{"id":10609,"date":"2016-10-23T22:49:48","date_gmt":"2016-10-23T11:49:48","guid":{"rendered":"https:\/\/macquarietechnologygroup.com\/?p=10609"},"modified":"2023-03-01T16:37:14","modified_gmt":"2023-03-01T05:37:14","slug":"clock-ticking-cyber-security-laggards","status":"publish","type":"post","link":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/","title":{"rendered":"Clock Ticking for Cyber Security Laggards?"},"content":{"rendered":"

International cyber breaches prompt the call for secure government action<\/h3>\n

The Office of Personnel Management in the US sounds like an innocuous sort of agency.<\/p>\n

It is a kind of giant HR department for the US Government. The type of anonymous government body that\u00a0provides a vital service but makes few headlines.<\/p>\n

That is, it was until last year, when it was revealed that is was the subject of one of the most massive and far reaching government security breaches in history.<\/p>\n

Twenty-one and a half million personnel records were lost.<\/p>\n

These included files with the security clearance information of past, present and prospective members of the US government and military, including information about their families.<\/p>\n

And 5.6 million sets of fingerprints.<\/p>\n

In this context, the comment by Clive Lines, co-ordinator of the Australian Cyber Security Centre, in his foreword to the Centre\u2019s 2016 Threat Assessment Report that; \u201cIn cyber-security, prevention is better than cure,\u201d is surely a model of calm understatement.<\/p>\n

\"Macquarie<\/a><\/p>\n

 <\/p>\n

It is almost impossible to quantify the ramifications and costs of network breaches resulting from inadequate cyber security strategies<\/strong> by government agencies \u2013 whether a giant, high profile department, or a small obscure instrumentality.<\/p>\n

This is because, in a world of interconnected, modern communications networks, one person’s lack of vigilance was another’s vulnerability.<\/p>\n

\u201cBad actors\u201d in cyber space are increasingly adept at finding weak links and then hopping from one IT system to another.<\/p>\n

They are actively looking for and exploiting weak links in the broad world of government departments, agencies and businesses, knowing that once inside, they can find back doors to others, potentially digging out national and trade secrets along the way. It’s all about cracking the secure government<\/a> infrastructure and wreaking havoc.<\/p>\n

The ACSC report makes clear the malicious activity is not all 21st century\u00a0James Bond stuff.<\/p>\n

It covers the gamut from vandals to organized criminals to \u2013 in a rarer\u00a0but increasing number of cases \u2013 other nations.<\/p>\n

Sometimes the damage is immediate and reputational.<\/p>\n

Sometimes, it is massively disruptive and expensive.<\/p>\n

When winds took out power to South Australia this month by breaking parts of the network, thus triggering a defensive shutdown, many in the Canberra cyber security and secure government<\/a> community saw a warning.<\/p>\n

What if the network management systems in one or more states could be made to think<\/em> the network\u2019s integrity was threatened, and turn off the lights?<\/p>\n

Look no further than Ukraine in December 2015 to see the real-life example of a nation crippled by power blackouts as a result of cyber attacks from international adversity.<\/p>\n

As the OPM story shows, the greatest threats might be the least high profile.<\/p>\n

What about our departments and agencies with, for example, travel and accommodation information about their personnel?<\/p>\n

Do they have staff who might be advising or negotiating insensitive commercial or diplomatic transactions and negotiations?<\/p>\n

Government agencies and essential service providers that do not treat cybersecurity as core business for their senior management in 2016 are not doing their jobs.<\/p>\n

They are also putting everyone else at risk.<\/p>\n

The Federal Government provides advice to all government agencies about what they need to do to protect themselves, through the Australian Signals Directorate and other policy directives that guide how agencies acquire and consume information technology.<\/p>\n

But many agencies and government businesses are not fully implementing these policies and directions.<\/p>\n

Some because they don\u2019t have to, some because they struggle to find the resources, and some because they still don\u2019t fully understand the risks.<\/p>\n

