{"id":1274,"date":"2016-03-22T11:19:06","date_gmt":"2016-03-22T11:19:06","guid":{"rendered":"http:\/\/www.octalsoftware.com.sg\/blog\/?p=1274"},"modified":"2017-01-11T13:10:16","modified_gmt":"2017-01-11T13:10:16","slug":"iot-security-checklist-to-abide-by-to-ensure-smooth-processing","status":"publish","type":"post","link":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/","title":{"rendered":"IoT Security Checklist to Abide by to Ensure Smooth Processing"},"content":{"rendered":"<p style=\"text-align:justify;\">In the world of internet, soon the Internet of Things is going to be a major possibility for hackers, noting that everything will be connected. Thus it is necessary to ascertain that significant systems and strategies are implemented at every stage of the product development life cycle.<\/p>\n<p><!--more--><\/p>\n<p>1. <strong>Start from the base to reduce attack points<\/strong><\/p>\n<p style=\"text-align:justify;\">Digital security must be ascertained during every phase of the <a href=\"https:\/\/www.octalsoftware.com.sg\/custom-software-development-services\" title=\"Development services\" target=\"_blank\">development<\/a> process. Crucial part of product requirements and design consideration, security must be ensured at each phase of the development life cycle. The Quality Assurance cycle is an assurance for security as well as functionality while the vital component remains fail-safe systems. It happens when something fails \u2013 and failure is going to be there \u2013 so it needs to be built to fail safe thus the failure doesn\u2019t lead to a greater systematic failure.<\/p>\n<p>2. <strong>Authentication &#038; Authorization<\/strong><\/p>\n<p style=\"text-align:justify;\">In order to ensure effective communication between devices, the IoT is going to require strong authentication with the usage of techniques such as multi-factor authentication or asymmetric encryption. Each device can be protected with the use of their own unique key. Now it\u2019s practically not right to expect a user to enter a password each time they enter into their car, thus another form of security is required. Thus certificate-based authentication works best. Besides, authorization is also imperative as strong authorization stands for role-based access controls that can be enforced to limit exposure.<\/p>\n<p>3. <strong>Encryption<\/strong><\/p>\n<p style=\"text-align:justify;\">It\u2019s necessary to encrypt sensitive personal data that you have stored on a device and every kind of communication that takes place to and from the device should be encrypted in transit with the use of secure protocol. Besides key management is crucial so that when someone access a device must not be able to extract data. Thus the actual key protecting data should be protected.<\/p>\n<p>4. <strong>Privacy<\/strong><\/p>\n<p style=\"text-align:justify;\">The transparency must be maintained in regard of the type of data that is collected, how it is used as well as opt-out options. The personal data collection needs to be limited to only which is essential. In other words, you should protect only what needs to be protected to reduce exposure.<\/p>\n<p>5. <strong>Consumer Awareness<\/strong><\/p>\n<p style=\"text-align:justify;\">Consumers are also responsible for IoT security but as professionals, by creating consumer awareness. Now for instance, credit card companies send constant notifications to consumers via alert warnings and best practices to share credit card information. With the sharing of information, consumers are empowered and they can contribute in an organization\u2019s efforts to prevent fraud.<\/p>\n<p style=\"text-align:justify;\">Often we come across companies not investing in security and this leads to major loss of consumer confidence, falling stock prices and major organizational shake-ups. Meanwhile, IoT involves higher risk, still as presently we are in the early stages so it\u2019s easy to design a comprehensive security program to protect against threats that we may face in future.<\/p>\n<p style=\"text-align:justify;\"><a href=\"https:\/\/www.octalsoftware.com.sg\/\" title=\"Web &#038; Mobile App Development services\" target=\"_blank\">Octal Info Solution<\/a> is an ISO 9001:2008 certified web development company with offices in US, UK &#038; Singapore and development center in India offers web and mobile app development services at global level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the world of internet, soon the Internet of Things is going to be a major possibility for hackers, noting that everything will be connected. Thus it is necessary to ascertain that significant systems and strategies are implemented at every stage of the product development life cycle.<\/p>\n","protected":false},"author":1,"featured_media":1275,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":""},"categories":[109,71,115],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Point to follow in IOT security to product development.<\/title>\n<meta name=\"description\" content=\"IOT security are a necessary thing in product development, find the excellent checklist to ensure smooth processing for your own development project.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Point to follow in IOT security to product development.