{"id":32861,"date":"2018-09-07T15:03:23","date_gmt":"2018-09-07T22:03:23","guid":{"rendered":"https:\/\/www.careersingovernment.com\/tools\/?p=32861"},"modified":"2018-09-07T15:03:49","modified_gmt":"2018-09-07T22:03:49","slug":"information-governance-insights-faq-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/","title":{"rendered":"Information Governance Insights: FAQ &#8211; Cybersecurity"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.13.1&#8243; background_image=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2018\/09\/cyber1.jpg&#8221; custom_padding=&#8221;24.3906px|0px|0px|0px&#8221;][et_pb_row custom_padding=&#8221;6px|0px|143px|0px&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221;][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.0.47&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221;][et_pb_text _builder_version=&#8221;3.13.1&#8243; text_font=&#8221;PT Sans||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;72&#8243; text_font_size_tablet=&#8221;52&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height=&#8221;1.1em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; max_width=&#8221;900px&#8221; module_alignment=&#8221;right&#8221; custom_margin=&#8221;0px||0px|&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Information Governance Insights: FAQ &#8211; Cybersecurity<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;0px|0px|24.3906px|0px&#8221;][et_pb_row use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; custom_padding=&#8221;35px||0px|&#8221; custom_padding_tablet=&#8221;0px|||&#8221; column_padding_mobile=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2017\/03\/robin-woolen.jpg&#8221; show_bottom_space=&#8221;off&#8221; align=&#8221;center&#8221; disabled_on=&#8221;on|on|&#8221; _builder_version=&#8221;3.0.74&#8243; animation=&#8221;off&#8221; sticky=&#8221;on&#8221;][\/et_pb_image][et_pb_text disabled_on=&#8221;on|on|&#8221; _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Sans|on|||&#8221; text_text_color=&#8221;#02b875&#8243; text_font_size=&#8221;20&#8243; text_line_height=&#8221;1.2em&#8221; header_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;140px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;20px||0px|&#8221;] <span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.careersingovernment.com\/tools\/author\/robinw\/\" target=\"_blank\" rel=\"noopener noreferrer\">ROBIN WOOLEN<\/a><\/span> [\/et_pb_text][et_pb_text disabled_on=&#8221;on|on|&#8221; _builder_version=&#8221;3.0.62&#8243; text_font=&#8221;PT Serif||on||&#8221; text_text_color=&#8221;#363636&#8243; text_font_size=&#8221;16&#8243; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; max_width=&#8221;140px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;10px||60px|&#8221;] Robin Woolen, MBA, IGP has worked in the field of information lifecycle management since 1994 with a specialty in strategic consulting focused on enterprise-scale information management. [\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_text _builder_version=&#8221;3.13.1&#8243; text_font=&#8221;PT Serif||||&#8221; text_text_color=&#8221;#363636&#8243; text_font_size=&#8221;24&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height=&#8221;1.5em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; max_width=&#8221;720px&#8221; custom_margin=&#8221;0px||0px|&#8221;]<span style=\"font-weight: 400;\">If you\u2019ve been working in the Information Governance field for a while there are certain questions that continue to pop up. Some you will have a standard answer for and some that will change over time as technology or best practices evolve. In this article I would like to continue the series and give you another question and how I answer it so you can be ready for them as well. This is a more recent one that is becoming more common:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity is a critical concern for any organization, what are the areas that you recommend be focused on to ensure these risks are mitigated?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I am firmly in the camp that says every organization will be hacked at some point. The technology that is used to build malware has advanced, just like all software, to the point where virtually anyone can purchase a malware engine with a simple user-friendly interface and create a hack in a matter of minutes. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">These packages are so prevalent that there are hundreds of thousands of hacking attempts every day when coupled with bots that can run all day, every day in an endless loop. \u00a0If you look at it from a purely business perspective and compare it, say, to the theory of bulk mail marketing where it only takes about five percent to be considered a success you can begin to see the advantage of this type of \u201cbusiness\u201d. Throw enough against the wall and some of it will eventually stick.