In deciding to publicly acknowledge that Australia has suffered serious cybersecurity breaches, the government has clearly signaled that it is determined to elevate whole-of-government cyber defence to a new level.<\/p>\n

This is not only an essential example to the private sector, it is crucial to national security.<\/p>\n

The key is now getting comprehensive action from agencies to step up and treat cyber security and create a secure government<\/a> with the sense of urgency that the threat demands.<\/p>\n

That might require a more coordinated and cooperative model between agencies and private sector suppliers to recognize that the enormity of the task means leaving smaller organisation to their own devices is a recipe for failure.<\/p>\n

*This article first appeared in Computer World<\/a><\/p>\n

 <\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

International cyber breaches prompt the call for secure government action The Office of Personnel Management in the US sounds like an innocuous sort of agency. It is a kind of giant HR department for the US Government. The type of anonymous government body that\u00a0provides a vital service but makes few headlines. That is, it was […]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[261,262,263,264,265,266,267,268],"class_list":["post-10609","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-aidan-tudehope","tag-australian-assured-cloud","tag-australian-government-secure","tag-australian-secure-cloud","tag-cyber-security-laggards","tag-government-cyber-breaches","tag-international-cyber-breaches","tag-secure-government"],"acf":[],"yoast_head":"\nClock Ticking for Cyber Security and Secure Government Laggards<\/title>\n<meta name=\"description\" content=\"Cyber security should be top of mind for a secure government. International government recently falls prey to cyber breaches prompts a rethink for Canberra.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Clock Ticking for Cyber Security and Secure Government Laggards\" \/>\n<meta property=\"og:description\" content=\"Cyber security should be top of mind for a secure government. International government recently falls prey to cyber breaches prompts a rethink for Canberra.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/\" \/>\n<meta property=\"og:site_name\" content=\"bet365 live casino games\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-23T11:49:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-01T05:37:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png\" \/>\n<meta name=\"author\" content=\"Aidan Tudehope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Tudehope1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aidan Tudehope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/\"},\"author\":{\"name\":\"Aidan Tudehope\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929\"},\"headline\":\"Clock Ticking for Cyber Security Laggards?\",\"datePublished\":\"2016-10-23T11:49:48+00:00\",\"dateModified\":\"2023-03-01T05:37:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/\"},\"wordCount\":708,\"publisher\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png\",\"keywords\":[\"Aidan Tudehope\",\"Australian assured cloud\",\"Australian government secure\",\"Australian secure cloud\",\"cyber security laggards\",\"government cyber breaches\",\"international cyber breaches\",\"secure government\"],\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/\",\"url\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/\",\"name\":\"Clock Ticking for Cyber Security and Secure Government Laggards\",\"isPartOf\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png\",\"datePublished\":\"2016-10-23T11:49:48+00:00\",\"dateModified\":\"2023-03-01T05:37:14+00:00\",\"description\":\"Cyber security should be top of mind for a secure government. International government recently falls prey to cyber breaches prompts a rethink for Canberra.\",\"breadcrumb\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#primaryimage\",\"url\":\"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png\",\"contentUrl\":\"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/macquarietechnologygroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Clock Ticking for Cyber Security Laggards?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#website\",\"url\":\"https:\/\/macquarietechnologygroup.com\/\",\"name\":\"bet365 live casino games\",\"description\":\"bet365 live casino games\",\"publisher\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/macquarietechnologygroup.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#organization\",\"name\":\"bet365 live casino games\",\"url\":\"https:\/\/macquarietechnologygroup.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png\",\"contentUrl\":\"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png\",\"width\":1911,\"height\":1069,\"caption\":\"bet365 live casino games\"},\"image\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/macquarie-telecom\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929\",\"name\":\"Aidan Tudehope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g\",\"caption\":\"Aidan Tudehope\"},\"description\":\"Aidan is co-founder of bet365 live casino games and has been a director since 1992. He is the Managing Director of Macquarie Government & Hosting Group and is invested in leading the contribution from the Australian industry on all matters Cloud & Cyber policy related.