\" \/>\n<meta property=\"og:description\" content=\"IOT security are a necessary thing in product development, find the excellent checklist to ensure smooth processing for your own development project.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/\" \/>\n<meta property=\"og:site_name\" content=\"Octal Info Solution\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OctalInfoSolutionSG\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/OctalInfoSolutionSG\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-22T11:19:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-11T13:10:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"755\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arun Goyal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/octalsg\" \/>\n<meta name=\"twitter:site\" content=\"@octalsg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arun Goyal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/\"},\"author\":{\"name\":\"Arun Goyal\",\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/person\/b705e907ce73f52b5f5a51ae670d20d5\"},\"headline\":\"IoT Security Checklist to Abide by to Ensure Smooth Processing\",\"datePublished\":\"2016-03-22T11:19:06+00:00\",\"dateModified\":\"2017-01-11T13:10:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/\"},\"wordCount\":514,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#organization\"},\"articleSection\":[\"Internet\",\"News\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/\",\"url\":\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/\",\"name\":\"Point to follow in IOT security to product development.\",\"isPartOf\":{\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#website\"},\"datePublished\":\"2016-03-22T11:19:06+00:00\",\"dateModified\":\"2017-01-11T13:10:16+00:00\",\"description\":\"IOT security are a necessary thing in product development, find the excellent checklist to ensure smooth processing for your own development project.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.octalsoftware.com.sg\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT Security Checklist to Abide by to Ensure Smooth Processing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#website\",\"url\":\"https:\/\/www.octalsoftware.com.sg\/blog\/\",\"name\":\"Octal Info Solution\",\"description\":\"Technology Outsourcing Simplified\",\"publisher\":{\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.octalsoftware.com.sg\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#organization\",\"name\":\"Octal Info Solution\",\"url\":\"https:\/\/www.octalsoftware.com.sg\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2022\/09\/logo-1.png\",\"contentUrl\":\"https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2022\/09\/logo-1.png\",\"width\":240,\"height\":38,\"caption\":\"Octal Info Solution\"},\"image\":{\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/OctalInfoSolutionSG\",\"https:\/\/twitter.com\/octalsg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/person\/b705e907ce73f52b5f5a51ae670d20d5\",\"name\":\"Arun Goyal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f914f9cc75cbc3c48c3853c016228bbb?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f914f9cc75cbc3c48c3853c016228bbb?s=96&r=g\",\"caption\":\"Arun Goyal\"},\"description\":\"Managing Director @ Octal Info Solution, Arun Goyal is a tech-enthusiast and visionary entrepreneur. He loves to talk about technology, and expresses his views about the trends in tech-world through this blog.\",\"sameAs\":[\"http:\/\/octalsoftware.com.sg\/\",\"https:\/\/www.facebook.com\/OctalInfoSolutionSG\",\"https:\/\/www.linkedin.com\/company\/octal-info-solution-pte-ltd\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/octalsg\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Point to follow in IOT security to product development.","description":"IOT security are a necessary thing in product development, find the excellent checklist to ensure smooth processing for your own development project.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/","og_locale":"en_US","og_type":"article","og_title":"Point to follow in IOT security to product development.","og_description":"IOT security are a necessary thing in product development, find the excellent checklist to ensure smooth processing for your own development project.","og_url":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/","og_site_name":"Octal Info Solution","article_publisher":"https:\/\/www.facebook.com\/OctalInfoSolutionSG","article_author":"https:\/\/www.facebook.com\/OctalInfoSolutionSG","article_published_time":"2016-03-22T11:19:06+00:00","article_modified_time":"2017-01-11T13:10:16+00:00","og_image":[{"width":755,"height":375,"url":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg","type":"image\/jpeg"}],"author":"Arun Goyal","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/octalsg","twitter_site":"@octalsg","twitter_misc":{"Written by":"Arun Goyal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/#article","isPartOf":{"@id":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/"},"author":{"name":"Arun Goyal","@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/person\/b705e907ce73f52b5f5a51ae670d20d5"},"headline":"IoT Security Checklist to Abide by to Ensure