
{"id":6831,"date":"2021-11-12T10:42:12","date_gmt":"2021-11-12T03:42:12","guid":{"rendered":"https:\/\/manufacturing-review.com\/?p=6831"},"modified":"2021-11-12T10:43:22","modified_gmt":"2021-11-12T03:43:22","slug":"how-toprotect-industrial-security-intheage-of-hybrid-working","status":"publish","type":"post","link":"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/","title":{"rendered":"How toprotect industrial security intheage of hybrid working"},"content":{"rendered":"<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><strong><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-6832 aligncenter\" src=\"https:\/\/manufacturing-review.com\/wp-content\/uploads\/2021\/11\/Tim-Grieveson-Chief-Information-Security-Officer-AVEVA-225x300.jpg\" alt=\"\" width=\"225\" height=\"300\" srcset=\"https:\/\/manufacturing-review.com\/wp-content\/uploads\/2021\/11\/Tim-Grieveson-Chief-Information-Security-Officer-AVEVA-225x300.jpg 225w, https:\/\/manufacturing-review.com\/wp-content\/uploads\/2021\/11\/Tim-Grieveson-Chief-Information-Security-Officer-AVEVA-768x1024.jpg 768w, https:\/\/manufacturing-review.com\/wp-content\/uploads\/2021\/11\/Tim-Grieveson-Chief-Information-Security-Officer-AVEVA-600x800.jpg 600w, https:\/\/manufacturing-review.com\/wp-content\/uploads\/2021\/11\/Tim-Grieveson-Chief-Information-Security-Officer-AVEVA-700x933.jpg 700w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/span><\/span><\/strong><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><strong><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">How to<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">protect industrial security in<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">the<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">age of hybrid work<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">ing<\/span><\/span><\/strong><\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><strong><em><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">With cybercrime attacks<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">rising steeply<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">in recent months<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">,<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">revisiting and revising your company\u2019s<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">security<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">strategy<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">is<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">essential, says<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><\/span><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Tim Grieveson, CISO, AVEVA<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/em><\/strong><\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Gl<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">obal cyber breaches have reached<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">record levels in recent months.<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">As the pandemic subsides, new hybrid working models are here to stay \u2013\u202falong with a globally widened attack surface for businesses.<\/span><\/span><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-GB\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-GB\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Cybercriminals have become acutely attuned to exploiting every stage of the pandemic, calculating how they can tap loopholes in new working methods and processes for their own gain. The annual State of The Phish report from Proofpoint reports an \u201cexplosion of pandemic-themed phishing scams\u201d and a continued surge in ransomware attacks.\u00a0<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">What\u2019s more,<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Internet of Things<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">attacks specifically are on course to quadruple, having crossed the<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><\/span><a class=\"x_x_x_Hyperlink x_x_x_SCXW36834007 x_x_x_BCX4\" href=\"https:\/\/www.iotworldtoday.com\/2021\/09\/17\/iot-cyberattacks-escalate-in-2021-according-to-kaspersky\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-auth=\"NotApplicable\" data-linkindex=\"2\"><span class=\"x_x_x_TextRun x_x_x_Underlined x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">1.51 billion<\/span><\/span><\/a><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">mark in the first half of this year as compared to 639 million in 2020, Kaspersky data shows.\u00a0<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">As such, security leaders must raise awareness across their organizations, and empower individuals to do their part.<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Now is the time to ramp up enterprise cybersecurity practices and work with employees to help minimize the risks.<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">In the context of<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><\/span><a class=\"x_x_x_Hyperlink x_x_x_SCXW36834007 x_x_x_BCX4\" href=\"https:\/\/staysafeonline.org\/cybersecurity-awareness-month\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-auth=\"NotApplicable\" data-linkindex=\"3\"><span class=\"x_x_x_TextRun x_x_x_Underlined x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Cybersecurity Awareness Month<\/span><\/span><\/a><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">, AVEVA highlights five<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">key strategies to help ind<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">ustrial organizations stay<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">ahead<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">of cyber criminals.