{"id":9497,"date":"2018-10-24T10:57:17","date_gmt":"2018-10-24T09:57:17","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=9497"},"modified":"2018-10-25T11:46:12","modified_gmt":"2018-10-25T10:46:12","slug":"industrial-control-systems","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/","title":{"rendered":"Industrial control systems are \u2018soft targets\u2019"},"content":{"rendered":"<p>CyberX, the IIoT and industrial control system (ICS) security company, today announced the availability of its 2019 <span class=\"highlight highlight-blue\"><a href=\"https:\/\/cyberx-labs.com\" target=\"_blank\" rel=\"noopener\"><em>Global ICS &amp; IIoT Risk Report<\/em><\/a><\/span>.<\/p>\n<p>The data shows major security gaps remain in key areas such as plain-text passwords, direct connections to the internet, and weak anti-virus protections.<\/p>\n<p>Although the prevalence of Windows XP and other legacy Windows systems has decreased year-over-year \u2014 driven top-down by management in the aftermath of NotPetya\u2019s financial damage \u2014 CyberX is still finding unpatchable Windows systems in slightly\u00a0more than half of all industrial sites.<br \/>\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-7565662001938327\" data-ad-slot=\"7585079586\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><br \/>\nUnlike questionnaire-based surveys, the CyberX report is based on analysing real-world traffic from production ICS networks, making it a more accurate representation of the current state of ICS security.<\/p>\n<p>Now in its second year, the report is based on data captured over the past 12 months from more than 850 production ICS networks across six continents and all industrial sectors including energy and utilities, manufacturing, pharmaceuticals, chemicals, and oil and gas.<\/p>\n<figure id=\"attachment_9501\" aria-describedby=\"caption-attachment-9501\" style=\"width: 300px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9501 size-medium\" src=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report--300x220.jpg\" alt=\"Industrial control systems are \u2018soft targets\u2019\" width=\"300\" height=\"220\" srcset=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report--300x220.jpg 300w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report--768x563.jpg 768w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report--1024x750.jpg 1024w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report--800x586.jpg 800w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg 1752w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-9501\" class=\"wp-caption-text\">Top data points from CyberX Global ICS &amp; IIoT Risk Report<\/figcaption><\/figure>\n<p>According to\u00a0Andy Bochman, senior grid strategist for national and homeland security at the Idaho National Laboratory (INL) and a nationally recognized cybersecurity expert:\u00a0\u201cIf you are in critical infrastructure you should plan to be targeted. And if you\u2019re targeted, you will be compromised. It\u2019s that simple.\u201d<\/p>\n<p>But that doesn\u2019t mean nothing can be done. Ruthless prioritisation is key.<\/p>\n<p>Many problems exist, but not all of them need to be solved at once.<\/p>\n<p>In the report, CyberX lays out a series of eight steps towards protecting an organisation\u2019s most essential assets and processes. These include: continuous ICS network monitoring to immediately spot attempts to exploit unpatched systems before attackers can do any damage; threat modelling to prioritise mitigation of the highest consequence attack vectors; and more granular network segmentation.<\/p>\n<figure id=\"attachment_9500\" aria-describedby=\"caption-attachment-9500\" style=\"width: 290px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/CyberX-Risk-Report-Image.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-9500\" src=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/CyberX-Risk-Report-Image-290x300.jpg\" alt=\"\" width=\"290\" height=\"300\" srcset=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/CyberX-Risk-Report-Image-290x300.jpg 290w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/CyberX-Risk-Report-Image.jpg 474w\" sizes=\"auto, (max-width: 290px) 100vw, 290px\" \/><\/a><figcaption id=\"caption-attachment-9500\" class=\"wp-caption-text\">CyberX&#8217;s Global ICS &amp; IIoT Risk Report is based on traffic captured over the past 12 months from more than 850 production ICS networks, across six continents and all industrial sectors including energy and utilities, manufacturing, pharmaceuticals, chemicals, and oil &amp; gas<\/figcaption><\/figure>\n<p><strong>Key Findings<\/strong><\/p>\n<p><strong>* Hiding in plain sight<\/strong>: 69% of industrial sites have plain text passwords traversing the network. Lack of encryption in legacy protocols like SNMP and FTP exposes sensitive credentials, making cyber-reconnaissance and subsequent compromise relatively easy.<\/p>\n<p><strong>The air-gap \u2014 still a myth:<\/strong> 40% of sites have at least one direct connection to the public internet. Whether for convenience or inattention, many industrial networks continue to be connected to the public internet.<\/p>\n<p>With digitisation as a key business driver, operational technology (OT) networks are now also increasingly connected to corporate IT networks, providing additional digital pathways for attackers.<\/p>\n<p><strong>*Anti-anti-virus:<\/strong> 57% are still not running any anti-virus protections that update signatures automatically. Anti-virus programs are still a fundamental defence against malware, but signatures change daily, and the lack of automated updates makes AV programs largely ineffective.<\/p>\n<p><strong>* Broken Windows:<\/strong> 53% of sites have outdated Windows systems like XP. These systems no longer receive security patches from Microsoft, but with NotPetya delivering C-level attention to the issue for the first time, we saw a marked improvement this year \u2014 from 3 out of 4 sites with legacy Windows systems in 2017 to 53% in this year\u2019s report.<\/p>\n<p><strong>* Indecent exposure:<\/strong> 16% have at least one Wireless Access Point\u00a0(WAP). Misconfigured WAPs can be accessed by unauthorised laptops and mobile devices. What\u2019s more, sophisticated malware such as VPNFilter target access points such as routers and VPN gateways, enabling attackers to capture MODBUS traffic, perform network mapping, destroy router firmware, and launch attacks on OT endpoints. This means that routers should also be inventoried and patched to prevent these attacks.