<\/span><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.74&#8243; background_color=&#8221;#f7f7f4&#8243; custom_padding=&#8221;0px||0px|&#8221;][et_pb_row make_fullwidth=&#8221;on&#8221; custom_width_px=&#8221;680px&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding=&#8221;0px||0px|&#8221; make_equal=&#8221;on&#8221; column_padding_mobile=&#8221;on&#8221; background_color_2=&#8221;#efefe9&#8243; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2018\/09\/cyber2.jpg&#8221; show_bottom_space=&#8221;off&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.13.1&#8243; animation=&#8221;off&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; background_color=&#8221;#efefe9&#8243; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2018\/09\/cyber3.jpg&#8221; show_bottom_space=&#8221;off&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.13.1&#8243; animation=&#8221;off&#8221;][\/et_pb_image][et_pb_text disabled_on=&#8221;off|off|&#8221; _builder_version=&#8221;3.13.1&#8243; text_font=&#8221;PT Serif||||&#8221; text_text_color=&#8221;#818178&#8243; text_font_size=&#8221;24&#8243; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;20%|10%||10%&#8221; custom_margin_tablet=&#8221;|10%||10%&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221;]<span style=\"font-weight: 400;\">I am firmly in the camp that says every organization will be hacked at some point.<\/span><br \/>\n[\/et_pb_text][et_pb_text _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Sans|on|||&#8221; text_text_color=&#8221;#888888&#8243; text_font_size=&#8221;12&#8243; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.2em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;20px||20%|&#8221; custom_margin_tablet=&#8221;20px|||&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;] ROBIN WOOLEN [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;0px||0px|&#8221;][et_pb_row use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;1200px&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;4&#8243; custom_padding=&#8221;20px||0px|&#8221; custom_padding_tablet=&#8221;0px|||&#8221; column_padding_mobile=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; parallax_method_3=&#8221;off&#8221; parallax_method_4=&#8221;off&#8221; admin_label=&#8221;row&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_text _builder_version=&#8221;3.13.1&#8243; text_font=&#8221;||||&#8221; text_text_color=&#8221;#363636&#8243; text_font_size=&#8221;30px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;60px||0px|&#8221; custom_margin_tablet=&#8221;40px||0px|&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221;]<span style=\"font-weight: 400;\">Couple that with the reports that an average loss to an individual is $7,761 and while we do not know what the loss figure is for organizations, we do know from these same reports that cyber-attacks cost the average organization 1.3 million dollars in 2017. That\u2019s a lot of money for something that only needs about five percent to be considered a success.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This does not mean that organizations need to move massive amounts of money into purchasing cybersecurity software packages to beef up their current systems. Studies have shown that the most common attack began with a common fraudulent email opened by an unsuspecting member of the staff. This is known as \u201cphishing\u201d and it is used because it works, particularly when you send them out in the hundreds of thousands of email addresses at a time, and it only takes one person opening it to be effective. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Screening for these fraudulent emails can\u2019t be the sole responsibility of the Information Technology team simply because of the sheer amount of these attacks. It is vital that training and education focus on this area, along with a robust internal testing program, to ensure the entire staff actively understands how to guard against these attacks. Cybersecurity must become everyone\u2019s responsibility in order for it to be truly effective.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another cybersecurity issue I find often is one that is overlooked and that is the issue of deferred maintenance. Many organizations got a wakeup call with the Wannacry virus that attacked organizations and governments worldwide in May of 2017. The worm attacked systems through a known issue in Microsoft based operating systems. If you neglected to patch your systems before you contracted the virus, you were at its mercy. System maintenance is always a concern when it comes to budget planning time. This is not to say that there should not be limits or any oversight when upgrading systems to the latest service pack or version, but system maintenance should have a higher priority than it has in the past.