolated.\u00a0 Now that all IT, even that deep in the bowels of a bank, is exposed in some way to the internet or outside forces, this position needs to be revised.<\/p>\n<h3 id=\"toc-hId-2041703634\">You can\u2019t wait till the weekend to apply changes<\/h3>\n<p>The increased security threats require constant patching, resulting in more frequent changes.\u00a0 There are further change control procedures and mindset changes required here.\u00a0 Waiting until the weekend to apply changes can and will introduce risk, and will limit the time available for competing systems to get upgraded, causing queuing and delays. The public is becoming more aware of the necessity to patch. Their appreciation of an online service will not be compromised by a short blip in service while a system is patched, but will certainly be affected by their personal data being stolen. The focus for change control needs to be of the total effect that patching a system has on the end user.\u00a0 In the past, the measure has been the outage while systems restart and not the benefits of knowing that your personal data is safe and sound. \u00a0This does not detract from the hard work that an IT professional puts into designing robust, resilient IT systems.\u00a0 It still behooves IT professionals to carry out changes with agreed published steps, in a controlled manner with fixed blackout points.<\/p>\n<h3 id=\"toc-hId--1365759981\">You can\u2019t afford to have change control to slow you down<\/h3>\n<p>During my IT career, I have seen change control systems start with a simple handwritten one side of\u00a0an A4 sized paper and then move to the all-encompassing asset management change scheduling apps that we see today.\u00a0 I have seen the way change policies are written and implemented. I have seen regulation, in particular, financial regulators come into this space.\u00a0 Initially, they were concerned that a change system adequately promoted and protected disaster recovery plans. This was in response to 9\/11.\u00a0 Later, as IT systems became pervasive, regulatory concern expanded into all aspects of change control. The goal here was to make sure that a financial institution could not fail because of a change.\u00a0 The rise of social media to make individual complaints more visible and customers more aware has upped the profile of IT incidents.\u00a0 Together these forces are a drag on change.\u00a0 They effectively slow down the rate of change possible in a large organization while not actually reducing risk in the overall IT system.<\/p>\n<h3 id=\"toc-hId--478256300\">Good governance should triumph over change control<\/h3>\n<p>Given what has happened at Equifax, it now behooves both the financial institutions themselves and their regulators to look at the policies they set.\u00a0 They need to encourage and enable a change process and policy that does consider the risk of not applying a patch. They need to prioritize and report on security patch status so that the change system is there to enable change, not to prevent it.\u00a0 They need constantly to review policy decisions on when changes can take place; the concept of \u201cout of hours\u201d has changed over time.\u00a0 They need to review the policy with respect to the different systems and protocols. I have seen changes circumscribed to a particular technology because of a specific issue with it. When the IT staff responsible for the technology fix this issue, the change system doesn\u2019t recognize this fix and continues to limit changes to this system based on the original shortcoming\u2014in effect shutting the stable door after the horse has bolted, been recaptured and put in a new stable.\u00a0 Change needs to be controlled, but not at the expense of good governance and protection of customer data.<\/p>\n<p>We in IT are responsible for the safekeeping of personal data.\u00a0 We need to proactively be making the necessary procedural and mindset changes to enable this, not merely react based on customer complaints and lawsuits. Customers are much more tech-savvy and will be able to see the real effect on their data if they put their trust in financial institutions that can\u2019t look after it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Equifax breach got me thinking about the whole subject of change control and change risk.\u00a0 What makes this event significant is that Equifax suffered an IT related issue caused by not doing something; in a word: delaying an upgrade. If they can\u2019t manage their risk, how can they manage ours? I have spent most [&hellip;]<\/p>\n","protected":false},"author":155,"featured_media":2372,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[15],"class_list":{"0":"post-2394","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk<\/title>\n<meta name=\"description\" content=\"The Equifax breach got me thinking about the whole subject of change control and change risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk\" \/>\n<meta property=\"og:description\" content=\"The Equifax breach got me thinking about the whole subject of change control and change risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-02T21:46:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anna Wotherspoon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anna Wotherspoon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/\"},\"author\":{\"name\":\"Anna Wotherspoon\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c061069090f9b6e7c1149aeeea5dd72\"},\"headline\":\"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk\",\"datePublished\":\"2017-10-02T21:46:03+00:00\",\"dateModified\":\"2020-05-06T17:27:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/\"},\"wordCount\":862,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/typing-keyboard.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/\",\"name\":\"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/typing-keyboard.jpg\",\"datePublished\":\"2017-10-02T21:46:03+00:00\",\"dateModified\":\"2020-05-06T17:27:56+00:00\",\"description\":\"The Equifax breach got me thinking about the whole subject of change control and change risk.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/typing-keyboard.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/typing-keyboard.jpg\",\"width\":725,\"height\":483,\"caption\":\"Computer crime concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c061069090f9b6e7c1149aeeea5dd72\",\"name\":\"Anna Wotherspoon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/54f02bbee0710f9fceaaea960d4d2e715f7bde645a23968cc426bcb75829eead?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/54f02bbee0710f9fceaaea960d4d2e715f7bde645a23968cc426bcb75829eead?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/54f02bbee0710f9fceaaea960d4d2e715f7bde645a23968cc426bcb75829eead?s=96&d=blank&r=g\",\"caption\":\"Anna Wotherspoon\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/anna-wotherspoon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk","description":"The Equifax breach got me thinking about the whole subject of change control and change risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/","og_locale":"en_US","og_type":"article","og_title":"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk","og_description":"The Equifax breach got me thinking about the whole subject of change control and change risk.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/","og_site_name":"Infoblox Blog","article_published_time":"2017-10-02T21:46:03+00:00","article_modified_time":"2020-05-06T17:27:56+00:00","og_image":[{"width":725,"height":483,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","type":"image\/jpeg"}],"author":"Anna Wotherspoon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anna Wotherspoon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/"},"author":{"name":"Anna Wotherspoon","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/7c061069090f9b6e7c1149aeeea5dd72"},"headline":"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk","datePublished":"2017-10-02T21:46:03+00:00","dateModified":"2020-05-06T17:27:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/"},"wordCount":862,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","keywords":["Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/","url":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/","name":"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","datePublished":"2017-10-02T21:46:03+00:00","dateModified":"2020-05-06T17:27:56+00:00","description":"The Equifax breach got me thinking about the whole subject of change control and change risk.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/typing-keyboard.jpg","width":725,"height":483,"caption":"Computer crime concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/why-are-financial-institutions-a-sweet-target-for-hackers-let-s\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Why Are Financial Institutions a Sweet Target for Hackers? \u2013 Let\u2019s Really Talk About Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/7c061069090f9b6e7c1149aeeea5dd72","name":"Anna Wotherspoon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/54f02bbee0710f9fceaaea960d4d2e715f7bde645a23968cc426bcb75829eead?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/54f02bbee0710f9fceaaea960d4d2e715f7bde645a23968cc426bcb75829eead?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/54f02bbee0710f9fceaaea960d4d2e715f7bde645a23968cc426bcb75829eead?s=96&d=blank&r=g","caption":"Anna Wotherspoon"},"url":"https:\/\/www.infoblox.com\/blog\/author\/anna-wotherspoon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2394"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2394\/revisions"}],"predecessor-version":[{"id":2395,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2394\/revisions\/2395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2372"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}