{"id":20934,"date":"2024-11-06T11:13:47","date_gmt":"2024-11-06T09:13:47","guid":{"rendered":"https:\/\/digitalschoolofmarketing.co.za\/?p=20934"},"modified":"2024-11-13T10:03:47","modified_gmt":"2024-11-13T08:03:47","slug":"advanced-network-cyber-security-techniques","status":"publish","type":"post","link":"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/advanced-network-cyber-security-techniques\/","title":{"rendered":"Advanced Network Cyber Security Techniques"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_3-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Professional cybersecurity has grown increasingly complicated in today&#8217;s connected world, presenting advanced cybersecurity solutions for companies and individuals. Good computer security is not just about preventing unauthorised access but also about protecting sensitive data and establishing trust.<\/p>\n<h2><strong>The Importance of Layered CyberSecurity<\/strong><\/h2>\n<p>The institution needs a multilayered <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security<\/a> plan to create a secure network, otherwise known as &#8220;defence in depth. \u201cUsing diverse security controls at various levels will make it more difficult for attackers to penetrate all defences. The parts that the method consists of are:<\/p>\n<p>Network firewalls and intrusion detection systems (IDS): Firewalls read and block malicious data in packets of both inbound and outbound network traffic. When integrated with intrusion detection systems (IDS), these systems also form a robust defence that searches data moving over the network on a loop for abnormal behaviour.<\/p>\n<p>Data Protection: If someone steals data, they cannot access private data without the encryption key.<\/p>\n<p>Endpoint Security: Installing security software on computers, cell phones, and tablets protects our systems from malware, ransomware, and phishing attacks<\/p>\n<p>Multi-Factor Authentication (MFA): MFA increases security by requiring users to provide two or more authentication factors to establish their identity before accessing the network.<\/p>\n<p>Defence in-depth\/layered Digital Security: If one thing fails, there will be other options for keeping people out of the network. It helps to protect the network.<\/p>\n<h2><strong>Threat Intelligence for Proactive Cyber Security<\/strong><\/h2>\n<p>Unlike traditional security methods that wait for a threat to be identified before responding, threat intelligence is predicated on preventing potential threats before they become active. Some businesses use this info to learn more about existing threats and paths of attack, while others even plan for and anticipate future potential security events to shield themselves. This is proactive, not reactive, by the way.<\/p>\n<p>Central to this is the use of Threat Intelligence Platforms (TIPs), which aggregate data from disparate sources to provide real-time insights into emerging cyber threats.<\/p>\n<p>This means that all of these tools enable many <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security<\/a> teams to stop high threats in the precipitating stage before they reach the network, thereby enhancing the company&#8217;s preparedness.<\/p>\n<p>This indicates that IoCs (Indicators of Compromise) are another significantly important tool for danger intelligence. IoCs are evidence that helps investigators determine whether a potential threat exists.<\/p>\n<p>They could, for instance, act funny on the network or attempt to log in unauthorizedly. Teams can quickly identify threats and respond to mitigate the risks they present by monitoring IoCs. Group Collaboration in Cybersecurity Forums is One More Effective Solution to Prepare for an Attack<\/p>\n<p>Sharing information across businesses and industries regarding various organisational threats eliminates new and emerging threats. Such information will be available through the Information Sharing and Analysis Centre (ISAC), among other places. This collaborative data method bolsters Digital Security.<\/p>\n<h2><strong>Zero Trust Architecture for Enhanced Cyber Security<\/strong><\/h2>\n<p>The zero trust model is built on the premise that threats can originate from anywhere \u2014 external or internal to the network. Traditional security approaches are the ones that have borders. On the other hand, Zero Trust requires proof of every person and object attempting to access, regardless of location. Important parts include:<\/p>\n<p><strong>Minimise Password Risk:<\/strong> Users have the least privileged access, so the damage is contained in case their passwords are compromised. Give the users only the rights that you need them to have. This stops insider threats from causing substantial harm.<\/p>\n<p><strong>Micro-Segmentation:<\/strong> If a network is divided into smaller, separate sections, an attacker who gets into the network cannot move around quickly. This forces a leak to expose only a data section, as each section needs identification.<\/p>\n<p>Continuous monitoring and logging: Zero Trust insists that users and devices be constantly monitored to check for strange behaviour. This system is an alert system; if you adopt it and watch for anything that does not act the way you would expect, any deviations trigger alarms and should be addressed immediately.<\/p>\n<p><strong>Multi-Factor Authentication (MFA)<\/strong>: MFA will enable Zero Trust by requiring multiple methods to verify the authorised user. Thus, an additional layer of security is needed to make the company less vulnerable to a fault via a hack or user error.<\/p>\n<p>This means that Zero-Trust design eradicates implicit trust, and better Digital Security comes from repeated checking of users and devices. This is significant for protecting private network assets in our increasingly complex digital landscape.<\/p>\n<h2><strong>AI and Machine Learning in Cyber Security<\/strong><\/h2>\n<p>The <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cyber Security<\/a> landscape has transformed due to AI and ML, which has left us with more optimal ways of threat discovery. Reaction time has decreased, and predicting future detections has become much easier. AI tools sift through massive amounts of real-time data to identify risks and trends, which is why they are excellent for securing networks.<\/p>\n<p>Identifying weirdness on the Internet is an everyday use of AI in Internet security. In simple terms, the AI locates moves in the network and understands the image of what a standard move appears to be. This allows it to detect anomalies or events that are out of the ordinary.