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The same goes with the level of protection various systems get based on a risk assessment. With the Wannacry attack, for example, the Equifax credit reporting service guessed wrong with a relatively benign system on a customer service site. There is always a tightrope to walk on which system to decommission or upgrade, but it should be obvious that system maintenance needs to have a higher priority than it has in the past.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity can be intimidating, and many organizations can easily overreact with massive budget increases implementing the latest technology when it could be quite possible to protect the organization from the most common security threats in a much less costly way. Continual training and testing of the staff coupled with an improved system maintenance program can go a long way to ensure your organization is protected. There is always time to implement software if it is needed. Try the other steps first.<\/span><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;75px|0px|30px|0px&#8221;][et_pb_row use_custom_width=&#8221;on&#8221; custom_width_px=&#8221;780px&#8221; custom_padding=&#8221;0px|0px|73.90625px|0px&#8221; column_padding_mobile=&#8221;on&#8221; parallax_method_1=&#8221;off&#8221; _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_text _builder_version=&#8221;3.0.47&#8243; text_font=&#8221;PT Serif||||&#8221; text_text_color=&#8221;#363636&#8243; text_font_size=&#8221;36&#8243; text_font_size_tablet=&#8221;26&#8243; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height=&#8221;1.4em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||70px|&#8221;] Want new articles before they get published? Subscribe to our Awesome Newsletter. [\/et_pb_text][et_pb_contact_form captcha=&#8221;off&#8221; module_id=&#8221;et_pb_contact_form_0&#8243; _builder_version=&#8221;3.0.87&#8243; custom_button=&#8221;on&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#02b875&#8243; button_border_width=&#8221;8&#8243; button_border_color=&#8221;#02b875&#8243; button_border_radius=&#8221;4&#8243;][et_pb_contact_field field_id=&#8221;E-mail Address&#8221; field_title=&#8221;E-mail Address&#8221; field_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;3.0.87&#8243; form_field_font=&#8221;PT Sans||||&#8221; form_field_text_color=&#8221;#adadab&#8221; form_field_font_size=&#8221;20&#8243; form_field_font_size_tablet=&#8221;20&#8243; form_field_font_size_phone=&#8221;20&#8243; form_field_line_height=&#8221;1.4em&#8221; form_field_line_height_tablet=&#8221;1.4em&#8221; form_field_line_height_phone=&#8221;1.4em&#8221; border_radii=&#8221;on||||&#8221; border_width_all=&#8221;1&#8243; border_color_all=&#8221;#adadab&#8221; border_style_all=&#8221;solid&#8221; custom_css_main_element=&#8221;height:64px;&#8221; use_border_color=&#8221;on&#8221; border_color=&#8221;#adadab&#8221; border_width=&#8221;1&#8243; border_style=&#8221;solid&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;First Name&#8221; field_title=&#8221;First Name&#8221; field_background_color=&#8221;rgba(0,0,0,0)&#8221; _builder_version=&#8221;3.0.87&#8243; form_field_font=&#8221;PT Sans||||&#8221; form_field_text_color=&#8221;#adadab&#8221; form_field_font_size=&#8221;20&#8243; form_field_font_size_tablet=&#8221;20&#8243; form_field_font_size_phone=&#8221;20&#8243; form_field_line_height=&#8221;1.4em&#8221; form_field_line_height_tablet=&#8221;1.4em&#8221; form_field_line_height_phone=&#8221;1.4em&#8221; border_radii=&#8221;on||||&#8221; border_width_all=&#8221;1&#8243; border_color_all=&#8221;#adadab&#8221; border_style_all=&#8221;solid&#8221; custom_css_main_element=&#8221;height:64px;&#8221; use_border_color=&#8221;on&#8221; border_color=&#8221;#adadab&#8221; border_width=&#8221;1&#8243; border_style=&#8221;solid&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.0.74&#8243; background_color=&#8221;#222222&#8243; custom_padding=&#8221;78px||78px|&#8221;][et_pb_row make_fullwidth=&#8221;on&#8221; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding=&#8221;0px|0px|0px|0px&#8221; padding_mobile=&#8221;on&#8221; column_padding_mobile=&#8221;on&#8221; parallax_method_1=&#8221;off&#8221; parallax_method_2=&#8221;off&#8221; parallax_method_3=&#8221;off&#8221; parallax_method_4=&#8221;off&#8221; module_class=&#8221;border-hover&#8221; _builder_version=&#8221;3.0.47&#8243; background_color=&#8221;#f5f5f5&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2016\/11\/typing.jpg&#8221; show_bottom_space=&#8221;off&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.0.74&#8243; animation=&#8221;off&#8221; sticky=&#8221;on&#8221;][\/et_pb_image][et_pb_cta title=&#8221;CAREER ADVICE&#8221; button_url=&#8221;https:\/\/www.careersingovernment.com\/tools\/gov-talk\/career-advice\/&#8221; button_text=&#8221;CAREER