Smooth Processing","datePublished":"2016-03-22T11:19:06+00:00","dateModified":"2017-01-11T13:10:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/"},"wordCount":514,"commentCount":0,"publisher":{"@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#organization"},"articleSection":["Internet","News","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/","url":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/","name":"Point to follow in IOT security to product development.","isPartOf":{"@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#website"},"datePublished":"2016-03-22T11:19:06+00:00","dateModified":"2017-01-11T13:10:16+00:00","description":"IOT security are a necessary thing in product development, find the excellent checklist to ensure smooth processing for your own development project.","breadcrumb":{"@id":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.octalsoftware.com.sg\/blog\/iot-security-checklist-to-abide-by-to-ensure-smooth-processing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.octalsoftware.com.sg\/blog\/"},{"@type":"ListItem","position":2,"name":"IoT Security Checklist to Abide by to Ensure Smooth Processing"}]},{"@type":"WebSite","@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#website","url":"https:\/\/www.octalsoftware.com.sg\/blog\/","name":"Octal Info Solution","description":"Technology Outsourcing Simplified","publisher":{"@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.octalsoftware.com.sg\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#organization","name":"Octal Info Solution","url":"https:\/\/www.octalsoftware.com.sg\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2022\/09\/logo-1.png","contentUrl":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2022\/09\/logo-1.png","width":240,"height":38,"caption":"Octal Info Solution"},"image":{"@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OctalInfoSolutionSG","https:\/\/twitter.com\/octalsg"]},{"@type":"Person","@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/person\/b705e907ce73f52b5f5a51ae670d20d5","name":"Arun Goyal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.octalsoftware.com.sg\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f914f9cc75cbc3c48c3853c016228bbb?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f914f9cc75cbc3c48c3853c016228bbb?s=96&r=g","caption":"Arun Goyal"},"description":"Managing Director @ Octal Info Solution, Arun Goyal is a tech-enthusiast and visionary entrepreneur. He loves to talk about technology, and expresses his views about the trends in tech-world through this blog.","sameAs":["http:\/\/octalsoftware.com.sg\/","https:\/\/www.facebook.com\/OctalInfoSolutionSG","https:\/\/www.linkedin.com\/company\/octal-info-solution-pte-ltd","https:\/\/twitter.com\/https:\/\/twitter.com\/octalsg"]}]}},"uagb_featured_image_src":{"full":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg",755,375,false],"thumbnail":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1-150x150.jpg",150,150,true],"medium":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1-300x149.jpg",300,149,true],"medium_large":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg",648,322,false],"large":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg",648,322,false],"1536x1536":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg",755,375,false],"2048x2048":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg",755,375,false],"sparkling-featured":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1-750x375.jpg",750,375,true],"sparkling-featured-fullwidth":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg",755,375,false],"tab-small":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1-60x60.jpg",60,60,true],"web-stories-poster-portrait":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg",640,318,false],"web-stories-publisher-logo":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg",96,48,false],"web-stories-thumbnail":["https:\/\/www.octalsoftware.com.sg\/blog\/wp-content\/uploads\/2016\/03\/lot1.jpg",150,75,false]},"uagb_author_info":{"display_name":"Arun Goyal","author_link":"https:\/\/www.octalsoftware.com.sg\/blog\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"In the world of internet, soon the Internet of Things is going to be a major possibility for hackers, noting that everything will be connected. Thus it is necessary to ascertain that significant systems and strategies are implemented at every stage of the product development life cycle.","_links":{"self":[{"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/posts\/1274"}],"collection":[{"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/comments?post=1274"}],"version-history":[{"count":5,"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/posts\/1274\/revisions"}],"predecessor-version":[{"id":1862,"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/posts\/1274\/revisions\/1862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/media\/1275"}],"wp:attachment":[{"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/media?parent=1274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/categories?post=1274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.octalsoftware.com.sg\/blog\/wp-json\/wp\/v2\/tags?post=1274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}