<\/p>\n<p>These patterns or events can indicate a potential security incident. <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/ai-course\/\">AI<\/a> security is useful for detecting zero-day threats, which signature-based methods cannot detect. Similarly, Automated Event Reaction is another scenario where AI enables security systems to respond autonomously to threats.<\/p>\n<p>For instance, AI can efficiently isolate a compromised device or prevent malicious data so that human interference isn&#8217;t required as much. Behavioural analytics is another application of AI where a machine learning model searches for minor deviations in human behaviour that might indicate the compromise of a password.<\/p>\n<p>If an employee logs in or accesses resources from a location he\/ she usually does not use, the system can raise an alert for suspicious activity. <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/ai-course\/\">AI<\/a> also enhances predictive threat intelligence by examining data from past events to forecast future threats. Digital Security teams gain a significant strategic advantage.<\/p>\n<p>This predictive capability allows organisations to strengthen their defences proactively based on evolving patterns and trends.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p><a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cybersecurity<\/a> is a broad and ever-evolving topic. Avoid smart risks but use advanced tactics. By implementing layered security, Zero Trust practice and design, AI and machine learning, robust data security, and an event response plan, your business can fortify itself with dynamic protections that move and adapt to new threats. In broader terms, dedicating a budget to state-of-the-art network security does have a price tag. Still, it is one of the best methods to reduce risk, enhance consumer trust, secure sensitive information, and ensure that a company will thrive and succeed in modern society.<\/p>\n<h2><strong><a href=\"https:\/\/digitalschoolofmarketing.co.za\/contact-us\/\">GET IN TOUCH WITH THE DIGITAL SCHOOL OF MARKETING<\/a><\/strong><\/h2>\n<p>Equip yourself with the essential skills to protect digital assets and maintain consumer trust by enrolling in the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cyber Security Course<\/a>\u00a0at the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/\">Digital School of Marketing<\/a>. Join us today to become a leader in the dynamic field of cybersecurity.<\/p>\n<p><a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20852 size-woocommerce_single entered lazyloaded\" src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" alt=\"DSM Digital School of Marketing - Cyber Security\" width=\"600\" height=\"96\" data-lazy-srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" data-lazy-sizes=\"(max-width: 600px) 100vw, 600px\" data-lazy-src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg\" data-ll-status=\"loaded\" \/><\/a><\/p>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Frequently Asked Questions<\/h3>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-tabs style_default switch_click accordion has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"qae0\"><button class=\"w-tabs-section-header\" aria-controls=\"content-qae0\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What are some of the most effective advanced Digital Security techniques?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-qae0\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Network defences against sophisticated threats involve various techniques that deliver advanced cyber security. Implementing multiple protection strategies simultaneously\u2014routers, physical or terminal security, and multi-factor identification\u2014serves as a multi-layered wall of protection. This is a clear example of layered security. Another approach is Zero-Trust Architecture. In other words, threats can come from any source, and information must be easily accessible to users without sacrificing user verification.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"qc79\"><button class=\"w-tabs-section-header\" aria-controls=\"content-qc79\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How does Zero Trust Architecture enhance cyber security?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-qc79\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Zero-trust architecture revolutionises Digital Security because it works under Zero Trust, where no one is trusted by default, even at the network&#8217;s edge. This model has constant checks to give only the allowed access. Techniques such as less privileged access provide users only the level of access they need, thereby reducing possible damages if a user account is hacked. Micro-segmentation techniques divide the network into secure zones, so even if an attacker breaks into one segment, they cannot move quickly through other network segments.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"we26\"><button class=\"w-tabs-section-header\" aria-controls=\"content-we26\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What role does AI play in cyber security?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-we26\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Artificial intelligence in digital security is a significant enabler as it helps automatically discover hazards, enhances forecasting ability, and increases response times. Strange patterns in network traffic are identified by AI-powered &#8220;anomaly detection,&#8221; which alerts security teams of possible threats that would be invisible to traditional methods. At the same time, automated incident response powered by AI quickly shuts down hacked systems and prevents bad behaviour in real-time. To detect if passwords have been stolen\/people are using the same behaviour to log in repeatedly, AI is searching for slight differences in how humans enter passwords. AI can enable organisations to enhance their defences and quickly identify complex online threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"ifd3\"><button class=\"w-tabs-section-header\" aria-controls=\"content-ifd3\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Why is threat intelligence essential for cyber security?