{"id":31024,"date":"2019-11-13T20:53:36","date_gmt":"2019-11-13T20:53:36","guid":{"rendered":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/"},"modified":"2023-03-08T14:02:04","modified_gmt":"2023-03-08T14:02:04","slug":"the-5-most-common-cybersecurity-threats-to-manufacturers","status":"publish","type":"post","link":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/","title":{"rendered":"The 5 Most Common Cybersecurity Threats to Manufacturers"},"content":{"rendered":"

Author: Elliot Forsyth, Vice President of Business Operations, Michigan Manufacturing Technology<\/p>\n

Manufacturers are increasingly under threat from cyberattacks. This is a real concern not just because of the typical business vulnerabilities (e.g., stolen intellectual property, ransomware) but because in today\u2019s increasingly connected world, a successful infiltration from a cybercriminal could shut down a plant’s operations or start making equipment produce faulty products without the knowledge of managers, among other things.<\/p>\n

Additionally, most manufacturers are small businesses that do not have established IT security practices to combat or cope with a cyber incident. This lack of preparedness not only makes it easier for cybercriminals to attack, it also increases the likelihood that impacted companies will experience longer periods of downtime as they scramble to restore operations following a cybersecurity issue.<\/p>\n

While some manufacturers may still be a ways off from creating a mature cybersecurity practice, every manufacturer should be aware of the five main cybersecurity threats\u00a0to their company. Familiarizing yourself and your employees with them is the first step in reducing the risks they pose.<\/p>\n

1. Identity Theft<\/h2>\n

People are most familiar with the identity theft that happens when hackers get their Social Security Numbers and use them to apply for loans or lines of credit. When it comes to the manufacturing sector, problems arise if hackers break into a customer database with help from malware and access customer data, which can potentially be used to practice identity theft.<\/p>\n

A recent such incident happened to a Tennessee-based company called Titan Manufacturing and Distributing. Hackers had access to the customer database\u00a0for nearly a year<\/a>, giving them plenty of time to grab sensitive information.<\/p>\n

2. Phishing<\/h2>\n

Phishing occurs when cybercriminals craft convincing emails and use them to trick recipients into revealing sensitive information such as passwords. These messages often have branded letterheads or similar elements to help persuade people of their legitimacy. Phishing emails generally target a wide audience and are fairly easy to spot with generic greetings such as “Dear valued customer.”<\/p>\n

3. Spear Phishing<\/h2>\n

Spear phishing is a highly targeted kind of phishing that may only address one person at a manufacturing company or people within a particular department. In contrast to the phishing attempts previously mentioned, these targeted messages are more specialized and relevant to the recipient. For example, a person working in the accounting department might receive a spear phishing email about a particular invoice or tax form.<\/p>\n

Some spear phishing attempts appear to come from a company leader and may request that the recipient give details about logging into a company’s industrial control systems (ICS). If a business invests in identity and access management (IAM) solutions, they could cut down on the success rates of spear phishing emails. If a spear phishing email recipient receives a request from someone posing as the CEO of a company that has IAM in place, for example, that individual would likely realize something is amiss because the real CEO should know about the access restrictions that the phishing email would violate.<\/p>\n

4. Spam<\/h2>\n

Spam messages are annoying for everyday people, but they can substantially reduce productivity at manufacturing plants. At one Dunlop Industrial plant in South Africa, members of the IT team had to manually sort through approximately\u00a012,000 spam messages a day\u00a0\u2014 a task that required up to 90 minutes and kept them from more effective uses of their time.<\/p>\n

In that case, the company deployed a mail service solution that scanned messages for spam characteristics and malware before users saw them, removing the messages before they hit employee inboxes. But there will always be an element of human judgment since it’s not always easy to tell a spam message from one originating from a genuine customer or supplier, which makes spam a persistently challenging issue.<\/p>\n

5. Compromised Webpages<\/h2>\n

Webpage compromises happen when hackers take control of websites and either make them inoperable or fill them with misleading content to fool customers. Sometimes, hackers embed programs that automatically install dangerous files on site visitors’ computers without their knowledge. These situations can severely damage the reputations of the impacted manufacturing companies.<\/p>\n

