{"id":950,"date":"2023-11-08T13:13:00","date_gmt":"2023-11-08T13:13:00","guid":{"rendered":"https:\/\/conscia.com\/ie\/?p=950"},"modified":"2025-09-23T13:19:47","modified_gmt":"2025-09-23T12:19:47","slug":"what-can-we-learn-from-recent-okta-breaches","status":"publish","type":"post","link":"https:\/\/conscia.com\/ie\/blog\/what-can-we-learn-from-recent-okta-breaches\/","title":{"rendered":"What can we learn from recent Okta breaches?"},"content":{"rendered":"\n<p class=\" wp-block-paragraph\"><strong>Okta<\/strong>, an industry titan in&nbsp;<strong>identity and access management<\/strong>, recently grappled with two significant security breaches. These events have cast a spotlight on the intricate challenges facing cybersecurity defenses and governance. By dissecting the&nbsp;<strong>technical aspects<\/strong>&nbsp;of how these breaches occurred, we can glean essential lessons that are pivotal for the broader cybersecurity community.<\/p>\n\n\n\n<div class=\"wp-block-group  background-graphics--none has-gray-300-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading  wp-block-paragraph spacing-before--5\">The Third-Party Vendor Breach: A Chain Reaction<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">In late September, Okta faced a breach via&nbsp;<strong>Rightway Healthcare<\/strong>, a third-party vendor. The attackers penetrated Rightway Healthcare\u2019s IT environment, a chain reaction that began with a successful&nbsp;<strong>phishing attack<\/strong>&nbsp;or exploitation of an&nbsp;<strong>unpatched vulnerability<\/strong>, which is a common entry point for such breaches. Once inside, they navigated through the network to locate and&nbsp;<strong>exfiltrate personal data<\/strong>&nbsp;for thousands of Okta employees.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">This breach underscores the \u2018domino effect\u2019 in cybersecurity; a weakness in a partner\u2019s defenses can topple security in connected systems. The technical oversight here was twofold: a failure to adequately secure the vendor\u2019s entry points and a lack of stringent&nbsp;<strong>access controls<\/strong>&nbsp;and monitoring that would flag unauthorized data access and exfiltration.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group  background-graphics--none has-gray-300-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading  wp-block-paragraph spacing-before--5\">The Internal Configuration Breach: A Cascade of Compromises<\/h3>\n\n\n\n<p class=\" spacing-after--5 wp-block-paragraph\">The more&nbsp;<a href=\"https:\/\/sec.okta.com\/harfiles\" target=\"_blank\" rel=\"noreferrer noopener\">systemic breach at Okta<\/a>&nbsp;was rooted in the&nbsp;<strong>misconfiguration of service accounts<\/strong>. These accounts, designed for system-to-system interactions, often have robust permissions to perform various automated tasks. In this case, the service account was not correctly secured, lacking in&nbsp;<strong>multifactor authentication<\/strong><strong>,<\/strong>&nbsp;and was not subjected to regular credential rotations or scrutiny under the&nbsp;<strong>least privilege principle<\/strong>. This misconfiguration was exacerbated by a lapse in oversight, which allowed the attacker to exploit this vulnerability, ultimately leading to the compromise of&nbsp;<strong>administrative credentials<\/strong>&nbsp;for customer accounts.<\/p>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Digging Deeper: The Technical Breakdown<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>1. The Third-Party Breach<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The breach likely started with a&nbsp;<strong>spear-phishing campaign<\/strong>&nbsp;targeting employees at Rightway Healthcare.<\/li>\n\n\n\n<li>Attackers may have used sophisticated&nbsp;<strong>social engineering tactics<\/strong>&nbsp;to deceive an employee into providing credentials or installing malware.<\/li>\n\n\n\n<li>Once the initial foothold was established, the attackers could move laterally within the network, searching for sensitive Okta employee data.<\/li>\n\n\n\n<li>The stolen data was exfiltrated, possibly over an encrypted channel, to avoid detection, pointing to a need for better&nbsp;<strong>data loss prevention (DLP) strategies<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>2. The Internal Configuration Breach<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A service account with elevated privileges was improperly configured, likely with default credentials or without&nbsp;<strong>multifactor authentication<\/strong>.<\/li>\n\n\n\n<li>Attackers identified this vulnerability, possibly through&nbsp;<strong>reconnaissance activities<\/strong>&nbsp;or leaked credentials on the dark web.<\/li>\n\n\n\n<li>By exploiting this service account, the attackers gained access to internal systems and escalated their privileges to obtain&nbsp;<strong>administrative access<\/strong>.<\/li>\n\n\n\n<li>This access allowed the attackers to penetrate deep into Okta\u2019s network, reaching customer account data and raising alarms about the need for enhanced&nbsp;<strong>network segmentation<\/strong>&nbsp;and&nbsp;<strong>endpoint security<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Detailed Cybersecurity Lessons<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Third-Party Vetting and Monitoring<\/strong>: Organizations must rigorously assess the security measures of all third-party vendors. This process should include regular audits, the establishment of clear security requirements, and continuous monitoring of third-party practices.<\/li>\n\n\n\n<li><strong>Configuration Management and Control<\/strong>: Proper configuration of service accounts is crucial. These accounts, which are used for automated processes and may have extensive privileges, should be configured with the principle of least privilege in mind, granting them only the permissions necessary to perform their functions.<\/li>\n\n\n\n<li><strong>Leadership and Culture of Security<\/strong>: Senior management must lead by example regarding Their involvement is essential to creating a culture of security where practices and policies are taken seriously at all levels of the organization.<\/li>\n\n\n\n<li><strong>Employee Cybersecurity Training<\/strong>: Continuous training programs for employees can help prevent security breaches that the misuse of company resources or inadvertent errors may cause. This should be a regular part of employee development, not just a one-off event.<\/li>\n\n\n\n<li><strong>Comprehensive Incident Response<\/strong>: The speed and efficiency of an organization\u2019s response to a breach can significantly mitigate the damage caused. A comprehensive incident response plan should be in place, regularly updated, and practiced through drills and simulations.