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-ifd3\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>This is always true, and it has become one of the most critical aspects of cyber security because threat intelligence helps companies to prepare and anticipate threats. Threat intelligence differs from regular reaction security because it aggregates and analyses data on existing threats, vulnerabilities, and attack techniques. Trend Intelligence Platforms (TIPs): TIPs collate data across multiple sources to give you a real-time image of emerging threats that may impact a network. Likewise, Indicators of Compromise assist in early spotting suspicious activities, and collaborative communities enable companies to exchange threat information, improving countermeasures in general. With threat intelligence in hand, businesses can be proactive in their efforts to adjust their defences to the latest threat landscape.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"h162\"><button class=\"w-tabs-section-header\" aria-controls=\"content-h162\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What is the importance of data encryption in cyber security?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-h162\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Another important function of Internet security is encryption, which keeps private details secret but allows only authorised users to see them. Encryption protects data from hackers by hiding it so that it cannot be read by anyone who is not authorised. Its path from source to goal is safe due to end-to-end encryption. When data is tokenised, unique tokens replace the original private data. This lessens the likelihood of being on the books if a breach occurs. Strong encryption, such as homomorphic encryption, allows you to perform operations on protected data, which is ideal for secure cloud work. Organisations use Encryption to protect sensitive data, adhere to compliance, and limit the impact of possible cyber threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"t310\"><button class=\"w-tabs-section-header\" aria-controls=\"content-t310\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How does an incident response plan support cyber security?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-t310\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>An incident reaction and handling plan is a crucial aspect of cyber security, as it demonstrates the course of action to be taken in the event of security attacks. A quality plan details what actions must be taken before, during and after a security incident occurs. This enables the teams to act quickly to contain the issue and reduce the impact. Another critical aspect is cyber forensics, which examines why and how far the breach has been made and provides recommendations on prevention from future occurrences. Effective business continuity and crisis recovery plans ensure that business-critical processes maintain continuity with minimal downtime.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_medium\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-btn-wrapper align_justify\"><a class=\"w-btn us-btn-style_2\" href=\"#enquiry\"><span class=\"w-btn-label\">Enquire Today<\/span><\/a><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Blog Categories<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/blog\/content-marketing\/\">Content Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/digital-marketing\/\">Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/cyber-security-blog\/\">Cyber Security<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/graphic-design-blog\/\">Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/blog\/public-relations\/\">Public Relations<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/blog\/seo\/\">SEO<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/social-media-marketing\/\">Social Media Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/web-design-blog\/\">Web Design<\/a><\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">You might also like<\/span><\/span><\/h3><div class=\"w-html\"><ul><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/social-media-marketing-blog\/zero-moment-of-truth-benefit-social-media-marketing\/\" rel=\"bookmark\">Use the Zero Moment of Truth to Benefit your Social Media Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/your-complete-guide-to-ppc-marketing-basic\/\" rel=\"bookmark\">Your Complete Guide to PPC Marketing Basics. Find out more.<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/blog\/you-can-convey-a-lot-of-meaning-with-just-one-graphic\/\" rel=\"bookmark\">You Can Convey a Lot Of Meaning With Just One Graphic<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/would-you-make-a-great-marketing-manager\/\" rel=\"bookmark\">Would you make a great marketing manager?<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-with-bona-magazine-and-the-digital-school-of-marketing\/\" rel=\"bookmark\">Win with Bona Magazine and the Digital School of Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-a-digital-marketing-course-valued-at-r12-000\/\" rel=\"bookmark\">Win a Digital Marketing Course Valued at  R12 000<\/a><\/li><\/ul><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Top Selling COurses<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/courses\/digital-marketing-course\/\">Intermediate Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/courses\/advanced-digital-marketing-course\/\">Advanced Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/courses\/social-media-marketing-course\/\">Intermediate Social media marketing<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/courses\/digital-brand-management-course\/\">Brand Management<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/courses\/graphic-design-course\/\">Basic Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-6\"><a href=\"\/courses\/advanced-graphic-design-course\/\">Advanced Graphic design<\/a><\/li>\n<li class=\"cat-item cat-item-7\"><a href=\"\/courses\/national-certificate-of-advertising\/\">National Certificate of Advertising<\/a><\/li>\n<li class=\"cat-item cat-item-8\"><a href=\"\/courses\/national-diploma-of-copywriting-course\/\">National Diploma of Copyrighting<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":950,"featured_media":21579,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[771],"tags":[],"class_list":["post-20934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/20934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/users\/950"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/comments?post=20934"}],"version-history":[{"count":0,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/20934\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media\/21579"}],"wp:attachment":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media?parent=20934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/categories?post=20934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/tags?post=20934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}