{"id":2968,"date":"2022-11-20T12:00:00","date_gmt":"2022-11-20T12:00:00","guid":{"rendered":"https:\/\/www.hostrw.com\/kp\/?p=2968"},"modified":"2022-10-05T15:56:50","modified_gmt":"2022-10-05T13:56:50","slug":"insider-threats-are-getting-more-dangerous-heres-how-to-stop-them","status":"publish","type":"post","link":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/","title":{"rendered":"Insider Threats Are Getting More Dangerous! Here&#8217;s How to Stop Them"},"content":{"rendered":"<p><\/p><p>One of the most difficult types of attacks to detect are those performed by insiders. An \u201cinsider\u201d would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.<\/p><p>Because insiders have authorized system access, they bypass certain security defenses. Such as those designed to keep intruders out. Since a logged-in user isn\u2019t seen as an intruder, those security protections aren\u2019t triggered.<\/p><p>There are three <a rel=\"noreferrer noopener\" href=\"https:\/\/www.proofpoint.com\/us\/blog\/insider-threat-management\/insider-threats-are-still-rise-2022-ponemon-report\" target=\"_blank\">troubling statistics<\/a> from a recent report by Ponemon Institute They illustrate the importance of addressing this threat. Insider attacks are getting worse, taking longer to detect and becoming more extensive.<\/p><p>The report found that over the last two years:<\/p><ul class=\"wp-block-list\"><li>Insider attacks have increased by 44%<\/li><li>It takes organizations 85 days to contain an insider threat, compared to 77 days in 2020.<\/li><li>The average cost of addressing insider threats has risen by 34%<\/li><\/ul><p>It\u2019s important for companies to understand what makes up an insider threat. That\u2019s the first step towards mitigation.<\/p><h2 class=\"wp-block-heading\">4 Types of Insider Threats<\/h2><p>One reason that insider threats can be hard to detect is that there is not just one kind. Employees, vendors, and hackers can all perpetrate insider security breaches. To further complicate detection, some may be malicious and others accidental.<\/p><p>Here are the four main types of insider threats faced by company networks.<\/p><h3 class=\"wp-block-heading\">Malicious\/Disgruntled Employee<\/h3><p>A sales employee that is leaving the company may decide to take all their contacts with them. This is a malicious theft of company data.<\/p><p>Another example of this type of insider attack is a disgruntled employee. They may be upset with their manager who just fired them and decide to do the business harm. They could plant ransomware or make a deal with a hacker to give over their login credentials for cash.<\/p><h3 class=\"wp-block-heading\">Careless\/Negligent Employee<\/h3><p>Some insider threats are due to lazy or untrained employees. They don\u2019t mean to cause a data breach. But may accidentally share classified data on a non secure platform. Or they may use a friend\u2019s computer to access their business apps. Being completely unaware of the security consequences.<\/p><h3 class=\"wp-block-heading\">3rd Party with Access to Your Systems<\/h3><p>Outsiders with access to your network are also a very real concern. Contractors, freelancers, and vendors can all constitute an insider breach risk.<\/p><p>You need to ensure that these third parties are fully reviewed. Do this before you give them system access. You should also allow your IT partner to review them for any data security concerns.<\/p><h3 class=\"wp-block-heading\">Hacker That Compromises a Password<\/h3><p>Compromised login credentials are one of the most dangerous types of insider threats. This has now become the <a href=\"https:\/\/www.ibm.com\/security\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">#1 driver<\/a> of data breaches around the world.<\/p><p>When a cybercriminal can access an employee\u2019s login, that criminal becomes an \u201cinsider.\u201d Your computer system reads them as the legitimate user.<\/p><h2 class=\"wp-block-heading\">Ways to Mitigate Insider Threats<\/h2><p>Insider threats can be difficult to detect after the fact. But if you put mitigation measures in place you can stop them in their tracks. Being proactive keeps you from suffering a costly incident. One that you may not know about for months.<\/p><p>Here are some of the best tactics for reducing insider threat risk.<\/p><h3 class=\"wp-block-heading\">Thorough Background Checks<\/h3><p>When hiring new employees make sure you do a thorough background check. Malicious insiders will typically have red flags in their work history. You want to do the same with any vendors or contractors that will have access to your systems.<\/p><h3 class=\"wp-block-heading\">Endpoint Device Solutions<\/h3><p>Mobile devices now make up about <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/04\/07\/mobile-security-60-percent-problem\/\" target=\"_blank\" rel=\"noreferrer noopener\">60% of<\/a> the endpoints in a company. But many businesses aren\u2019t using a solution to manage device access to resources.<\/p><p>Put an endpoint management solution in place to monitor device access. You can also use this to safelist devices and block unauthorized devices by default.<\/p><h3 class=\"wp-block-heading\">Multi-factor Authentication &amp; Password Security<\/h3><p>One of the best ways to fight credential theft is through multi-factor authentication. Hackers have a hard time getting past the 2nd factor. They rarely have access to a person\u2019s mobile device or FIDO security key.<\/p><p>Couple this with password security. This includes things like:<\/p><ul class=\"wp-block-list\"><li>Requiring strong passwords in your cloud apps<\/li><li>Using a business password manager<\/li><li>Requiring unique passwords for all logins<\/li><\/ul><h3 class=\"wp-block-heading\">Employee Data Security Training<\/h3><p>Training can help you mitigate the risk of a breach through carelessness. Train employees on proper data handling and security policies governing sensitive information.<\/p><h3 class=\"wp-block-heading\">Network Monitoring<\/h3><p>Once someone has user access to your system, how can you catch them doing something wrong? You do this through intelligent network monitoring.<\/p><p>Use AI-enabled threat monitoring. This allows you to detect strange behaviors as soon as they happen. For example, someone downloading a large number of files. Or someone logging in from outside the country.<\/p><h2 class=\"wp-block-heading\">Need Help Putting a Stop to Insider Attacks?<\/h2><p>A layered security solution can help you mitigate all four types of insider threats. We can help you with a robust yet affordable solution. Contact us today for a free consultation.<\/p><p><\/p><p>&#8212;<br><a href=\"https:\/\/unsplash.com\/photos\/mT7lXZPjk7U\" target=\"_blank\" rel=\"noreferrer noopener\">Featured Image Credit<\/a><\/p><p>This Article has been Republished with Permission from <a rel=\"canonical noopener noreferrer\" href=\"https:\/\/thetechnologypress.com\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/\" title=\"Insider Threats Are Getting More Dangerous! Here's How to Stop Them\" target=\"_blank\">The Technology Press.