<\/li>\n\n\n\n<li><strong>Advanced Technical Defenses<\/strong>: The implementation of advanced technical defenses such as multi-factor authentication, endpoint detection and response (EDR) systems, and the use of encrypted connections can reduce the risk of unauthorized access and data theft.<\/li>\n\n\n\n<li><strong>Proactive Threat Hunting<\/strong>: Organizations should not only be reactive but also proactive in their security approaches. Regularly scheduled threat-hunting activities can identify potential vulnerabilities before attackers exploit them.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Harnessing the Lessons<\/h3>\n\n\n\n<p class=\" wp-block-paragraph\">The technical dissection of the Okta breaches reveals critical lapses in cybersecurity practices that can serve as learning opportunities. For third-party risk management, continuous monitoring and stringent security measures are non-negotiable. Internally, the importance of secure configurations, regular audits, and adherence to security best practices is paramount.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">As organizations navigate the complexities of cybersecurity threats, these breaches at Okta are a stark reminder that the foundation of security lies in attention to detail, proactive defense strategies, and a relentless commitment to improvement. By understanding these breaches in-depth, the cybersecurity community can forge ahead with stronger, more resilient defenses, ensuring that such incidents become rarer and less impactful.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Okta, an industry titan in&nbsp;identity and access management, recently grappled with two significant security breaches. These events have cast a spotlight on the intricate challenges facing cybersecurity defenses and governance. By dissecting the&nbsp;technical aspects&nbsp;of how these breaches occurred, we can glean essential lessons that are pivotal for the broader cybersecurity community. The Third-Party Vendor Breach: [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":951,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[9,22],"global_partners":[],"global_industries":[25],"global_business_outcome":[43],"global_types":[],"class_list":["post-950","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-cybersecurity","global_solutions-threat-intelligence","global_industries-all-industries","global_business_outcome-security-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What can we learn from recent Okta breaches? - Conscia Ireland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What can we learn from recent Okta breaches?\" \/>\n<meta property=\"og:description\" content=\"Okta, an industry titan in&nbsp;identity and access management, recently grappled with two significant security breaches. These events have cast a spotlight on the intricate challenges facing cybersecurity defenses and governance. By dissecting the&nbsp;technical aspects&nbsp;of how these breaches occurred, we can glean essential lessons that are pivotal for the broader cybersecurity community. The Third-Party Vendor Breach: [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-08T13:13:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T12:19:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/what-can-we-learn-from-recent-okta-breaches\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\"},\"headline\":\"What can we learn from recent Okta breaches?\",\"datePublished\":\"2023-11-08T13:13:00+00:00\",\"dateModified\":\"2025-09-23T12:19:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/what-can-we-learn-from-recent-okta-breaches\/\"},\"wordCount\":845,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/what-can-we-learn-from-recent-okta-breaches\/\",\"url\":\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/\",\"name\":\"What can we learn from recent Okta breaches? - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg\",\"datePublished\":\"2023-11-08T13:13:00+00:00\",\"dateModified\":\"2025-09-23T12:19:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What can we learn from recent Okta breaches?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What can we learn from recent Okta breaches? - Conscia Ireland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/","og_locale":"en_US","og_type":"article","og_title":"What can we learn from recent Okta breaches?","og_description":"Okta, an industry titan in&nbsp;identity and access management, recently grappled with two significant security breaches. These events have cast a spotlight on the intricate challenges facing cybersecurity defenses and governance. By dissecting the&nbsp;technical aspects&nbsp;of how these breaches occurred, we can glean essential lessons that are pivotal for the broader cybersecurity community. The Third-Party Vendor Breach: [&hellip;]","og_url":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/","og_site_name":"Conscia Ireland","article_published_time":"2023-11-08T13:13:00+00:00","article_modified_time":"2025-09-23T12:19:47+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/blog\/what-can-we-learn-from-recent-okta-breaches\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e"},"headline":"What can we learn from recent Okta breaches?","datePublished":"2023-11-08T13:13:00+00:00","dateModified":"2025-09-23T12:19:47+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/ie\/blog\/what-can-we-learn-from-recent-okta-breaches\/"},"wordCount":845,"publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"image":{"@id":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/blog\/what-can-we-learn-from-recent-okta-breaches\/","url":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/","name":"What can we learn from recent Okta breaches? - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg","datePublished":"2023-11-08T13:13:00+00:00","dateModified":"2025-09-23T12:19:47+00:00","breadcrumb":{"@id":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#primaryimage","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/09\/16by9-soc-4.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/blog\/what-can-we-learn-from-recent-okta-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"What can we learn from recent Okta breaches?"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=950"}],"version-history":[{"count":3,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/950\/revisions"}],"predecessor-version":[{"id":956,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/950\/revisions\/956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media\/951"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/categories?post=950"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=950"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=950"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=950"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=950"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}