{"id":811,"date":"2018-10-04T14:37:22","date_gmt":"2018-10-04T14:37:22","guid":{"rendered":"http:\/\/thinqtanklearning.com\/blog\/?p=811"},"modified":"2018-10-04T15:26:59","modified_gmt":"2018-10-04T15:26:59","slug":"the-value-of-cybersecurity-professionals","status":"publish","type":"post","link":"https:\/\/thinqtanklearning.com\/blog\/the-value-of-cybersecurity-professionals\/","title":{"rendered":"The Value of Cybersecurity Professionals"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone wp-image-812\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/The-Value-of-Cybersecurity-Professionals.png\" alt=\"\" width=\"665\" height=\"341\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/The-Value-of-Cybersecurity-Professionals.png 2902w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/The-Value-of-Cybersecurity-Professionals-300x154.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/The-Value-of-Cybersecurity-Professionals-768x394.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/The-Value-of-Cybersecurity-Professionals-1024x525.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/The-Value-of-Cybersecurity-Professionals-1200x615.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/p>\n<p>Cybersecurity has become a household word, but while we hear about data breaches and phishing scams on a daily basis, what does it all mean to your organization? To kick off cybersecurity month, here are\u00a0<strong>six<\/strong> solid facts that prove the critical and urgent need for trained, experienced cybersecurity professionals.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-814\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/1-Cost-of-Cybercrimes-Banner-1.png\" alt=\"\" width=\"550\" height=\"32\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/1-Cost-of-Cybercrimes-Banner-1.png 1380w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/1-Cost-of-Cybercrimes-Banner-1-300x17.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/1-Cost-of-Cybercrimes-Banner-1-768x45.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/1-Cost-of-Cybercrimes-Banner-1-1024x59.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/1-Cost-of-Cybercrimes-Banner-1-1200x70.png 1200w\" sizes=\"(max-width: 550px) 85vw, 550px\" \/><br \/>\n<strong><br \/>\n<\/strong>By 2021, cybercrimes will cost $6 trillion per year worldwide. The cost of cybercrimes will double in the next five years, up from $3 trillion in 2015, according to a\u00a0<strong><a href=\"http:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\" target=\"_blank\" rel=\"noopener\">report<\/a><\/strong>\u00a0published by Cybersecurity Ventures. This includes not only stolen money and ransom, but also the value of lost productivity and intellectual property, data theft, business disruption, reputational harm and more. Experienced cybersecurity professionals can help reduce this cost for their organizations by putting protections into place, firming up security policies and identifying vulnerabilities before attacks happen.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-816\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/2-Ransomware-Attacks-Banner-1.png\" alt=\"\" width=\"550\" height=\"32\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/2-Ransomware-Attacks-Banner-1.png 1380w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/2-Ransomware-Attacks-Banner-1-300x17.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/2-Ransomware-Attacks-Banner-1-768x45.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/2-Ransomware-Attacks-Banner-1-1024x59.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/2-Ransomware-Attacks-Banner-1-1200x70.png 1200w\" sizes=\"(max-width: 550px) 85vw, 550px\" \/><\/p>\n<p>Businesses experience ransomware attacks every 40 seconds. According to\u00a0<a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2016-story-of-the-year\/76757\/\" target=\"_blank\" rel=\"noopener\"><strong>Kaspersky Lab<\/strong>,<\/a>\u00a0between January and September 2016, businesses experienced ransomware attacks once every 40 seconds, up from the previous rate of once every 2 minutes. Also in 2016, the number of daily ransomware attacks jumped 300 percent, from 1,000 per day in 2015 to 4,000 per day in 2016. And nearly one-fifth of hacking attacks included ransomware. As the threat of\u00a0<strong><a href=\"https:\/\/certification.comptia.org\/it-career-news\/post\/view\/2017\/09\/13\/learn-and-earn-with-channelcon-online-the-cloud-the-edge-and-resilient-networks\">ransomware<\/a><\/strong>\u00a0continues to increase, it\u2019s important for organizations to have\u00a0<strong><a href=\"https:\/\/certification.comptia.org\/certifications\/cybersecurity-analyst\">cyber-incident response plans<\/a><\/strong>\u00a0in place so they know what to do when it happens to them.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-817\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/3-Malicious-Emails-Banner-1.png\" alt=\"\" width=\"550\" height=\"32\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/3-Malicious-Emails-Banner-1.png 1380w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/3-Malicious-Emails-Banner-1-300x17.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/3-Malicious-Emails-Banner-1-768x45.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/3-Malicious-Emails-Banner-1-1024x59.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/3-Malicious-Emails-Banner-1-1200x70.png 1200w\" sizes=\"(max-width: 550px) 85vw, 550px\" \/><\/p>\n<p>1 in 131 emails is malicious.