<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><strong><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Revise your<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">endpoint strategy<\/span><\/span><\/strong><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">As hybrid working continues to become the norm, the number of endpoints is<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">li<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">kely to expand over the future. S<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">ecurity leaders can mitigate<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">current<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">threats by implement<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">ing<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">a unified endpoint management strategy that does not rely on internet connectivity. Endpoint security can no longer be a bolt-on<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">solution but<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">must be seamlessly incorporated into prevailing security architecture,<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">facilitating a<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">coordinated<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">approach to incident management.\u00a0<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><strong><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Implement tiered access\u00a0<\/span><\/span><\/strong><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">The principle of leas<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">t<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">privilege management determines which individuals within an organization can view sensitive information. Access is limited to a small number of C-level users and to those who need it<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">to<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">perform their jobs. The strategy reduces the attack surface available to hackers.<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Network segmentation, privileged identity management and systems hardening are some routes to implementing least privilege management.\u00a0<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><strong><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Beef up threat response capacity<\/span><\/span><\/strong><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Building out dedicated threat detection and response capabilities against advanced persistent threats will help the enterprise identify targeted attacks and stop them before significant damage occurs. Automated detection systems can gather security and event data from endpoint devices across the network and provide the visibility required to stay ahead of emerging threats.\u00a0<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><strong><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Patch it up<\/span><\/span><\/strong><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Regular patch management ensures that all organizational software is up to date and that known vulnerabilities have been fixed. Similarly, compliance measures protect the confidentiality and integrity of data. Updating SCADA and ICS systems in line with advisories from<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><\/span><span class=\"x_x_x_TextRun x_x_x_Highlight x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">t<\/span><\/span><span class=\"x_x_x_TextRun x_x_x_Highlight x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-GB\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">he US Cybersecurity Incident Security Agency<\/span><\/span><span class=\"x_x_x_TextRun x_x_x_Highlight x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">will<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><\/span><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">ensure both aspects are taken care of and keep organizations<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">abreast<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">of the hackers.\u00a0<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><strong><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">T<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">raining<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">and more training<\/span><\/span><\/strong><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">As simple as it sounds, training up your staff can prevent the large majority of attacks breaking through.<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">The National Cybersecurity Alliance recommends that cybersecurity be made part of employee onboarding, and that sta<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">ff are trained to be mindful of<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">cybersecurity as they log onto IT and OT systems each day.<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"x_x_x_OutlineElement x_x_x_Ltr x_x_x_SCXW36834007 x_x_x_BCX4\">\n<p class=\"x_x_x_Paragraph x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_TextRun x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">Deloitte estimates that<\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><\/span><span class=\"x_x_x_TextRun x_x_x_Highlight x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-GB\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">40 per cent of manufacturing firms experienced a cyber-attack last year, with 38 per cent of those suffering from over $1 million in damage<\/span><\/span><span class=\"x_x_x_TextRun x_x_x_Highlight x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">s<\/span><\/span><span class=\"x_x_x_TextRun x_x_x_Highlight x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-GB\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">.<\/span><\/span><span class=\"x_x_x_TextRun x_x_x_Highlight x_x_x_SCXW36834007 x_x_x_BCX4\" lang=\"EN-US\"><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\"><span class=\"x_x_x_Apple-converted-space\">\u00a0<\/span><\/span><span class=\"x_x_x_NormalTextRun x_x_x_SCXW36834007 x_x_x_BCX4\">With so much at stake, it is everyone\u2019s responsibility to help build a safer and more resilient world.\u00a0<\/span><\/span><span class=\"x_x_x_EOP x_x_x_SCXW36834007 x_x_x_BCX4\">\u00a0<\/span><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; How toprotect industrial security intheage of hybrid working \u00a0 &nbsp; With cybercrime attacks\u00a0rising steeply\u00a0in recent months,\u00a0revisiting and revising your company\u2019s\u00a0security\u00a0strategy\u00a0is\u00a0essential, says\u00a0Tim Grieveson, CISO, AVEVA\u00a0 \u00a0 &nbsp; Global cyber breaches have reached\u00a0record levels in recent months.