\",\"sameAs\":[\"https:\/\/x.com\/Tudehope1\"]}]}<\/script>\n","yoast_head_json":{"title":"Clock Ticking for Cyber Security and Secure Government Laggards","description":"Cyber security should be top of mind for a secure government. International government recently falls prey to cyber breaches prompts a rethink for Canberra.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/","og_locale":"en_US","og_type":"article","og_title":"Clock Ticking for Cyber Security and Secure Government Laggards","og_description":"Cyber security should be top of mind for a secure government. International government recently falls prey to cyber breaches prompts a rethink for Canberra.","og_url":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/","og_site_name":"bet365 live casino games","article_published_time":"2016-10-23T11:49:48+00:00","article_modified_time":"2023-03-01T05:37:14+00:00","og_image":[{"url":"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png"}],"author":"Aidan Tudehope","twitter_card":"summary_large_image","twitter_creator":"@Tudehope1","twitter_misc":{"Written by":"Aidan Tudehope","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#article","isPartOf":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/"},"author":{"name":"Aidan Tudehope","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929"},"headline":"Clock Ticking for Cyber Security Laggards?","datePublished":"2016-10-23T11:49:48+00:00","dateModified":"2023-03-01T05:37:14+00:00","mainEntityOfPage":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/"},"wordCount":708,"publisher":{"@id":"https:\/\/macquarietechnologygroup.com\/#organization"},"image":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#primaryimage"},"thumbnailUrl":"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png","keywords":["Aidan Tudehope","Australian assured cloud","Australian government secure","Australian secure cloud","cyber security laggards","government cyber breaches","international cyber breaches","secure government"],"articleSection":["Uncategorized"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/","url":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/","name":"Clock Ticking for Cyber Security and Secure Government Laggards","isPartOf":{"@id":"https:\/\/macquarietechnologygroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#primaryimage"},"image":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#primaryimage"},"thumbnailUrl":"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png","datePublished":"2016-10-23T11:49:48+00:00","dateModified":"2023-03-01T05:37:14+00:00","description":"Cyber security should be top of mind for a secure government. International government recently falls prey to cyber breaches prompts a rethink for Canberra.","breadcrumb":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#primaryimage","url":"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png","contentUrl":"https:\/\/macquariegovernment.com\/wp-content\/uploads\/sites\/4\/2017\/01\/Macquarie-Government-help-avoid-cyber-security-issues-and-prevent-cyber-breaches-to-build-a-secure-Government.png"},{"@type":"BreadcrumbList","@id":"https:\/\/macquarietechnologygroup.com\/news\/clock-ticking-cyber-security-laggards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/macquarietechnologygroup.com\/"},{"@type":"ListItem","position":2,"name":"Clock Ticking for Cyber Security Laggards?"}]},{"@type":"WebSite","@id":"https:\/\/macquarietechnologygroup.com\/#website","url":"https:\/\/macquarietechnologygroup.com\/","name":"bet365 live casino games","description":"bet365 live casino games","publisher":{"@id":"https:\/\/macquarietechnologygroup.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/macquarietechnologygroup.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/macquarietechnologygroup.com\/#organization","name":"bet365 live casino games","url":"https:\/\/macquarietechnologygroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png","contentUrl":"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png","width":1911,"height":1069,"caption":"bet365 live casino games"},"image":{"@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/macquarie-telecom\/"]},{"@type":"Person","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929","name":"Aidan Tudehope","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g","caption":"Aidan Tudehope"},"description":"Aidan is co-founder of bet365 live casino games and has been a director since 1992. He is the Managing Director of Macquarie Government & Hosting Group and is invested in leading the contribution from the Australian industry on all matters Cloud & Cyber policy related.","sameAs":["https:\/\/x.com\/Tudehope1"]}]}},"_links":{"self":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts\/10609"}],"collection":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/comments?post=10609"}],"version-history":[{"count":15,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts\/10609\/revisions"}],"predecessor-version":[{"id":14417,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts\/10609\/revisions\/14417"}],"wp:attachment":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/media?parent=10609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/categories?post=10609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/tags?post=10609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}