Protecting Yourself from These Threats<\/h2>\n

The best way to fight back against these five threats and others is to implement a formal cybersecurity practice at your company.\u00a0Visit \u201cWhere Do I Start<\/a>\u201d in the cybersecurity section of the NIST MEP website\u00a0to learn more.<\/p>\n

Additionally, if companies encounter unforeseen difficulties or have questions about\u00a0NIST\u2019s Cybersecurity Framework documents<\/a>, help is available via the Manufacturing Extension Partnership (MEP) Center in their state. Through the MEP National Network, each MEP Center can provide manufacturers in their territory access to experts versed in the NIST 800-171 Cybersecurity Framework who can help design an appropriate cybersecurity practice and implement it. You can also complete the\u00a0NIST MEP Cybersecurity Self Assessment, which allows manufacturers to self-evaluate the level of cyber risk to their business.<\/p>\n

Insulate your company against the growing cyber threats affecting the manufacturing sector.\u00a0Contact DVIRC today\u00a0<\/a><\/u><\/b>and develop a plan and practice to protect your firm and its future.<\/p>\n

Source Link: https:\/\/www.nist.gov\/blogs\/manufacturing-innovation-blog\/5-most-common-cybersecurity-threats-manufacturers<\/a><\/p>\n

This article originally appeared on\u00a0IndustryWeek<\/a>.\u00a0Guest blog post by Elliot Forsyth, Vice President of Business Operations at the Michigan Manufacturing Technology Center (The Center),\u00a0part of the MEP National Network<\/em>TM<\/sup><\/em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"Author: Elliot Forsyth, Vice President of Business Operations, Michigan Manufacturing Technology Manufacturers are increasingly under threat from cyberattacks. This is a real concern not just because of the typical business vulnerabilities (e.g., stolen intellectual property, ransomware) but because in today\u2019s increasingly connected world, a successful infiltration from a cybercriminal could shut down a plant’s operations […]","protected":false},"author":8,"featured_media":31025,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"acf":[],"yoast_head":"\nThe 5 Most Common Cybersecurity Threats to Manufacturers – DVIRC<\/title>\n<meta name=\"description\" content=\"Author: Elliot Forsyth, Vice President of Business Operations, Michigan Manufacturing Technology Manufacturers are increasingly under threat from\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 5 Most Common Cybersecurity Threats to Manufacturers – DVIRC\" \/>\n<meta property=\"og:description\" content=\"Author: Elliot Forsyth, Vice President of Business Operations, Michigan Manufacturing Technology Manufacturers are increasingly under threat from\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/\" \/>\n<meta property=\"og:site_name\" content=\"DVIRC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dvirc.sepa\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-13T20:53:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-08T14:02:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"530\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"sagan@brandllama.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DVIRC_PA\" \/>\n<meta name=\"twitter:site\" content=\"@DVIRC_PA\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sagan@brandllama.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/\"},\"author\":{\"name\":\"sagan@brandllama.com\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1\"},\"headline\":\"The 5 Most Common Cybersecurity Threats to Manufacturers\",\"datePublished\":\"2019-11-13T20:53:36+00:00\",\"dateModified\":\"2023-03-08T14:02:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/\"},\"wordCount\":882,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.dvirc.org\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png\",\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/\",\"url\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/\",\"name\":\"The 5 Most Common Cybersecurity Threats to Manufacturers – DVIRC\",\"isPartOf\":{\"@id\":\"https:\/\/www.dvirc.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png\",\"datePublished\":\"2019-11-13T20:53:36+00:00\",\"dateModified\":\"2023-03-08T14:02:04+00:00\",\"description\":\"Author: Elliot Forsyth, Vice President of Business Operations, Michigan Manufacturing Technology Manufacturers are increasingly under threat from\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#primaryimage\",\"url\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png\",\"contentUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png\",\"width\":850,\"height\":530},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dvirc.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 5 Most Common Cybersecurity Threats to Manufacturers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dvirc.org\/#website\",\"url\":\"https:\/\/www.dvirc.org\/\",\"name\":\"DVIRC\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.dvirc.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dvirc.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dvirc.org\/#organization\",\"name\":\"DVIRC\",\"url\":\"https:\/\/www.dvirc.