\u00a0More than half of all emails are spam, according to Symantec\u2019s\u00a0<strong><a href=\"https:\/\/www.symantec.com\/security-center\/threat-report\" target=\"_blank\" rel=\"noopener\">2018 Internet Security Threat Report<\/a><\/strong>, and the amount of spam containing malware continues to increase. Today, malware has gone pro, with authors outsourcing spam campaigns to specialists, and the scale of these operations indicates profitability, which means they will likely continue, according to Symantec. Training staff to use caution with unknown emails can be the first line of defense in cybersecurity.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-818\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/4-Network-Vulnerability-Banner-1.png\" alt=\"\" width=\"550\" height=\"32\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/4-Network-Vulnerability-Banner-1.png 1380w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/4-Network-Vulnerability-Banner-1-300x17.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/4-Network-Vulnerability-Banner-1-768x45.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/4-Network-Vulnerability-Banner-1-1024x59.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/4-Network-Vulnerability-Banner-1-1200x70.png 1200w\" sizes=\"(max-width: 550px) 85vw, 550px\" \/><\/p>\n<p>Attackers reside within a network for an average of 146 days before being detected.\u00a0Although this number has dropped from the previous 200-day average, the fact that hackers can dwell undetected for almost five months should raise a red flag. Experienced cybersecurity analysts can not only identify and analyze anomalies on the network, but they can\u00a0<strong><a href=\"https:\/\/certification.comptia.org\/certifications\/cybersecurity-analyst\" target=\"_blank\" rel=\"noopener\">manage vulnerabilities<\/a><\/strong>\u00a0before an attack occurs.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-819\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/5-Opportunies-Abound-Banner-1.png\" alt=\"\" width=\"550\" height=\"32\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/5-Opportunies-Abound-Banner-1.png 1380w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/5-Opportunies-Abound-Banner-1-300x17.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/5-Opportunies-Abound-Banner-1-768x45.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/5-Opportunies-Abound-Banner-1-1024x59.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/5-Opportunies-Abound-Banner-1-1200x70.png 1200w\" sizes=\"(max-width: 550px) 85vw, 550px\" \/><\/p>\n<p>Unfilled cybersecurity jobs will reach 3.5 million by 2021.\u00a0Not to mention that today, cybersecurity is everyone\u2019s responsibility, from the help desk to the CIO and even non-IT employees. But the number of jobs specifically in the field of cybersecurity will increase exponentially in the next five years. And\u00a0<strong><a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures<\/a><\/strong>\u00a0estimates that by 2021 every large company globally will have a chief information security officer (CISO) in seat, compared to the 65 percent that have one now and the 50 percent that did in 2016.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone wp-image-820\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/6-IoT-Device-Vulnerability-Banner-1.png\" alt=\"\" width=\"550\" height=\"32\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/6-IoT-Device-Vulnerability-Banner-1.png 1380w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/6-IoT-Device-Vulnerability-Banner-1-300x17.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/6-IoT-Device-Vulnerability-Banner-1-768x45.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/6-IoT-Device-Vulnerability-Banner-1-1024x59.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/10\/6-IoT-Device-Vulnerability-Banner-1-1200x70.png 1200w\" sizes=\"(max-width: 550px) 85vw, 550px\" \/><\/p>\n<p>An IoT device can be attacked within 2 minutes.\u00a0By the end of 2017, the world had 8.4 billion connected devices, up 31 percent from 2016, according to a\u00a0<strong><a href=\"http:\/\/www.gartner.com\/newsroom\/id\/3598917\" target=\"_blank\" rel=\"noopener\">Gartner study<\/a><\/strong>. While consumers are driving the adoption of IoT devices, companies will spend an estimated $964 billion on IoT hardware this year. Cisco estimates that the number of IoT devices will be three times as high as the global population by 2021. But what do connected devices have to do with cybersecurity? Not all IoT devices are created equal when it comes to security \u2013 some are put on the market so quickly that they have vulnerabilities. And the consumers using these devices may not set them up securely, so when they bring their own devices to work, it exposes their employer to cyber-threats. IT pros need to\u00a0<strong><a href=\"https:\/\/certification.comptia.org\/it-career-news\/post\/view\/2017\/05\/05\/why-the-internet-of-things-needs-security-analytics\">apply behavioral analytics to IoT devices<\/a><\/strong>\u00a0in the same way they do to computers, servers and the network. Anything could be vulnerable.