{"id":987497183,"date":"2024-10-30T15:26:59","date_gmt":"2024-10-30T14:26:59","guid":{"rendered":"https:\/\/tyrex-cyber.com\/cybersecurite-industrielle-comment-la-renforcer\/"},"modified":"2024-10-30T15:35:22","modified_gmt":"2024-10-30T14:35:22","slug":"industrial-cyber-security-how-can-it-be-strengthened","status":"publish","type":"post","link":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/","title":{"rendered":"Industrial cyber security: how can it be strengthened?"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Cybersecurity in the industrial sector is now more important than ever. According to a study conducted by Wavestone for the 2022 and 2025 Industry 4.0 Barometer, 33% of industrial companies have already suffered damage as a result of a cyber attack, and 84% believe that cyber security is vital to the success of their projects. This figure underlines the importance of securing the digital infrastructures of industrial companies, which are increasingly connected and vulnerable to cyber attacks.<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Cybersecurity in industry: what are the challenges?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">The digital transformation of industry has brought many benefits, including process automation, real-time data analysis and improved overall performance. However, it has also increased the attack surface for cybercriminals. Industrial equipment, often connected to external networks, can become vulnerable targets.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A successful cyber attack can lead to production interruptions, leaks of sensitive data and even threats to the physical safety of employees. Industrial control systems (ICS), SCADA networks and connected objects (IoT) used in factories are particularly vulnerable to cyber threats, as they are often less secure than traditional IT infrastructures. As a result, a lack of cybersecurity can lead to financial losses and seriously affect companies&#8217; reputations.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Some recent attacks show the scale of the potential damage and the need to strengthen industrial cyber security.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For example, the Triton attack on Schneider Electric at the end of 2017 marked a turning point in the history of industrial cybersecurity. For the first time, hackers managed to take control of the security system of a petrochemical site in Saudi Arabia and put the safety of operations at risk. This innovative attack infiltrated a plant&#8217;s command and control system, using the on-site IT infrastructure as an entry point. By exploiting the plant&#8217;s operational (OT) and information technology (IT) technologies, the cybercriminals demonstrated the vulnerability of interconnected networks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Similarly, the NotPetya attack in June 2017 caused massive financial damage to several major global companies, including Saint-Gobain in France. The ransomware brought systems to a halt, causing the company&#8217;s industrial facilities to be unavailable for several days. Financial losses for Saint-Gobain were estimated at around \u20ac250 million.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Read also:\u00a0<\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/4-legendary-cyberattacks\/\"><span style=\"font-weight: 400\">4 legendary cyber attacks that left their mark<\/span><\/a><\/p>\n<h2><span style=\"font-weight: 400\">Protecting your equipment and projects: how do you set up an industrial cyber security system?<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">To reduce the risk of cyber attacks and protect critical systems, industrial companies need to deploy cyber security solutions tailored to their needs. Here are\u00a0<\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/cybersecurite-5-gestes-cles-en-entreprise-ou-collectivite-2\/\"><span style=\"font-weight: 400\">a few good ways to strengthen cybersecurity<\/span><\/a><span style=\"font-weight: 400\">\u00a0in industry.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Install USB decontamination stations<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">USB devices are often used in industrial environments to transfer data, but they are also a source of malware contamination. A USB decontamination station can be used to check each USB device before it is inserted into industrial equipment, detecting and removing any viruses or malware. These stations can be installed at network entry points to ensure that no infected devices compromise the system.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To strengthen their security, industries can therefore protect all their removable media by installing one or more decontamination stations, such as those offered by TYREX. By analysing USB devices, our white stations detect and eliminate threats, ensuring secure connections.<\/span><\/p>\n<p><a href=\"https:\/\/tyrex-cyber.com\/en\/la-solution\/\"><b>Discover TYREX solutions<\/b><\/a><\/p>\n<h3><span style=\"font-weight: 400\">Installing antivirus software<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">The use of antivirus software may seem obvious, but in the industrial sector it is sometimes overlooked. An anti-virus adapted to industrial environments must be able to detect threats specific to control systems and connected equipment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Regular antivirus updates are also essential to maintain a high level of protection. Modern antivirus software often includes functions for detecting abnormal behaviour, which makes it possible\u00a0<\/span><a href=\"https:\/\/tyrex-cyber.com\/en\/what-are-the-main-categories-of-malware\/\"><span style=\"font-weight: 400\">to identify unknown malware<\/span><\/a><span style=\"font-weight: 400\">\u00a0and zero-day attacks.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Choose a secure server<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Industrial companies should opt for secure servers capable of managing critical data and resisting intrusion attempts. A secure server guarantees data integrity and allows access to be restricted to authorised personnel only.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">It is also important to deploy network segmentation solutions to limit the spread of any intrusion across the entire infrastructure. Segmentation makes it possible to contain an attack and protect the essential parts of the system in the event of a security failure in one sector of the network.<\/span><\/p>\n<h3><span style=\"font-weight: 400\">Raising staff awareness of industrial cyber security<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">Finally, employees play a central role in industrial cyber security. Human error accounts for a large proportion of security breaches. Regular training must be put in place to help employees:\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400\">understand cyber risks<\/span><\/li>\n<li><span style=\"font-weight: 400\">recognise phishing attempts<\/span><\/li>\n<li><span style=\"font-weight: 400\">use tools securely.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">A well-established culture of cyber security is one of the best defences against cyber attacks.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out about the challenges of industrial cybersecurity and the best ways to protect your business against constantly evolving cyberthreats.