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg\",\"contentUrl\":\"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg\",\"width\":2560,\"height\":1671,\"caption\":\"DVIRC\"},\"image\":{\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dvirc.sepa\/\",\"https:\/\/twitter.com\/DVIRC_PA\",\"https:\/\/www.linkedin.com\/company\/dvirc\",\"https:\/\/www.youtube.com\/channel\/UChq_rqm2Lh3jDEg8m5ZRdrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1\",\"name\":\"sagan@brandllama.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dvirc.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g\",\"caption\":\"sagan@brandllama.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 5 Most Common Cybersecurity Threats to Manufacturers – DVIRC","description":"Author: Elliot Forsyth, Vice President of Business Operations, Michigan Manufacturing Technology Manufacturers are increasingly under threat from","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/","og_locale":"en_US","og_type":"article","og_title":"The 5 Most Common Cybersecurity Threats to Manufacturers – DVIRC","og_description":"Author: Elliot Forsyth, Vice President of Business Operations, Michigan Manufacturing Technology Manufacturers are increasingly under threat from","og_url":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/","og_site_name":"DVIRC","article_publisher":"https:\/\/www.facebook.com\/dvirc.sepa\/","article_published_time":"2019-11-13T20:53:36+00:00","article_modified_time":"2023-03-08T14:02:04+00:00","og_image":[{"width":850,"height":530,"url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png","type":"image\/png"}],"author":"sagan@brandllama.com","twitter_card":"summary_large_image","twitter_creator":"@DVIRC_PA","twitter_site":"@DVIRC_PA","twitter_misc":{"Written by":"sagan@brandllama.com","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#article","isPartOf":{"@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/"},"author":{"name":"sagan@brandllama.com","@id":"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1"},"headline":"The 5 Most Common Cybersecurity Threats to Manufacturers","datePublished":"2019-11-13T20:53:36+00:00","dateModified":"2023-03-08T14:02:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/"},"wordCount":882,"commentCount":0,"publisher":{"@id":"https:\/\/www.dvirc.org\/#organization"},"image":{"@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png","inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/","url":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/","name":"The 5 Most Common Cybersecurity Threats to Manufacturers – DVIRC","isPartOf":{"@id":"https:\/\/www.dvirc.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#primaryimage"},"image":{"@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png","datePublished":"2019-11-13T20:53:36+00:00","dateModified":"2023-03-08T14:02:04+00:00","description":"Author: Elliot Forsyth, Vice President of Business Operations, Michigan Manufacturing Technology Manufacturers are increasingly under threat from","breadcrumb":{"@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#primaryimage","url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png","contentUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/2023\/03\/5mostcommon-blogfeaturedimage718x330-recovered.png","width":850,"height":530},{"@type":"BreadcrumbList","@id":"https:\/\/www.dvirc.org\/insights\/the-5-most-common-cybersecurity-threats-to-manufacturers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dvirc.org\/"},{"@type":"ListItem","position":2,"name":"The 5 Most Common Cybersecurity Threats to Manufacturers"}]},{"@type":"WebSite","@id":"https:\/\/www.dvirc.org\/#website","url":"https:\/\/www.dvirc.org\/","name":"DVIRC","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.dvirc.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dvirc.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.dvirc.org\/#organization","name":"DVIRC","url":"https:\/\/www.dvirc.org\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg","contentUrl":"https:\/\/www.dvirc.org\/wp-content\/uploads\/DVIRC_BlueAndBlack_2016-scaled.jpg","width":2560,"height":1671,"caption":"DVIRC"},"image":{"@id":"https:\/\/www.dvirc.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dvirc.sepa\/","https:\/\/twitter.com\/DVIRC_PA","https:\/\/www.linkedin.com\/company\/dvirc","https:\/\/www.youtube.com\/channel\/UChq_rqm2Lh3jDEg8m5ZRdrg"]},{"@type":"Person","@id":"https:\/\/www.dvirc.org\/#\/schema\/person\/d3b9f6e4cb1d87a9e011f4bb4b4f31d1","name":"sagan@brandllama.com","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dvirc.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e0e1424cb9eeb7111a1146aa293c9ca6?s=96&d=mm&r=g","caption":"sagan@brandllama.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/posts\/31024"}],"collection":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/comments?post=31024"}],"version-history":[{"count":0,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/posts\/31024\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/media\/31025"}],"wp:attachment":[{"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/media?parent=31024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dvirc.org\/wp-json\/wp\/v2\/categories?post=31024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}