ADVICE&#8221; _builder_version=&#8221;3.0.47&#8243; header_font_size=&#8221;30px&#8221; body_font_size=&#8221;20px&#8221; use_background_color=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;] Advice from top Career specialists [\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2016\/11\/news-cig.jpg&#8221; show_bottom_space=&#8221;off&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.0.74&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; sticky=&#8221;on&#8221;][\/et_pb_image][et_pb_cta title=&#8221;GOV TALK&#8221; button_url=&#8221;https:\/\/www.careersingovernment.com\/tools\/gov-talk-page\/&#8221; button_text=&#8221;Government Updates&#8221; _builder_version=&#8221;3.0.47&#8243; header_font_size=&#8221;30px&#8221; body_font_size=&#8221;20px&#8221; use_background_color=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;] Articles about the Public Sector [\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.0.47&#8243; column_padding_mobile=&#8221;on&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;off&#8221;][et_pb_image src=&#8221;https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2016\/11\/public-secot-trends.jpg&#8221; show_bottom_space=&#8221;off&#8221; align=&#8221;center&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;3.0.74&#8243; animation=&#8221;off&#8221; sticky=&#8221;on&#8221;][\/et_pb_image][et_pb_cta title=&#8221;TRENDS&#8221; button_url=&#8221;https:\/\/www.careersingovernment.com\/tools\/hr-tips-and-strategies\/&#8221; button_text=&#8221;TRENDS&#8221; _builder_version=&#8221;3.0.47&#8243; header_font_size=&#8221;30px&#8221; body_font_size=&#8221;20px&#8221; use_background_color=&#8221;off&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;] Public Sector Trends [\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve been working in the Information Governance field for a while there are certain questions that continue to pop up. Some you will have a standard answer for and some that will change over time as technology or best practices evolve. In this article I would like to continue the series and give you another question and how I answer it so you can be ready for them as well.<\/p>\n","protected":false},"author":3025,"featured_media":32862,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_cbd_carousel_blocks":"[]","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13],"tags":[604],"class_list":["post-32861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-about-gov","tag-information-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Governance Insights: FAQ - Cybersecurity - Careers in Government<\/title>\n<meta name=\"description\" content=\"Cybersecurity is a critical concern for any organization, what are the areas that you recommend be focused on to ensure these risks are mitigated?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Governance Insights: FAQ - Cybersecurity - Careers in Government\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is a critical concern for any organization, what are the areas that you recommend be focused on to ensure these risks are mitigated?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Careers in Government\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CareersInGovernment\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-07T22:03:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-09-07T22:03:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2018\/09\/cyber1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Robin Woolen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TheRecordsGuru\" \/>\n<meta name=\"twitter:site\" content=\"@careersingov\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Robin Woolen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/\"},\"author\":{\"name\":\"Robin Woolen\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/person\\\/ec95718fa854647f303538bd817f572f\"},\"headline\":\"Information Governance Insights: FAQ &#8211; Cybersecurity\",\"datePublished\":\"2018-09-07T22:03:23+00:00\",\"dateModified\":\"2018-09-07T22:03:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/\"},\"wordCount\":2398,\"publisher\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/cyber1.jpg\",\"keywords\":[\"Information Technology\"],\"articleSection\":[\"About the Public Sector\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/\",\"name\":\"Information Governance Insights: FAQ - Cybersecurity - Careers in Government\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/cyber1.jpg\",\"datePublished\":\"2018-09-07T22:03:23+00:00\",\"dateModified\":\"2018-09-07T22:03:49+00:00\",\"description\":\"Cybersecurity is a critical concern for any organization, what are the areas that you recommend be focused on to ensure these risks are mitigated?