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>One of the most difficult types of attacks to detect are those performed by insiders. An \u201cinsider\u201d would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.Because insiders have authorized system access, they bypass certain security defenses. Such as those designed to &#8230;<\/p>\n","protected":false},"author":1,"featured_media":2969,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[80],"tags":[],"class_list":["post-2968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insider Threats Are Getting More Dangerous! Here&#039;s How to Stop Them - HostRW Computer Service<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insider Threats Are Getting More Dangerous! Here&#039;s How to Stop Them - HostRW Computer Service\" \/>\n<meta property=\"og:description\" content=\"One of the most difficult types of attacks to detect are those performed by insiders. An \u201cinsider\u201d would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.Because insiders have authorized system access, they bypass certain security defenses. Such as those designed to ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/\" \/>\n<meta property=\"og:site_name\" content=\"HostRW Computer Service\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-20T12:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/10\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roelof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hostrw\" \/>\n<meta name=\"twitter:site\" content=\"@hostrw\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roelof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/\"},\"author\":{\"name\":\"Roelof\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\"},\"headline\":\"Insider Threats Are Getting More Dangerous! Here&#8217;s How to Stop Them\",\"datePublished\":\"2022-11-20T12:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/\"},\"wordCount\":846,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/\",\"name\":\"Insider Threats Are Getting More Dangerous! Here's How to Stop Them - HostRW Computer Service\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg\",\"datePublished\":\"2022-11-20T12:00:00+00:00\",\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg\",\"width\":2560,\"height\":1708,\"caption\":\"red padlock on black computer keyboard\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"name\":\"HostRW Computer Service\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\",\"name\":\"HostRW Computer Service\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"width\":189,\"height\":57,\"caption\":\"HostRW Computer Service\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/hostrw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\",\"name\":\"Roelof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"caption\":\"Roelof\"},\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/author\\\/roelof\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insider Threats Are Getting More Dangerous! Here's How to Stop Them - HostRW Computer Service","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/","og_locale":"nl_NL","og_type":"article","og_title":"Insider Threats Are Getting More Dangerous! Here's How to Stop Them - HostRW Computer Service","og_description":"One of the most difficult types of attacks to detect are those performed by insiders. An \u201cinsider\u201d would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.Because insiders have authorized system access, they bypass certain security defenses. Such as those designed to ...","og_url":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/","og_site_name":"HostRW Computer Service","article_published_time":"2022-11-20T12:00:00+00:00","og_image":[{"width":2560,"height":1708,"url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/10\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg","type":"image\/jpeg"}],"author":"Roelof","twitter_card":"summary_large_image","twitter_creator":"@hostrw","twitter_site":"@hostrw","twitter_misc":{"Geschreven door":"Roelof","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/#article","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/"},"author":{"name":"Roelof","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc"},"headline":"Insider Threats Are Getting More Dangerous! Here&#8217;s How to Stop Them","datePublished":"2022-11-20T12:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/"},"wordCount":846,"publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/10\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg","articleSection":["Cybersecurity"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/","url":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/","name":"Insider Threats Are Getting More Dangerous! Here's How to Stop Them - HostRW Computer Service","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/#primaryimage"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/10\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg","datePublished":"2022-11-20T12:00:00+00:00","inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/#primaryimage","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/10\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/10\/Insider-Threats-Are-Getting-More-Dangerous-Heres-How-to-Stop-Them-scaled-1.jpg","width":2560,"height":1708,"caption":"red padlock on black computer keyboard"},{"@type":"WebSite","@id":"https:\/\/www.hostrw.com\/kp\/en\/#website","url":"https:\/\/www.hostrw.com\/kp\/en\/","name":"HostRW Computer Service","description":"","publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostrw.com\/kp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization","name":"HostRW Computer Service","url":"https:\/\/www.hostrw.com\/kp\/en\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","width":189,"height":57,"caption":"HostRW Computer Service"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/hostrw"]},{"@type":"Person","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc","name":"Roelof","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","caption":"Roelof"},"url":"https:\/\/www.hostrw.com\/kp\/author\/roelof\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/comments?post=2968"}],"version-history":[{"count":1,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2968\/revisions"}],"predecessor-version":[{"id":2970,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2968\/revisions\/2970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media\/2969"}],"wp:attachment":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media?parent=2968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/categories?post=2968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/tags?post=2968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}