<\/p>\n<p>Having <a href=\"http:\/\/bit.ly\/thinQtank\" target=\"_blank\" rel=\"noopener\"><strong>trained<\/strong><\/a> and experienced cybersecurity professionals on staff can reduce an organization\u2019s risk to cyber-crimes exponentially. And when, not if, the organization does get attacked, an experienced cybersecurity pro can mitigate the problem and get the business back up and running quickly and efficiently. (Original <a href=\"https:\/\/certification.comptia.org\/it-career-news\/post\/view\/2017\/10\/04\/6-stats-that-prove-the-value-of-cybersecurity-pros\" target=\"_blank\" rel=\"noopener\">post<\/a> by Debra McCraw)<\/p>\n<p>If you have any questions about advancing your cybersecurity career, or our\u00a0<strong><a href=\"http:\/\/bit.ly\/thinQtank\" target=\"_blank\" rel=\"noopener\">Training and Certification Programs<\/a><\/strong>, we would love to hear from you! Give us a call at 855-TO-THINQ (855-868-4467) or email\u00a0<strong><a href=\"mailto:website@thinqtanklearning.com\">website@thinqtanklearning.com<\/a><\/strong><a href=\"mailto:website@thinqtanklearning.com\">.<\/a><\/p>\n<p><a href=\"https:\/\/thinqtanklearning.com\/registry_desc.php?id=CompTIA-Security-Plus-Training-Course-Oct-22-Open\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone wp-image-682\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.21.36-PM.png\" alt=\"\" width=\"665\" height=\"286\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.21.36-PM.png 3168w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.21.36-PM-300x129.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.21.36-PM-768x330.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.21.36-PM-1024x440.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.21.36-PM-1200x516.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><\/p>\n<p><b>thinQtank\u00ae Learning\u00a0<\/b>is offering a unique five-day training camp in which students can receive the which students can receive the <strong>CompTIA Security+<\/strong> certification. As with all of our CompTIA Training Experiences, exams are delivered in the classroom.<\/p>\n<p><strong>When<\/strong>: October 22 &#8211; October 26, 2018<br \/>\n<strong>Where<\/strong>: Sterling VA and Live Online<\/p>\n<p><a href=\"https:\/\/thinqtanklearning.com\/registry_desc.php?id=CompTIA-Security-Plus-Training-Course-Oct-22-Open\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone wp-image-675\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM.png\" alt=\"\" width=\"650\" height=\"77\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM.png 3360w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM-300x36.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM-768x91.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM-1024x122.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM-1200x143.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><br \/>\n<a href=\"https:\/\/thinqtanklearning.com\/registry_desc.php?id=CompTIA-Network-Plus-Training-Course-Nov-12\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone wp-image-806\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/09\/Network-Banner.png\" alt=\"\" width=\"665\" height=\"286\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/09\/Network-Banner.png 3196w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/09\/Network-Banner-300x129.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/09\/Network-Banner-768x330.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/09\/Network-Banner-1024x440.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/09\/Network-Banner-1200x516.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><\/p>\n<p><b>thinQtank\u00ae Learning\u00a0<\/b>is offering an industry unique five-day training camp in which students can receive the CompTIA Network+ certification. As with all of our CompTIA Training Experiences, exams are delivered in the classroom.<\/p>\n<p><strong>When<\/strong>: November 12 &#8211; November 16, 2018<br \/>\n<strong>Where<\/strong>: Sterling VA and Live Online<\/p>\n<p><a href=\"https:\/\/thinqtanklearning.com\/registry_desc.php?id=CompTIA-Network-Plus-Training-Course-Nov-12\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone wp-image-675\" src=\"http:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM.png\" alt=\"\" width=\"650\" height=\"77\" srcset=\"https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM.png 3360w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM-300x36.png 300w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM-768x91.png 768w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM-1024x122.png 1024w, https:\/\/thinqtanklearning.com\/blog\/wp-content\/uploads\/2018\/08\/Screen-Shot-2018-08-14-at-3.23.45-PM-1200x143.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/SficV6p4AFs?list=PLeHzhn7aVgUcJ_UFCypE8HAXlNeK8_6j5&amp;rel=0\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity has become a household word, but while we hear about data breaches and phishing scams on a daily basis, what does it all mean to your organization? To kick off cybersecurity month, here are\u00a0six solid facts that prove the critical and urgent need for trained, experienced cybersecurity professionals. By 2021, cybercrimes will cost $6 &hellip; <a href=\"https:\/\/thinqtanklearning.com\/blog\/the-value-of-cybersecurity-professionals\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The Value of Cybersecurity Professionals&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/posts\/811"}],"collection":[{"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/comments?post=811"}],"version-history":[{"count":7,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/posts\/811\/revisions"}],"predecessor-version":[{"id":826,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/posts\/811\/revisions\/826"}],"wp:attachment":[{"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/media?parent=811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/categories?post=811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thinqtanklearning.com\/blog\/wp-json\/wp\/v2\/tags?post=811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}