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/cyber1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/cyber1.jpg\",\"width\":1000,\"height\":563,\"caption\":\"A man in a white shirt sits at a desk with multiple computer monitors displaying world maps and data, immersed in a cybersecurity environment. The room has a dark, modern aesthetic with a large server rack in the background, emphasizing its role in cyber defense.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/gov-talk\\\/about-gov\\\/information-governance-insights-faq-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Tools\",\"item\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Government Talk\",\"item\":\"https:\\\/\\\/www.careersingovernment.com\\\/newdesign\\\/tools\\\/gov-talk\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"About the Public Sector\",\"item\":\"https:\\\/\\\/www.careersingovernment.com\\\/newdesign\\\/tools\\\/gov-talk\\\/about-gov\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Governance Insights: FAQ &#8211; Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#website\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/\",\"name\":\"Careers in Government\",\"description\":\"Oldest and largest, award-winning site for finding jobs in government, education and other public sector agencies. Valuable tools for job seekers and employers.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#organization\",\"name\":\"Careers in Government\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/CIG-horizontal-dark-v2.png\",\"contentUrl\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/CIG-horizontal-dark-v2.png\",\"width\":\"708\",\"height\":\"480\",\"caption\":\"Careers in Government\"},\"image\":{\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CareersInGovernment\",\"https:\\\/\\\/x.com\\\/careersingov\",\"https:\\\/\\\/www.instagram.com\\\/careersingov\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/#\\\/schema\\\/person\\\/ec95718fa854647f303538bd817f572f\",\"name\":\"Robin Woolen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g\",\"caption\":\"Robin Woolen\"},\"description\":\"Robin Woolen, MBA, IGP has worked in the field of information lifecycle management since 1994 with a specialty in strategic consulting focused on enterprise-scale information management systems. His career includes both Public and Private sectors with a client list from the nation\u2019s top 25 cities and the Fortune 500. Mr. Woolen is a recognized leader in the field of information governance and a national speaker teaching others how to improve their own programs. Mr. Woolen holds a Masters of Business Administration in Management of Information Systems from Park University and is a certified Information Governance Professional from ARMA International, the authority on governing information as a strategic asset.\",\"sameAs\":[\"http:\\\/\\\/www.TheRecordsGuru.com\",\"https:\\\/\\\/x.com\\\/TheRecordsGuru\"],\"url\":\"https:\\\/\\\/www.careersingovernment.com\\\/tools\\\/author\\\/robinw\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Governance Insights: FAQ - Cybersecurity - Careers in Government","description":"Cybersecurity is a critical concern for any organization, what are the areas that you recommend be focused on to ensure these risks are mitigated?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Information Governance Insights: FAQ - Cybersecurity - Careers in Government","og_description":"Cybersecurity is a critical concern for any organization, what are the areas that you recommend be focused on to ensure these risks are mitigated?","og_url":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/","og_site_name":"Careers in Government","article_publisher":"https:\/\/www.facebook.com\/CareersInGovernment","article_published_time":"2018-09-07T22:03:23+00:00","article_modified_time":"2018-09-07T22:03:49+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2018\/09\/cyber1.jpg","type":"image\/jpeg"}],"author":"Robin Woolen","twitter_card":"summary_large_image","twitter_creator":"@TheRecordsGuru","twitter_site":"@careersingov","twitter_misc":{"Written by":"Robin Woolen","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/"},"author":{"name":"Robin Woolen","@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/person\/ec95718fa854647f303538bd817f572f"},"headline":"Information Governance Insights: FAQ &#8211; Cybersecurity","datePublished":"2018-09-07T22:03:23+00:00","dateModified":"2018-09-07T22:03:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/"},"wordCount":2398,"publisher":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#organization"},"image":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2018\/09\/cyber1.jpg","keywords":["Information Technology"],"articleSection":["About the Public Sector"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/","url":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/","name":"Information