\u00a0As the pandemic subsides,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6832,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_links_to":"","_links_to_target":""},"categories":[14],"tags":[1096],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How toprotect industrial security intheage of hybrid working - Manufacturing Review<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How toprotect industrial security intheage of hybrid working - Manufacturing Review\" \/>\n<meta property=\"og:description\" content=\"&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; How toprotect industrial security intheage of hybrid working \u00a0 &nbsp; With cybercrime attacks\u00a0rising steeply\u00a0in recent months,\u00a0revisiting and revising your company\u2019s\u00a0security\u00a0strategy\u00a0is\u00a0essential, says\u00a0Tim Grieveson, CISO, AVEVA\u00a0 \u00a0 &nbsp; Global cyber breaches have reached\u00a0record levels in recent months.\u00a0As the pandemic subsides,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/\" \/>\n<meta property=\"og:site_name\" content=\"Manufacturing Review\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-12T03:42:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-12T03:43:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/manufacturing-review.com\/wp-content\/uploads\/2021\/11\/Tim-Grieveson-Chief-Information-Security-Officer-AVEVA-768x1024.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/\",\"url\":\"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/\",\"name\":\"How toprotect industrial security intheage of hybrid working - Manufacturing Review\",\"isPartOf\":{\"@id\":\"https:\/\/manufacturing-review.com\/#website\"},\"datePublished\":\"2021-11-12T03:42:12+00:00\",\"dateModified\":\"2021-11-12T03:43:22+00:00\",\"author\":{\"@id\":\"https:\/\/manufacturing-review.com\/#\/schema\/person\/51946b4afd6c6dae9baea1bd2150c646\"},\"breadcrumb\":{\"@id\":\"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/manufacturing-review.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How toprotect industrial security intheage of hybrid working\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/manufacturing-review.com\/#website\",\"url\":\"https:\/\/manufacturing-review.com\/\",\"name\":\"Manufacturing Review\",\"description\":\"Manufacturing Review\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/manufacturing-review.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/manufacturing-review.com\/#\/schema\/person\/51946b4afd6c6dae9baea1bd2150c646\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/manufacturing-review.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bcb2299908f941d18c8c8311babe313c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bcb2299908f941d18c8c8311babe313c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/manufacturing-review.com\/en\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How toprotect industrial security intheage of hybrid working - Manufacturing Review","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/","og_locale":"en_US","og_type":"article","og_title":"How toprotect industrial security intheage of hybrid working - Manufacturing Review","og_description":"&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; How toprotect industrial security intheage of hybrid working \u00a0 &nbsp; With cybercrime attacks\u00a0rising steeply\u00a0in recent months,\u00a0revisiting and revising your company\u2019s\u00a0security\u00a0strategy\u00a0is\u00a0essential, says\u00a0Tim Grieveson, CISO, AVEVA\u00a0 \u00a0 &nbsp; Global cyber breaches have reached\u00a0record levels in recent months.\u00a0As the pandemic subsides,...","og_url":"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/","og_site_name":"Manufacturing Review","article_published_time":"2021-11-12T03:42:12+00:00","article_modified_time":"2021-11-12T03:43:22+00:00","og_image":[{"width":768,"height":1024,"url":"https:\/\/manufacturing-review.com\/wp-content\/uploads\/2021\/11\/Tim-Grieveson-Chief-Information-Security-Officer-AVEVA-768x1024.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/","url":"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/","name":"How toprotect industrial security intheage of hybrid working - Manufacturing Review","isPartOf":{"@id":"https:\/\/manufacturing-review.com\/#website"},"datePublished":"2021-11-12T03:42:12+00:00","dateModified":"2021-11-12T03:43:22+00:00","author":{"@id":"https:\/\/manufacturing-review.com\/#\/schema\/person\/51946b4afd6c6dae9baea1bd2150c646"},"breadcrumb":{"@id":"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/manufacturing-review.com\/en\/how-toprotect-industrial-security-intheage-of-hybrid-working\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/manufacturing-review.com\/"},{"@type":"ListItem","position":2,"name":"How toprotect industrial security intheage of hybrid working"}]},{"@type":"WebSite","@id":"https:\/\/manufacturing-review.com\/#website","url":"https:\/\/manufacturing-review.com\/","name":"Manufacturing Review","description":"Manufacturing Review","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/manufacturing-review.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/manufacturing-review.com\/#\/schema\/person\/51946b4afd6c6dae9baea1bd2150c646","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/manufacturing-review.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bcb2299908f941d18c8c8311babe313c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bcb2299908f941d18c8c8311babe313c?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/manufacturing-review.com\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/posts\/6831"}],"collection":[{"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/comments?post=6831"}],"version-history":[{"count":0,"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/posts\/6831\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/media\/6832"}],"wp:attachment":[{"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/media?parent=6831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/categories?post=6831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/manufacturing-review.com\/en\/wp-json\/wp\/v2\/tags?post=6831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}