<\/p>\n","protected":false},"author":7,"featured_media":987497178,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-987497183","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrial cyber security: how can it be strengthened? - TYREX - d\u00e9contamination USB<\/title>\n<meta name=\"description\" content=\"Find out about the challenges of industrial cybersecurity and the best ways to protect your business against constantly evolving cyberthreats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial cyber security: how can it be strengthened? - TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"og:description\" content=\"Find out about the challenges of industrial cybersecurity and the best ways to protect your business against constantly evolving cyberthreats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/\" \/>\n<meta property=\"og:site_name\" content=\"TYREX - d\u00e9contamination USB\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-30T14:26:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-30T14:35:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"778\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre-Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre-Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/\"},\"author\":{\"name\":\"Alexandre-Admin\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\"},\"headline\":\"Industrial cyber security: how can it be strengthened?\",\"datePublished\":\"2024-10-30T14:26:59+00:00\",\"dateModified\":\"2024-10-30T14:35:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/\"},\"wordCount\":744,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/\",\"name\":\"Industrial cyber security: how can it be strengthened? - TYREX - d\u00e9contamination USB\",\"isPartOf\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg\",\"datePublished\":\"2024-10-30T14:26:59+00:00\",\"dateModified\":\"2024-10-30T14:35:22+00:00\",\"description\":\"Find out about the challenges of industrial cybersecurity and the best ways to protect your business against constantly evolving cyberthreats.\",\"breadcrumb\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#primaryimage\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg\",\"width\":1280,\"height\":778,\"caption\":\"Industrie cyber\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tyrex-cyber.com\/en\/accueil\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industrial cyber security: how can it be strengthened?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#website\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"name\":\"TYREX - d\u00e9contamination USB\",\"description\":\"TYREX - d\u00e9contamination USB\",\"publisher\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#organization\",\"name\":\"TYREX - d\u00e9contamination USB\",\"url\":\"https:\/\/tyrex-cyber.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"contentUrl\":\"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png\",\"width\":4000,\"height\":4118,\"caption\":\"TYREX - d\u00e9contamination USB\"},\"image\":{\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b\",\"name\":\"Alexandre-Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g\",\"caption\":\"Alexandre-Admin\"},\"url\":\"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial cyber security: how can it be strengthened? - TYREX - d\u00e9contamination USB","description":"Find out about the challenges of industrial cybersecurity and the best ways to protect your business against constantly evolving cyberthreats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/","og_locale":"en_US","og_type":"article","og_title":"Industrial cyber security: how can it be strengthened? - TYREX - d\u00e9contamination USB","og_description":"Find out about the challenges of industrial cybersecurity and the best ways to protect your business against constantly evolving cyberthreats.","og_url":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/","og_site_name":"TYREX - d\u00e9contamination USB","article_published_time":"2024-10-30T14:26:59+00:00","article_modified_time":"2024-10-30T14:35:22+00:00","og_image":[{"width":1280,"height":778,"url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg","type":"image\/jpeg"}],"author":"Alexandre-Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alexandre-Admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#article","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/"},"author":{"name":"Alexandre-Admin","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b"},"headline":"Industrial cyber security: how can it be strengthened?","datePublished":"2024-10-30T14:26:59+00:00","dateModified":"2024-10-30T14:35:22+00:00","mainEntityOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/"},"wordCount":744,"commentCount":0,"publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/","url":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/","name":"Industrial cyber security: how can it be strengthened? - TYREX - d\u00e9contamination USB","isPartOf":{"@id":"https:\/\/tyrex-cyber.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#primaryimage"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#primaryimage"},"thumbnailUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg","datePublished":"2024-10-30T14:26:59+00:00","dateModified":"2024-10-30T14:35:22+00:00","description":"Find out about the challenges of industrial cybersecurity and the best ways to protect your business against constantly evolving cyberthreats.","breadcrumb":{"@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#primaryimage","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2024\/10\/workers-5246634_1280.jpg","width":1280,"height":778,"caption":"Industrie cyber"},{"@type":"BreadcrumbList","@id":"https:\/\/tyrex-cyber.com\/en\/industrial-cyber-security-how-can-it-be-strengthened\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tyrex-cyber.com\/en\/accueil\/"},{"@type":"ListItem","position":2,"name":"Industrial cyber security: how can it be strengthened?"}]},{"@type":"WebSite","@id":"https:\/\/tyrex-cyber.com\/en\/#website","url":"https:\/\/tyrex-cyber.com\/en\/","name":"TYREX - d\u00e9contamination USB","description":"TYREX - d\u00e9contamination USB","publisher":{"@id":"https:\/\/tyrex-cyber.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tyrex-cyber.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/tyrex-cyber.com\/en\/#organization","name":"TYREX - d\u00e9contamination USB","url":"https:\/\/tyrex-cyber.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","contentUrl":"https:\/\/tyrex-cyber.com\/wp-content\/uploads\/2023\/03\/LOGO_TYREX_ORIGAMI.png","width":4000,"height":4118,"caption":"TYREX - d\u00e9contamination USB"},"image":{"@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/494cb34ab6d06698e081feeb85b9ba2b","name":"Alexandre-Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tyrex-cyber.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/772a8bc1328aafc592332743498f617abf6532346d37b2ecf83a38809703488d?s=96&d=mm&r=g","caption":"Alexandre-Admin"},"url":"https:\/\/tyrex-cyber.com\/en\/author\/alexandre\/"}]}},"_links":{"self":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/comments?post=987497183"}],"version-history":[{"count":4,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497183\/revisions"}],"predecessor-version":[{"id":987497190,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/posts\/987497183\/revisions\/987497190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media\/987497178"}],"wp:attachment":[{"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/media?parent=987497183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/categories?post=987497183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tyrex-cyber.com\/en\/wp-json\/wp\/v2\/tags?post=987497183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}