Governance Insights: FAQ - Cybersecurity - Careers in Government","isPartOf":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2018\/09\/cyber1.jpg","datePublished":"2018-09-07T22:03:23+00:00","dateModified":"2018-09-07T22:03:49+00:00","description":"Cybersecurity is a critical concern for any organization, what are the areas that you recommend be focused on to ensure these risks are mitigated?","breadcrumb":{"@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/#primaryimage","url":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2018\/09\/cyber1.jpg","contentUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2018\/09\/cyber1.jpg","width":1000,"height":563,"caption":"A man in a white shirt sits at a desk with multiple computer monitors displaying world maps and data, immersed in a cybersecurity environment. The room has a dark, modern aesthetic with a large server rack in the background, emphasizing its role in cyber defense."},{"@type":"BreadcrumbList","@id":"https:\/\/www.careersingovernment.com\/tools\/gov-talk\/about-gov\/information-governance-insights-faq-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Tools","item":"https:\/\/www.careersingovernment.com\/tools\/"},{"@type":"ListItem","position":2,"name":"Government Talk","item":"https:\/\/www.careersingovernment.com\/newdesign\/tools\/gov-talk\/"},{"@type":"ListItem","position":3,"name":"About the Public Sector","item":"https:\/\/www.careersingovernment.com\/newdesign\/tools\/gov-talk\/about-gov\/"},{"@type":"ListItem","position":4,"name":"Information Governance Insights: FAQ &#8211; Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.careersingovernment.com\/tools\/#website","url":"https:\/\/www.careersingovernment.com\/tools\/","name":"Careers in Government","description":"Oldest and largest, award-winning site for finding jobs in government, education and other public sector agencies. Valuable tools for job seekers and employers.","publisher":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.careersingovernment.com\/tools\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.careersingovernment.com\/tools\/#organization","name":"Careers in Government","url":"https:\/\/www.careersingovernment.com\/tools\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/logo\/image\/","url":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2024\/11\/CIG-horizontal-dark-v2.png","contentUrl":"https:\/\/www.careersingovernment.com\/tools\/wp-content\/uploads\/2024\/11\/CIG-horizontal-dark-v2.png","width":"708","height":"480","caption":"Careers in Government"},"image":{"@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CareersInGovernment","https:\/\/x.com\/careersingov","https:\/\/www.instagram.com\/careersingov\/"]},{"@type":"Person","@id":"https:\/\/www.careersingovernment.com\/tools\/#\/schema\/person\/ec95718fa854647f303538bd817f572f","name":"Robin Woolen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36c2000eef487883cfb1e655a9a5ac31f3a7b23e973f79fefe4b2fa4578bd15b?s=96&d=mm&r=g","caption":"Robin Woolen"},"description":"Robin Woolen, MBA, IGP has worked in the field of information lifecycle management since 1994 with a specialty in strategic consulting focused on enterprise-scale information management systems. His career includes both Public and Private sectors with a client list from the nation\u2019s top 25 cities and the Fortune 500. Mr. Woolen is a recognized leader in the field of information governance and a national speaker teaching others how to improve their own programs. Mr. Woolen holds a Masters of Business Administration in Management of Information Systems from Park University and is a certified Information Governance Professional from ARMA International, the authority on governing information as a strategic asset.","sameAs":["http:\/\/www.TheRecordsGuru.com","https:\/\/x.com\/TheRecordsGuru"],"url":"https:\/\/www.careersingovernment.com\/tools\/author\/robinw\/"}]}},"_links":{"self":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts\/32861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/users\/3025"}],"replies":[{"embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/comments?post=32861"}],"version-history":[{"count":5,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts\/32861\/revisions"}],"predecessor-version":[{"id":32887,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/posts\/32861\/revisions\/32887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/media\/32862"}],"wp:attachment":[{"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/media?parent=32861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/categories?post=32861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.careersingovernment.com\/tools\/wp-json\/wp\/v2\/tags?post=32861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}