<\/p>\n<p>&#8220;We\u2019re not here to create FUD, but we think it\u2019s important for business leaders to have a data-driven view of ICS risk so they can ask the right questions,\u201d said Dan Shugrue, senior director of industrial cybersecurity for CyberX. \u201cWe\u2019re definitely making progress in reducing ICS risk, but we have a long way to\u00a0go. Reducing ICS risk is a journey \u2014 most of these ICS networks were designed decades ago, long before cybersecurity was a key design priority.\u201d<\/p>\n<p>CyberX delivers a industrial cybersecurity platform built by blue-team military cyber-experts with nation-state expertise defending critical infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CyberX, the IIoT and industrial control system (ICS) security company, today announced the availability of its 2019 Global ICS &amp; IIoT Risk Report. The data shows major security gaps remain in key areas such as plain-text passwords, direct connections to the internet, and weak anti-virus protections. Although the prevalence of Windows XP and other legacy &hellip;<\/p>\n","protected":false},"author":1,"featured_media":9501,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[395,5149,217,162,5150,5151,861,161,498,2361],"class_list":["post-9497","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-news-views-and-opinion","tag-chemicals","tag-cyberx","tag-energy","tag-gas","tag-global-ics-iiot-risk-report","tag-industrial-control-networks","tag-manufacturing","tag-oil","tag-pharmaceuticals","tag-utilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industrial control systems are \u2018soft targets\u2019 - Engineer News Network<\/title>\n<meta name=\"description\" content=\"Plain-text passwords, direct internet connections, and weak anti-virus protections place industrial control systems at risk\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial control systems are \u2018soft targets\u2019 - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"Plain-text passwords, direct internet connections, and weak anti-virus protections place industrial control systems at risk\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-24T09:57:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-25T10:46:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1752\" \/>\n\t<meta property=\"og:image:height\" content=\"1284\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Industrial control systems are \u2018soft targets\u2019\",\"datePublished\":\"2018-10-24T09:57:17+00:00\",\"dateModified\":\"2018-10-25T10:46:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/\"},\"wordCount\":717,\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg\",\"keywords\":[\"chemicals\",\"CyberX\",\"energy\",\"gas\",\"Global ICS &amp; IIoT Risk Report\",\"industrial control networks\",\"Manufacturing\",\"oil\",\"pharmaceuticals\",\"Utilities\"],\"articleSection\":[\"News, Views and Opinion\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/\",\"name\":\"Industrial control systems are \u2018soft targets\u2019 - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg\",\"datePublished\":\"2018-10-24T09:57:17+00:00\",\"dateModified\":\"2018-10-25T10:46:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"Plain-text passwords, direct internet connections, and weak anti-virus protections place industrial control systems at risk\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg\",\"contentUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg\",\"width\":1752,\"height\":1284,\"caption\":\"op data points from CyberX Global ICS & IIoT Risk Report\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/industrial-control-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial control systems are \u2018soft targets\u2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial control systems are \u2018soft targets\u2019 - Engineer News Network","description":"Plain-text passwords, direct internet connections, and weak anti-virus protections place industrial control systems at risk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/","og_locale":"en_GB","og_type":"article","og_title":"Industrial control systems are \u2018soft targets\u2019 - Engineer News Network","og_description":"Plain-text passwords, direct internet connections, and weak anti-virus protections place industrial control systems at risk","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/","og_site_name":"Engineer News Network","article_published_time":"2018-10-24T09:57:17+00:00","article_modified_time":"2018-10-25T10:46:12+00:00","og_image":[{"width":1752,"height":1284,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Industrial control systems are \u2018soft targets\u2019","datePublished":"2018-10-24T09:57:17+00:00","dateModified":"2018-10-25T10:46:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/"},"wordCount":717,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg","keywords":["chemicals","CyberX","energy","gas","Global ICS &amp; IIoT Risk Report","industrial control networks","Manufacturing","oil","pharmaceuticals","Utilities"],"articleSection":["News, Views and Opinion"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/","name":"Industrial control systems are \u2018soft targets\u2019 - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg","datePublished":"2018-10-24T09:57:17+00:00","dateModified":"2018-10-25T10:46:12+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"Plain-text passwords, direct internet connections, and weak anti-virus protections place industrial control systems at risk","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2018\/10\/Top-Data-Points-from-CyberX-Global-ICS-IIoT-Risk-Report-.jpg","width":1752,"height":1284,"caption":"op data points from CyberX Global ICS & IIoT Risk Report"},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/industrial-control-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Industrial control systems are \u2018soft targets\u2019"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/9497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=9497"}],"version-history":[{"count":7,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/9497\/revisions"}],"predecessor-version":[{"id":9523,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/9497\/revisions\/9523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/9501"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=9497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=9497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=9497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}